Learning PowerShell is really a fast process (especially if you’re not new to programming) where you can be productive in a matter of days or in a month of lunches as Don Jones and Jeffery Hicks said.
But in my humble opinion, there aren’t many online resources that make you pay enough attention on how to run scripts and configure the environment properly in order to leverage all the technology features that Powershell and Windows environment are capable of.
So I’ve decided to add some articles to conquer this problem and help you on your journey, it’s an interesting subject for students and professional developers/it pros at any level of experience.
One of the pillars of PowerShell is being secure by design/default, but in reality, as any, another powerful tool needs the right settings and attention to mitigate risks of abuse or exploits from an attacker or prevent a simple malicious usage.
During the next weeks I will release a few basics articles on PowerShell standard practices and features :
- Requires statements
- Dot Sourcing
- Security polices (Types and Scopes).
- How to sign PowerShell scripts.
- Privileged Access : How to implement Least Privilege Access and LAPS.
- Security Base Line overview (Version, Execution Policy, Powershell remoting, Priviledge Access).
- JEA (Just Enough Administration) in Windows Server 2016.
- JIT (Just In Time Administration) in Windows Server 2016.