• About
  • Advertise
  • Privacy & Policy
  • Contact
Internet Starters
  • Home
  • Branding
  • Computers
  • Internet Starters
  • Marketing Tips
  • The Internet
No Result
View All Result
  • Home
  • Branding
  • Computers
  • Internet Starters
  • Marketing Tips
  • The Internet
No Result
View All Result
Internet Starters
No Result
View All Result
Home Computers

5 ways to manage computers securely (and remotely) using PowerShell

Inter 2025 by Inter 2025
October 16, 2020
5 ways to manage computers securely (and remotely) using PowerShell
Share on FacebookShare on Twitter

[ad_1]

With the ability to safe communications between distant assets is simply as necessary as with the ability to entry the system. Utilizing PowerShell, IT can do each when accessing off-site gadgets cross-platform.

connected laptop

Picture: iStock/metamorworks

The flexibility to entry techniques remotely has by no means been extra necessary than it’s at present. For quite a lot of causes—a world pandemic stopping many employees from bodily accessing providers, the rising variety of customers opting to go distant, or the expansion of the menace panorama because the borders of the group’s community are expanded to permit for elevated accessibility and availability.

SEE: TechRepublic Premium editorial calendar: IT insurance policies, checklists, toolkits, and analysis for obtain  (TechRepublic Premium)

It is no secret that malicious actors are on the market and actively in search of out new targets. Moreover, the present state of the worldwide Web implies that entry is accessible to tens of millions of customers—which represents a endless record of targets to compromise and exploit. Like an ideal storm that locations the burden of defending information squarely on on a regular basis customers and the respective IT professionals tasked with making certain that information stays secure.

A type of instruments which have come into the mainstream in recent times to facilitate distant entry and administration of techniques is Microsoft’s PowerShell (PS). Initially provided as a Home windows-only software, PS was formally made open-source a number of variations again and provides assist for the preferred working techniques, together with varied Linux distributions and macOS, alongside Home windows to securely carry out its duties. And the strategies beneath will illustrate varied methods to take action with out compromising system confidentiality or integrity.

Cmdlets utilizing the -ComputerName argument

On the whole, PS cmdlets have further arguments which might be a part of the syntax that enables for the extra specification of gadgets, variables, or further parameters. Some are widespread to most cmdlets, others are distinctive to a particular cmdlet or department of cmdlets.

The -ComputerName argument is accessible to many cmdlets and can be utilized to focus on a particular system when managing processes remotely. The parameter might also be paired with a file record, reminiscent of a CSV file with an inventory of laptop hostnames in order to course of cmdlets towards the record of hostnames completely and recursively.

Get-Service -Identify *SSH -ComputerName SAMPLE-PC01 | Begin-Service
Enter-CSV -Path serversharecomputerlist.csv | Add-ADComputer -ComputerName for every. $_.Computer systems 

Beginning interactive session utilizing Enter-PSSession

Starting a PowerShell session with a tool permits for a direct, safe connection to be established between your native PS console and a distant system. Much like operating cmdlets above, the PS session takes it one step ahead and permits for binding that system on to the console, so cmdlets executed in-session happen on the distant system solely—till you exit the session. 

SEE: Identification theft safety coverage (TechRepublic Premium)

For these conversant in SSH, a PS session works very similar to SSH, besides it makes use of the PowerShell programming language because the encryption and communication protocols to remotely handle a tool securely. A number of periods could also be created directly, however that may require a number of cases of PS open. Like SSH talked about earlier than it could work higher in one-to-one instances or scripted out to make sure every connection is created one after the other to course of cmdlets, then terminated earlier than transferring on to the subsequent connection. And similar to SSH, PSRemoting—the service that enables PS periods—is disabled by default and have to be enabled previous to establishing a distant connection.

Enter-PSSession -Identify PC02.native -Credential LOCALUSER

Securing consumer accounts/passwords with Get-Credential

One other technique that can be utilized to securely enter credentials is to make the most of the Get-Credential cmdlet. By leveraging this, the command will immediate the consumer to interactively enter their credentials to supply the safety context wherein to execute the cmdlet. Typically that is included as both a variable or piped straight to a different cmdlet to make sure the credentials will be reused as essential with out requiring a number of prompts or worse nonetheless—displaying usernames or passwords in plaintext.

Get-Credential -Credential LOCALUSER
$cred = Get-CredentialNew-ADComputer -Identify "PC03" -SamAccountName "PC03" -Path "OU=Computer systems,DC=Native" -Credential $cred

Working any command remotely with Invoke-Command

As with many processes in Home windows, there are sometimes a number of methods to carry out related duties. Executing instructions remotely is a kind of gadgets with a number of strategies to carry out the identical process. Utilizing the Invoke-Command cmdlet, customers are in a position to just do as in a devoted PS session, with out having to fret about enabling the service beforehand. The truth is, the one requirement is that the consumer has permission to execute instructions on the distant system for them to work.

The syntax on the Invoke-Command cmdlet provides a bit of complexity in contrast with the usual PS syntax, however when you get the cling of it, you may discover that this technique permits for executing PowerShell and non-PowerShell instructions with ease.

Invoke-Command -Filepath "serversharescript1.bat" -ComputerName "PC03.native" -Credential $cred 
Invoke-Command -ComputerName "PC03.native" -ScriptBlock 

Encrypting string values with ConvertTo-SecureString

Lastly, one other contender for securing credentials—or every other piece of personal information—is the ConvertTo-SecureString cmdlet, which serves to retailer personal information briefly on the pc as an encrypted file in the course of the session or till deleted. By securing values on this method, the consumer ensures that the worth is each accessible all through the session (reminiscent of when executing a number of instructions that require the -Credential parameter), and retains the values confidential in order to not be readable in plaintext.

SEE: Social engineering: A cheat sheet for enterprise professionals (free PDF) (TechRepublic)

Typically, this technique lends itself completely to scripted or automated processes which might be set to run on a schedule or if requiring that information be saved as a safe string worth in order that unauthorized events can not view the contents of a script to extract something that you simply would not need to fall into their palms, reminiscent of credentials, hostnames, IP addresses, and such.

$svrip = ConvertTo-SecureString "192.168.1.1" -AsPlainText -Drive
(Get-Credential).Password | ConvertFrom-SecureString | Out-File "servershareencryptcreds.txt"
5 ways to manage computers securely (and remotely) using PowerShell

Cybersecurity Insider E-newsletter

Strengthen your group’s IT safety defenses by preserving abreast of the most recent cybersecurity information, options, and greatest practices.
Delivered Tuesdays and Thursdays


Enroll at present

Additionally see

[ad_2]

Source link

Inter 2025

Inter 2025

Next Post
Carriers are doing everything they can to make 5G as confusing as possible

Carriers are doing everything they can to make 5G as confusing as possible

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Due to concerns about Listeria monocytogenes, the company issues several branded muffin recalls

Due to concerns about Listeria monocytogenes, the company issues several branded muffin recalls

July 22, 2021
Microsoft PowerPoint

How to download Microsoft PowerPoint on a Mac computer

February 13, 2020

Trending.

The 6 best Linux desktop PCs in 2024

The 6 best Linux desktop PCs in 2024

April 7, 2024
Kashmir

2G Mobile Internet Services To Be Restored In Kashmir, With Restrictions

February 14, 2020

Protests in the times of Internet shutdowns, Opinions News

January 1, 2020
A handout photo from the Presidential Anti-Organized Crime Commission shows computers and mobile phones at a scam centre in Bamban – Islander News.com

OpenAI Buying io, The AI Hardware Startup Co-Founded By Former Apple Design Chief Jony Ive And Altman Says It Could Redefine How Computers Are Used – Wccftech

May 26, 2025
A handout photo from the Presidential Anti-Organized Crime Commission shows computers and mobile phones at a scam centre in Bamban – Islander News.com

Supermicro Now Accepting Orders on Portfolio of More Than 20 Systems Optimized for the New NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs, Accelerating the Deployment of Enterprise AI Factories – Supermicro

May 21, 2025

Follow Us

Categories

  • Branding
  • Computers
  • Internet Starters
  • Marketing Tips
  • The Internet
Internet Starters

RSS Live Software news

  • The Ultimate Guide to Bandwidth Monitoring.
  • Website Traffic Monitor
  • About
  • Advertise
  • Privacy & Policy
  • Contact

Design and develop by 2020 name. 2020 name

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home

Design and develop by 2020 name. 2020 name