Summary
In this chapter, you learned about the concepts of JEA and about the components of constrained endpoints. You know when to leverage JEA to constrain PowerShell endpoints in order to enable unprivileged user accounts to perform administrative tasks that would otherwise require extensive permissions.
In the next chapter, we will be talking about DevOps with PowerShell. DevOps can also greatly benefit from restricted JEA endpoints, so keep an eye out for that.