Chapter 14. Security alert!
By now, you’ve probably started to get a feel for how powerful PowerShell can be—and started wondering if maybe all of that power might be a security problem. Of course it might be! My goal in this chapter is to help you understand exactly how PowerShell can impact security in your environment, and to show you how PowerShell can be configured to provide precisely the balance of security and power that you require.
When PowerShell was introduced in late 2006, Microsoft didn’t exactly have a spotless record on security and scripting. After all, VBScript and Windows Script Host (WSH) were probably two of the most popular virus and malware vectors of the time, serving as entry points for such popular viruses as “I Love You,” “Melissa,” and many others. When the PowerShell team announced that they were creating a new command-line shell that would offer unprecedented power and functionality, and would offer scripting capabilities, I’m sure alarms went off, people were evacuated from buildings, and everyone gnashed their teeth in dismay.