Skip to content

Commit 107a77f

Browse files
authored
Add link to security config doc for WinRM (#12569)
1 parent a9cf20c commit 107a77f

File tree

1 file changed

+13
-11
lines changed

1 file changed

+13
-11
lines changed

reference/docs-conceptual/security/remoting/WinRM-Security.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ recommendations, and best practices when using PowerShell Remoting.
1212

1313
## What is PowerShell Remoting?
1414

15-
PowerShell Remoting uses [Windows Remote Management (WinRM)][04] to allow users to run PowerShell
15+
PowerShell Remoting uses [Windows Remote Management (WinRM)][05] to allow users to run PowerShell
1616
commands on remote computers. WinRM is the Microsoft implementation of the
17-
[Web Services for Management (WS-Management)][05] protocol. You can find more information about
18-
using PowerShell Remoting at [Running Remote Commands][08].
17+
[Web Services for Management (WS-Management)][07] protocol. You can find more information about
18+
using PowerShell Remoting at [Running Remote Commands][09].
1919

2020
PowerShell Remoting isn't the same as using the **ComputerName** parameter of a cmdlet to run it on
2121
a remote computer, which uses Remote Procedure Call (RPC) as its underlying protocol.
@@ -38,7 +38,8 @@ PowerShell Remoting to all connections on a public network.
3838

3939
> [!WARNING]
4040
> The firewall rule for public networks is meant to protect the computer from potentially malicious
41-
> external connection attempts. Use caution when removing this rule.
41+
> external connection attempts. Use caution when removing this rule. For more information about
42+
> configuring WinRM, see [Installation and configuration for Windows Remote Management][04].
4243
4344
## Process isolation
4445

@@ -126,12 +127,12 @@ it can't access other computers and services on the user's behalf. This is known
126127
problem_.
127128

128129
There are several ways to avoid this problem. For descriptions of these methods, and the pros and
129-
cons of each, see [Making the second hop in PowerShell Remoting][07].
130+
cons of each, see [Making the second hop in PowerShell Remoting][08].
130131

131132
## References
132133

133-
- [Windows Remote Management (WinRM)][04]
134-
- [Web Services for Management (WS-Management)][05]
134+
- [Windows Remote Management (WinRM)][05]
135+
- [Web Services for Management (WS-Management)][07]
135136
- [2.2.9.1 Encrypted Message Types][01]
136137
- [Kerberos][02]
137138
- [NTLM authentication protocol][03]
@@ -141,8 +142,9 @@ cons of each, see [Making the second hop in PowerShell Remoting][07].
141142
[01]: /openspecs/windows_protocols/ms-wsmv/58421aa4-861a-4410-831a-c999f094cdb7
142143
[02]: /windows/win32/secauthn/microsoft-kerberos
143144
[03]: /windows/win32/secauthn/microsoft-ntlm
144-
[04]: /windows/win32/winrm/portal
145-
[05]: https://www.dmtf.org/sites/default/files/standards/documents/DSP0226_1.2.0.pdf
145+
[04]: /windows/win32/winrm/installation-and-configuration-for-windows-remote-management
146+
[05]: /windows/win32/winrm/portal
146147
[06]: https://www.blackhat.com/docs/us-14/materials/us-14-Kazanciyan-Investigating-Powershell-Attacks-WP.pdf
147-
[07]: PS-remoting-second-hop.md
148-
[08]: running-remote-commands.md
148+
[07]: https://www.dmtf.org/sites/default/files/standards/documents/DSP0226_1.2.0.pdf
149+
[08]: PS-remoting-second-hop.md
150+
[09]: running-remote-commands.md

0 commit comments

Comments
 (0)