Beaucoup de clients Premier s’intéressent à la sécurité PowerShell (à juste titre) et sont souvent à la recherche de liens sur ce sujet. Je me propose dans ce court article (sujet à mises à jour régulières) d’en recenser quelques uns (triés par ordre antéchronologique):
- 15/09/2020 – PowerShell Logging: Recording and Auditing all the Things (adamtheautomator.com)
- 11/06/2020 – Security considerations for PowerShell Remoting using WinRM – PowerShell | Microsoft Docs
- 22/06/2020 – Securing PowerShell in the Enterprise | Cyber.gov.au
- 14/05/2020 – Making the second hop in PowerShell Remoting – PowerShell | Microsoft Docs
- 20/02/2020 – Defending Against PowerShell Attacks | PowerShell (microsoft.com)
- 14/09/2018 – Just Enough Administration: Windows PowerShell security controls help protect enterprise data | Microsoft Docs
- 03/08/2018 – PowerShell Injection Hunter: Security Auditing for PowerShell Scripts | PowerShell (microsoft.com)
- 17/05/2018 – PowerShell Constrained Language Mode | PowerShell (microsoft.com)
- 25/04/2018 – Prioritize All The Security Controls!
- 25/05/2017 – PowerShell Security at Enterprise Customers
- 12/04/2017 – PowerShell Remoting and Kerberos Double Hop: Old Problem – New Secure Solution | Microsoft Docs
- 10/04/2017 – A Comparison of Shell and Scripting Language Security
- 29/03/2017 – Practical PowerShell Security: Enable Auditing and Logging with DSC | Microsoft Docs
- 30/08/2016 – PowerShell Remoting Kerberos Double Hop Solved Securely | Microsoft Docs
- 11/02/2016 – PowerShell Version 5 Security Enhancements
- 09/06/2015 – PowerShell ♥ the Blue Team
- 08/12/2014 – Maslow’s Hierarchy of Security Controls | Precision Computing (leeholmes.com)
- 16/12/2013 – PowerShell Security Best Practices | PowerShell (microsoft.com)
- 03/06/2011 – Invoke-Expression considered harmful | PowerShell (microsoft.com)
- 30/09/2008 – PowerShell’s Security Guiding Principles
Many Premier customers are interested in PowerShell security (and rightly so) and are often looking for links on this topic. In this short article (subject to regular updates), I propose to list a few (sorted in anti-chronological order):
Some useful links:
- 09/15/2020 – PowerShell Logging: Recording and Auditing all the Things (adamtheautomator.com)
- 06/11/2020 – Security considerations for PowerShell Remoting using WinRM – PowerShell | Microsoft Docs
- 06/22/2020 – Securing PowerShell in the Enterprise | Cyber.gov.au
- 05/14/2020 – Making the second hop in PowerShell Remoting – PowerShell | Microsoft Docs
- 02/20/2020 – Defending Against PowerShell Attacks | PowerShell (microsoft.com)
- 09/14/2018 – Just Enough Administration: Windows PowerShell security controls help protect enterprise data | Microsoft Docs
- 08/03/2018 – PowerShell Injection Hunter: Security Auditing for PowerShell Scripts | PowerShell (microsoft.com)
- 05/17/2018 – PowerShell Constrained Language Mode | PowerShell (microsoft.com)
- 04/25/2018 – Prioritize All The Security Controls!
- 05/25/2017 – PowerShell Security at Enterprise Customers
- 04/12/2017 – PowerShell Remoting and Kerberos Double Hop: Old Problem – New Secure Solution | Microsoft Docs
- 04/10/2017 – A Comparison of Shell and Scripting Language Security
- 03/29/2017 – Practical PowerShell Security: Enable Auditing and Logging with DSC | Microsoft Docs
- 08/30/2016 – PowerShell Remoting Kerberos Double Hop Solved Securely | Microsoft Docs
- 02/11/2016 – PowerShell Version 5 Security Enhancements
- 06/09/2015 – PowerShell ♥ the Blue Team
- 12/08/2014 – Maslow’s Hierarchy of Security Controls | Precision Computing (leeholmes.com)
- 12/16/2013 – PowerShell Security Best Practices | PowerShell (microsoft.com)
- 06/03/2011 – Invoke-Expression considered harmful | PowerShell (microsoft.com)
- 09/30/2008 – PowerShell’s Security Guiding Principles
Laurent.
Feel free to share:)