@@ -12,10 +12,10 @@ recommendations, and best practices when using PowerShell Remoting.
1212
1313## What is PowerShell Remoting?
1414
15- PowerShell Remoting uses [ Windows Remote Management (WinRM)] [ 04 ] to allow users to run PowerShell
15+ PowerShell Remoting uses [ Windows Remote Management (WinRM)] [ 05 ] to allow users to run PowerShell
1616commands on remote computers. WinRM is the Microsoft implementation of the
17- [ Web Services for Management (WS-Management)] [ 05 ] protocol. You can find more information about
18- using PowerShell Remoting at [ Running Remote Commands] [ 08 ] .
17+ [ Web Services for Management (WS-Management)] [ 07 ] protocol. You can find more information about
18+ using PowerShell Remoting at [ Running Remote Commands] [ 09 ] .
1919
2020PowerShell Remoting isn't the same as using the ** ComputerName** parameter of a cmdlet to run it on
2121a remote computer, which uses Remote Procedure Call (RPC) as its underlying protocol.
@@ -38,7 +38,8 @@ PowerShell Remoting to all connections on a public network.
3838
3939> [ !WARNING]
4040> The firewall rule for public networks is meant to protect the computer from potentially malicious
41- > external connection attempts. Use caution when removing this rule.
41+ > external connection attempts. Use caution when removing this rule. For more information about
42+ > configuring WinRM, see [ Installation and configuration for Windows Remote Management] [ 04 ] .
4243
4344## Process isolation
4445
@@ -126,12 +127,12 @@ it can't access other computers and services on the user's behalf. This is known
126127problem_ .
127128
128129There are several ways to avoid this problem. For descriptions of these methods, and the pros and
129- cons of each, see [ Making the second hop in PowerShell Remoting] [ 07 ] .
130+ cons of each, see [ Making the second hop in PowerShell Remoting] [ 08 ] .
130131
131132## References
132133
133- - [ Windows Remote Management (WinRM)] [ 04 ]
134- - [ Web Services for Management (WS-Management)] [ 05 ]
134+ - [ Windows Remote Management (WinRM)] [ 05 ]
135+ - [ Web Services for Management (WS-Management)] [ 07 ]
135136- [ 2.2.9.1 Encrypted Message Types] [ 01 ]
136137- [ Kerberos] [ 02 ]
137138- [ NTLM authentication protocol] [ 03 ]
@@ -141,8 +142,9 @@ cons of each, see [Making the second hop in PowerShell Remoting][07].
141142[ 01 ] : /openspecs/windows_protocols/ms-wsmv/58421aa4-861a-4410-831a-c999f094cdb7
142143[ 02 ] : /windows/win32/secauthn/microsoft-kerberos
143144[ 03 ] : /windows/win32/secauthn/microsoft-ntlm
144- [ 04 ] : /windows/win32/winrm/portal
145- [ 05 ] : https://www.dmtf.org/sites/default/files/standards/documents/DSP0226_1.2.0.pdf
145+ [ 04 ] : /windows/win32/winrm/installation-and-configuration-for-windows-remote-management
146+ [ 05 ] : /windows/win32/winrm/portal
146147[ 06 ] : https://www.blackhat.com/docs/us-14/materials/us-14-Kazanciyan-Investigating-Powershell-Attacks-WP.pdf
147- [ 07 ] : PS-remoting-second-hop.md
148- [ 08 ] : running-remote-commands.md
148+ [ 07 ] : https://www.dmtf.org/sites/default/files/standards/documents/DSP0226_1.2.0.pdf
149+ [ 08 ] : PS-remoting-second-hop.md
150+ [ 09 ] : running-remote-commands.md
0 commit comments