Hello together,
many people are afraid of using Powershell remoting, because they think it is very unsafe.
Just take a moment and read this:
The improvements in WMF 5.0 (or WMF 4.0 with KB3000850) make PowerShell the worst tool of choice for a hacker when you enable script block logging and system-wide transcription. Hackers will leave fingerprints everywhere, unlike popular CMD utilities. For this reason, PowerShell should be the only tool you allow for remote administration. These features allow you to answer the classic questions who, what, when, where, and how for activities on your servers.
Technet Link
PowerShell Remoting Security Considerations
New security documentation from the PowerShell team. This is a start, and it will continue to be updated. Give this link to your InfoSec people who need more information.
https://msdn.microsoft.com/en-us/powershell/scripting/setup/winrmsecurity
PowerShell ♥ the Blue Team
Whitepaper by Lee Holmes “Scripting Security and Protection Advances in Windows 10” (PowerShell 5).
Give this to your InfoSec people, your manager, and your grandmother. Then implement it.
https://blogs.msdn.microsoft.com/powershell/2015/06/09/powershell-the-blue-team/
Best regards,
David