Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge
Read in English Edit

Share via

Facebook x.com LinkedIn Email

PowerShell Security

Learn about PowerShell's security features and best practices.

Security features

Overview

  • PowerShell security features
  • Using App Control for Business

How-To Guide

  • Preventing script injection attacks
  • Securing a restricted PowerShell remoting session

PowerShell remoting

Concept

  • Running remote commands
  • Using WS-Management (WSMan) Remoting in PowerShell
  • Security Considerations for PowerShell Remoting using WinRM
  • PowerShell Remoting FAQ

How-To Guide

  • Making the second hop in PowerShell Remoting
  • PowerShell remoting over SSH

Just Enough Administration (JEA)

Concept

  • Overview
  • Prerequisites
  • JEA Role Capabilities
  • Session configurations
  • Security considerations

How-To Guide

  • Registering JEA Configurations
  • Using JEA
  • Auditing and Reporting on JEA

Using App Control

Overview

  • Using App Control for Business
  • How App Control works with PowerShell

How-To Guide

  • How to use App Control to secure PowerShell

Managing secrets

Concept

  • Overview of the SecretManagement and SecretStore modules
  • Understanding the security features of SecretManagement and SecretStore

How-To Guide

  • Managing a SecretStore vault
  • Use the SecretStore in automation
  • Use Azure Key Vault in automation

Reference

  • Microsoft.PowerShell.SecretManagement module
  • Microsoft.PowerShell.SecretStore module
en-us
Your Privacy Choices
  • AI Disclaimer
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2025