Hi Roberto,
To retrieve the full picture, including administrative resets, PowerShell doesn’t directly expose this through PasswordLastSet. Instead, you can query the domain controller’s security event logs for password change (event ID 4723) and password reset (event ID 4724), then compare timestamps. This approach gives you the most recent password activity—whether by the user or an admin.
Alternatively, some environments use auditing or SIEM tools to track these events more efficiently. If you'd like, we can help craft a script to parse those logs and extract the relevant dates.
Let us know how you'd like to proceed—we’re happy to support you further.
If my answer is useful for you, please vote for it.
Best regards,
Quinnie Quoc.