Photo Ashley Collinge's face

Secure Remote PowerShell over WinRM Deployment on Windows Machines

Remote Powershell (over the WinRm protocol) is a great method to manage and monitor your Windows fleet securely and easily from a central location. I’ve summarised below how I would deploy the WinRM configurations to your Windows servers so they can be accessed remotely by monitoring and management platforms, and much more.

This is a very loose set of instructions to configure HTTPS WinRM for Remote Powershell and will require you to Google parts to fully understand what to do.

General Requirements

Deployment

  1. Create a new Active Directory account to be used as a Service Account for connections. If it’s being used for monitoring your could use Svc.Monitoring@domain.tld
  2. Create a new Group Policy and ensure the below configuration items are present:
  1. Ensure you have created appropriate forward/reverse DNS records on your AD domain controllers to allow kerberos authentication
  2. Create a new certificate template which includes the DNS name of the device in the subject. Change the security options so ‘Domain Computers’ automatically enrol and ‘autoenrol’ the certificate. Ensure you have actually deployed the template.
  3. You should now be able to connect to the remote machine from your management server using kerberos authentication and remote powershell over WinRM.

Recent Posts

Open Source Software I use in my Homelab
Tue, 16 Sep 2025
Secure Remote PowerShell over WinRM Deployment on Windows Machines
Tue, 16 Sep 2025
Static Website Deployment (AWS S3 & CloudFront)
Fri, 13 Aug 2021
Jessie
Thu, 01 Jul 2021
Jessie the Dog
Camera: Canon 250D
Resolution: 6000 x 4000
Exposure Time: 1/600
Focal Length: 250mm
F/stop: f/5.6
ISO: 200