PowerShell is fast becoming a must-have skill as Microsoft makes it the focus of its management strategy for Windows Server, Azure, and Azure Stack. And as if that wasn’t enough, PowerShell Remoting is enabled by default in Windows Server 2012 R2 and is the most secure way to manage Windows Server.

In this webinar, Windows & IT Security Expert, Russell Smith, will explain how to configure custom PowerShell Remoting endpoints so that users can use PowerShell Remoting without needing administrative privileges on the target server. At the end of the session you will be able to:

  • Understand PowerShell Remoting security
  • Configure custom endpoints
  • Establish PowerShell Remoting sessions without using administrator credentials
  • Enable HTTPS using a self-signed certificate
  • Use Windows Admin Center to manage Windows Server securely using WinRM and PowerShell Remoting
Profile photo of Russell Smith

Russell Smith

Security Instructor

Russell Smith specializes in the management and security of Microsoft-based IT systems. In addition to being a Contributing Editor at the Petri IT Knowledgebase and is an instructor at Pluralsight. Russell has more than 13 years of experience in IT, and has written a book on Windows security, co-authored one for Microsoft?s Official Academic Course (MOAC) series, and was a regular contributor at Windows IT Professional magazine.