Just some links I found on PowerShell remoting security –
- http://digital-forensics.sans.org/blog/2013/09/03/the-power-of-powershell-remoting (SANS – The Power of PowerShell Remoting)
- https://www.sans.org/reading-room/whitepapers/tools/power-implications-enabling-powershell-remoting-enterprise-36542 (SANS – The Power and Implications of Enabling PowerShell Remoting Across the Enterprise)
- https://channel9.msdn.com/Events/TechEd/NorthAmerica/2012/WCL403 (PowerShell Remoting in Depth)
- https://4sysops.com/archives/powershell-remoting-without-administrator-rights/ (PowerShell Remoting without administrator rights)
- https://4sysops.com/archives/restricting-the-rights-of-powershell-users-with-a-constrained-session-configuration/ (Restricting the rights of PowerShell users with a constrained session configuration)
- https://4sysops.com/archives/constrained-powershell-endpoints-visible-cmdlets-session-types-and-language-modes/ (Constrained PowerShell endpoints – Visible cmdlets, session types, and language modes)