Accessing Remote Network Resources

 When authenticating connections with username/password, the server will attempt to logon the user to verify his/her credentials. By default, the server will attempt what is known as a “Network Logon”, which is more secure because it restricts the authenticated credentials …

Enable FIPS 140-2 cryptography compliance.

 PowerShell Server complies with Federal Information Processing Standards (FIPS 140-2) cryptography requirements, enabling governments agencies to meet the strict security and compliance guidelines defined by NIST. This article will explain how to enable FIPS compliant mode…

Getting Started

 Introduction PowerShell Server is a full-featured SSH 2.0 server that enables Windows Desktops and Servers with a secure remote entry point to a Windows PowerShell Host. This gives users the power to securely manage Windows remotely through PowerShell from any standard SSH…

Heartbleed OpenSSL vulnerability

 Recently the OpenSSL project announced a serious security vulnerability in the OpenSSL libraries nicknamed “Heartbleed”. The Heartbleed bug is a major vulnerability in the popular OpenSSL software library that compromises the integrity of data secured through SSL. PowerShe…

PowerShell ASP: Hosting PowerShell ASP in IIS

 Hosting PowerShell ASP in IIS is a very simple and straight-forward process. This article uses IIS 7.5, but the process is very similar for other versions of IIS. The first step is to open IIS and expand your Server, then site. Next, right-click the site and select “Add Ap…