What Else? – Further Mitigations and Resources
In this book, we have looked at many topics and techniques that help you mitigate risks in your environment when it comes to PowerShell. But of course, there are many more things that you can do to secure your environment – many directly related to PowerShell, but also others that are not directly related but help you secure PowerShell.
In this chapter, we won’t deep dive into every mitigation; instead, I will provide an overview of what other mitigations exist so that you can explore each on your own. We will cover the following topics:
- Secure scripting
- Exploring Desired State Configuration
- Hardening systems and environment
- Attack detection – Endpoint Detection and Response