Summary
In this chapter, you learned about the current situation and the basics of securing the execution of PowerShell by mitigating and possibly responding to attacks. There is a huge number of technical security controls and dependencies available, which makes the topic a very complex one. Try to start with the implementation of the most important technical security controls, and build up and follow a roadmap afterwards. Always validate how many resources you want to invest into a specific task and whether it's worth it. In the next chapter, we will dive into Just Enough Administration, which is one more tool for your security strategy.