Securing PowerShell
As we’ve seen, PowerShell is an incredibly powerful tool, and, to quote Uncle Ben, “with great power comes great responsibility.” If you don’t know who Uncle Ben is, ask your friendly neighborhood Spider-Man. PowerShell can wreak absolute havoc across a system or an organization. This damage can be deliberate, by someone setting out to cause damage, but it can just as easily be inadvertent.
We’re going to start this chapter by looking at one of the features that makes PowerShell so powerful – PowerShell remoting. We’ll continue by looking at how PowerShell protects against inadvertent mistakes, and then move on to the PowerShell features that protect us from deliberate attacks. We’ll then look at the features PowerShell has that let us analyze what has happened on the machine through logging, before wrapping up with a look at the things we can do to make the code we write more secure. Because of PowerShell...