{"id":2976,"date":"2025-06-24T14:30:38","date_gmt":"2025-06-24T12:30:38","guid":{"rendered":"https:\/\/laurentvanacker.com\/?p=2976"},"modified":"2025-06-24T14:35:59","modified_gmt":"2025-06-24T12:35:59","slug":"powershell-security-links-liens-sur-la-securite-powershell","status":"publish","type":"post","link":"https:\/\/laurentvanacker.com\/index.php\/2025\/06\/24\/powershell-security-links-liens-sur-la-securite-powershell\/","title":{"rendered":"PowerShell security links \/ Liens sur la s\u00e9curit\u00e9 PowerShell"},"content":{"rendered":"<p><a href=\"#en-us\" name=\"fr-fr\">Go to English version<\/a><\/p>\n<p>Beaucoup de clients Premier s&rsquo;int\u00e9ressent \u00e0 la s\u00e9curit\u00e9 PowerShell (\u00e0 juste titre) et sont souvent \u00e0 la recherche de liens sur ce sujet. Je me propose dans ce court article (sujet \u00e0 mises \u00e0 jour r\u00e9guli\u00e8res) d&rsquo;en recenser quelques uns\u00a0 (tri\u00e9s par ordre ant\u00e9chronologique):<\/p>\n<ul>\n<li><a href=\"https:\/\/stack.watch\/product\/microsoft\/powershell\/\">Microsoft Powershell Security Vulnerabilities in 2025<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/PowerShell\/PowerShell\/security\/advisories\">Security Advisories \u00b7 PowerShell\/PowerShell<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/scripting\/security\/security-features\">Microsoft Learn \u2013 PowerShell Security Features<\/a><\/li>\n<li>15\/09\/2020 &#8211; <a href=\"https:\/\/adamtheautomator.com\/powershell-logging-recording-and-auditing-all-the-things\/\">PowerShell Logging: Recording and Auditing all the Things (adamtheautomator.com)<\/a><\/li>\n<li>11\/06\/2020 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/learn\/remoting\/winrmsecurity\">Security considerations for PowerShell Remoting using WinRM &#8211; PowerShell | Microsoft Docs<\/a><\/li>\n<li>22\/06\/2020 &#8211; <a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/publications\/securing-powershell-enterprise\">Securing PowerShell in the Enterprise | Cyber.gov.au<\/a><\/li>\n<li>14\/05\/2020 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/learn\/remoting\/ps-remoting-second-hop?view=powershell-7.1\">Making the second hop in PowerShell Remoting &#8211; PowerShell | Microsoft Docs<\/a><\/li>\n<li>20\/02\/2020 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/defending-against-powershell-attacks\/\">Defending Against PowerShell Attacks | PowerShell (microsoft.com)<\/a><\/li>\n<li>14\/09\/2018 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/\/dn896648(v=technet.10)?redirectedfrom=MSDN\">Just Enough Administration: Windows PowerShell security controls help protect enterprise data | Microsoft Docs<\/a><\/li>\n<li>03\/08\/2018 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-injection-hunter-security-auditing-for-powershell-scripts\/\">PowerShell Injection Hunter: Security Auditing for PowerShell Scripts | PowerShell (microsoft.com)<\/a><\/li>\n<li>17\/05\/2018 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-constrained-language-mode\/\">PowerShell Constrained Language Mode | PowerShell (microsoft.com)<\/a><\/li>\n<li>25\/04\/2018 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/daviddasneves\/2018\/04\/25\/prioritize-all-the-security-controls\/\">Prioritize All The Security Controls!<\/a><\/li>\n<li>25\/05\/2017 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/daviddasneves\/2017\/05\/25\/powershell-security-at-enterprise-customers\/\">PowerShell Security at Enterprise Customers<\/a><\/li>\n<li>12\/04\/2017 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/ashleymcglone\/powershell-remoting-and-kerberos-double-hop-old-problem-new-secure-solution\">PowerShell Remoting and Kerberos Double Hop: Old Problem &#8211; New Secure Solution | Microsoft Docs<\/a><\/li>\n<li>10\/04\/2017 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/powershell\/2017\/04\/10\/a-comparison-of-shell-and-scripting-language-security\/\">A Comparison of Shell and Scripting Language Security<\/a><\/li>\n<li>29\/03\/2017 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/ashleymcglone\/practical-powershell-security-enable-auditing-and-logging-with-dsc\">Practical PowerShell Security: Enable Auditing and Logging with DSC | Microsoft Docs<\/a><\/li>\n<li>30\/08\/2016 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/ashleymcglone\/powershell-remoting-kerberos-double-hop-solved-securely\">PowerShell Remoting Kerberos Double Hop Solved Securely | Microsoft Docs<\/a><\/li>\n<li>11\/02\/2016 &#8211; <a href=\"https:\/\/adsecurity.org\/?p=2277\">PowerShell Version 5 Security Enhancements<\/a><\/li>\n<li>09\/06\/2015 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-the-blue-team\/\">PowerShell \u2665 the Blue Team<\/a><\/li>\n<li>08\/12\/2014 &#8211; <a href=\"https:\/\/www.leeholmes.com\/blog\/2014\/12\/08\/maslows-hierarchy-of-security-controls\/\">Maslow\u2019s Hierarchy of Security Controls | Precision Computing (leeholmes.com)<\/a><\/li>\n<li>16\/12\/2013 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-security-best-practices\/\">PowerShell Security Best Practices | PowerShell (microsoft.com)<\/a><\/li>\n<li>03\/06\/2011 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/invoke-expression-considered-harmful\/\">Invoke-Expression considered harmful | PowerShell (microsoft.com)<\/a><\/li>\n<li>30\/09\/2008 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/powershell\/2008\/09\/30\/powershells-security-guiding-principles\/\">PowerShell\u2019s Security Guiding Principles<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"http:\/\/laurentvanacker.com\/wp-content\/uploads\/2017\/01\/012717_1333_Fusionnerde1.png\" alt=\"\" \/><\/p>\n<p><a href=\"#fr-FR\" name=\"en-us\">Aller \u00e0 la version fran\u00e7aise<\/a><\/p>\n<div class=\"tlid-results-container results-container\">\n<div class=\"tlid-result result-dict-wrapper\">\n<div class=\"result tlid-copy-target\">\n<div class=\"text-wrap tlid-copy-target\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"fr\" data-phrase-index=\"0\">Many Premier customers are interested in PowerShell security (and rightly so) and are often looking for links on this topic.<\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"fr\" data-phrase-index=\"1\">In this short article (subject to regular updates), I propose to list a few (sorted in anti-chronological order):<\/span><\/p>\n<p>Some useful links:<\/p>\n<ul>\n<li><a href=\"https:\/\/stack.watch\/product\/microsoft\/powershell\/\">Microsoft Powershell Security Vulnerabilities in 2025<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/PowerShell\/PowerShell\/security\/advisories\">Security Advisories \u00b7 PowerShell\/PowerShell<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/scripting\/security\/security-features\">Microsoft Learn \u2013 PowerShell Security Features<\/a><\/li>\n<li>09\/15\/2020 &#8211; <a href=\"https:\/\/adamtheautomator.com\/powershell-logging-recording-and-auditing-all-the-things\/\">PowerShell Logging: Recording and Auditing all the Things (adamtheautomator.com)<\/a><\/li>\n<li>06\/11\/2020 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/learn\/remoting\/winrmsecurity\">Security considerations for PowerShell Remoting using WinRM &#8211; PowerShell | Microsoft Docs<\/a><\/li>\n<li>06\/22\/2020 &#8211; <a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/publications\/securing-powershell-enterprise\">Securing PowerShell in the Enterprise | Cyber.gov.au<\/a><\/li>\n<li>05\/14\/2020 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/learn\/remoting\/ps-remoting-second-hop?view=powershell-7.1\">Making the second hop in PowerShell Remoting &#8211; PowerShell | Microsoft Docs<\/a><\/li>\n<li>02\/20\/2020 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/defending-against-powershell-attacks\/\">Defending Against PowerShell Attacks | PowerShell (microsoft.com)<\/a><\/li>\n<li>09\/14\/2018 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/\/dn896648(v=technet.10)?redirectedfrom=MSDN\">Just Enough Administration: Windows PowerShell security controls help protect enterprise data | Microsoft Docs<\/a><\/li>\n<li>08\/03\/2018 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-injection-hunter-security-auditing-for-powershell-scripts\/\">PowerShell Injection Hunter: Security Auditing for PowerShell Scripts | PowerShell (microsoft.com)<\/a><\/li>\n<li>05\/17\/2018 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-constrained-language-mode\/\">PowerShell Constrained Language Mode | PowerShell (microsoft.com)<\/a><\/li>\n<li>04\/25\/2018 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/daviddasneves\/2018\/04\/25\/prioritize-all-the-security-controls\/\">Prioritize All The Security Controls!<\/a><\/li>\n<li>05\/25\/2017 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/daviddasneves\/2017\/05\/25\/powershell-security-at-enterprise-customers\/\">PowerShell Security at Enterprise Customers<\/a><\/li>\n<li>04\/12\/2017 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/ashleymcglone\/powershell-remoting-and-kerberos-double-hop-old-problem-new-secure-solution\">PowerShell Remoting and Kerberos Double Hop: Old Problem &#8211; New Secure Solution | Microsoft Docs<\/a><\/li>\n<li>04\/10\/2017 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/powershell\/2017\/04\/10\/a-comparison-of-shell-and-scripting-language-security\/\">A Comparison of Shell and Scripting Language Security<\/a><\/li>\n<li>03\/29\/2017 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/ashleymcglone\/practical-powershell-security-enable-auditing-and-logging-with-dsc\">Practical PowerShell Security: Enable Auditing and Logging with DSC | Microsoft Docs<\/a><\/li>\n<li>08\/30\/2016 &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/ashleymcglone\/powershell-remoting-kerberos-double-hop-solved-securely\">PowerShell Remoting Kerberos Double Hop Solved Securely | Microsoft Docs<\/a><\/li>\n<li>02\/11\/2016 &#8211; <a href=\"https:\/\/adsecurity.org\/?p=2277\">PowerShell Version 5 Security Enhancements<\/a><\/li>\n<li>06\/09\/2015 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-the-blue-team\/\">PowerShell \u2665 the Blue Team<\/a><\/li>\n<li>12\/08\/2014 &#8211; <a href=\"https:\/\/www.leeholmes.com\/blog\/2014\/12\/08\/maslows-hierarchy-of-security-controls\/\">Maslow\u2019s Hierarchy of Security Controls | Precision Computing (leeholmes.com)<\/a><\/li>\n<li>12\/16\/2013 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershell-security-best-practices\/\">PowerShell Security Best Practices | PowerShell (microsoft.com)<\/a><\/li>\n<li>06\/03\/2011 &#8211; <a href=\"https:\/\/devblogs.microsoft.com\/powershell\/invoke-expression-considered-harmful\/\">Invoke-Expression considered harmful | PowerShell (microsoft.com)<\/a><\/li>\n<li>09\/30\/2008 &#8211; <a href=\"https:\/\/blogs.msdn.microsoft.com\/powershell\/2008\/09\/30\/powershells-security-guiding-principles\/\">PowerShell\u2019s Security Guiding Principles<\/a><\/li>\n<\/ul>\n<p>Laurent.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Go to English version Beaucoup de clients Premier s&rsquo;int\u00e9ressent \u00e0 la s\u00e9curit\u00e9 PowerShell (\u00e0 juste titre) et sont souvent \u00e0 la recherche de liens sur [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":2463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,19,12],"tags":[39,41,42],"class_list":["post-2976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classe","category-powershell","category-securite-security","tag-powershell","tag-securite","tag-security"],"_links":{"self":[{"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/posts\/2976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/comments?post=2976"}],"version-history":[{"count":7,"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/posts\/2976\/revisions"}],"predecessor-version":[{"id":3086,"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/posts\/2976\/revisions\/3086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/media\/2463"}],"wp:attachment":[{"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/media?parent=2976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/categories?post=2976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/laurentvanacker.com\/index.php\/wp-json\/wp\/v2\/tags?post=2976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}