[go: up one dir, main page]

0% found this document useful (0 votes)
4 views2 pages

Powershell Remoting - Workgroup

This document provides instructions for setting up non-Active Directory Remote PowerShell access. It includes cmdlets for enabling PowerShell remoting, allowing unencrypted traffic, configuring WinRM, and managing firewall settings. Additionally, it outlines how to enter and exit a remote PowerShell session to execute commands on a remote machine.

Uploaded by

Kyle Rumble
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

Powershell Remoting - Workgroup

This document provides instructions for setting up non-Active Directory Remote PowerShell access. It includes cmdlets for enabling PowerShell remoting, allowing unencrypted traffic, configuring WinRM, and managing firewall settings. Additionally, it outlines how to enter and exit a remote PowerShell session to execute commands on a remote machine.

Uploaded by

Kyle Rumble
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Non-Active Directory Remote Powershell

SETUP Powershell Remote


Enable Powershell to allow remote sessions on the computer you want to remotely
access.

cmdlet: Enable-PSRemoting -Force

Allow unencrypted traffic since the computers are not in trusted domain.

cmdlet: Set-Item WSMan:\localhost\Client\AllowUnencrypted $true

Allow basic authentication (input username and password)

cmdlet: Set-Item WSMan:\localhost\Service\Auth\Basic $true

Configure the WinRM service (Windows Remote Management)

cmdlet: winrm quickconfig

Disable the firewall or add a firewall rule to allow WinRM traffic

Search > Windows Security > Firewall & Network protection (disable public,
private, and domain)

Search > Windows Defender Firewall with Advanced Security (allow WinRM
traffic)
If your Password is not Password01 set your credentials using:

cmdlet: $cred = Get-Credential -UserName “WORKGROUP-PC\LocalUser”

This will prompt you to supply the credentials for the remote computer you are
trying to access.

ENTER Remote Powershell Session


Connect to the Remote machine from your local computer

cmdlet: Enter-PSSession -ComputerName REMOTE-MACHINE

Run neccessary commands (these will be executed on the remote computer)

Example: Get-Process

List all running processes on the target computer

EXIT Remote Powershell Session


cmdlet: Exit-PSSession

You might also like