![]() ![]() I am really hoping I can get the helpdesk to perform this task when needed but I want to ensure management that the helpdesk will not be able to "take advantage" of elevated permissions anywhere else by copying the script or editing it to meet IS there another way I can use a non-administrator account to run this script without actually being able to edit or copy any info from it? If this is so unsecure, why store encrypted passwords in this manner anyway. Thinking they can just copy this script and "change" the remote command to do some nasty stuff to our IIS server. but "management" thinks this is a security risk. Read-Host -assecurestring | ConvertFrom-Securestring | Out-File ![]() To get the secure text file, I used the command. Invoke-command -computername MYSERVER -scriptblock ![]() I can run the following from a powershell command line myself just fine and even script it for easy execution. I have several app pools in my IIS setup that need a swift kick (recycle) once in awhile. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |