Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

WIN RM Services in domain environment

Posted on 2014-12-04
3
Medium Priority
?
181 Views
Last Modified: 2014-12-10
What is the security issues by enabling WINRM services in the domain?
Any special configuration needs to be considered before enabling WINRM?
0
Comment
Question by:asnagesh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 71

Accepted Solution

by:
Qlemo earned 2000 total points
ID: 40482039
Remoting only works with admin privileges (by default). Within a domain, Kerberos is used to authenticate machines - domain members are trusted and may contact WinRM (but not run scripts yet - that depends on the user priv's).
BTW, on server OS WinRM is enabled by default.
So, with the default settings, I cannot see any risk in enabling WinRM.
0
 

Author Comment

by:asnagesh
ID: 40490741
I have enabled WINRM
0
 

Author Closing Comment

by:asnagesh
ID: 40490742
Good Suggestion
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
Check out what's been happening in the Experts Exchange community.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question