Minor update, added Set-ExecutionPolicy bypass example
This commit is contained in:
10
README.md
10
README.md
@ -1,6 +1,6 @@
|
||||
# DeepBlueCLI
|
||||
|
||||
DeepBlueCLI 2.0
|
||||
DeepBlueCLI 2.01
|
||||
|
||||
Eric Conrad, Backshore Communications, LLC
|
||||
|
||||
@ -30,12 +30,18 @@ If you see this error:
|
||||
disabled on this system. For more information, see about_Execution_Policies at
|
||||
http://go.microsoft.com/fwlink/?LinkID=135170.`
|
||||
|
||||
You must run Set-ExecutionPolicy as Administrator, here is an example:
|
||||
You must run Set-ExecutionPolicy as Administrator, here is an example (this will warn every time you run a ps1 script):
|
||||
|
||||
`Set-ExecutionPolicy RemoteSigned`
|
||||
|
||||
This command will bypass Set-Execution entirely:
|
||||
|
||||
`Set-ExecutionPolicy Bypass`
|
||||
|
||||
See `get-help Set-ExecutionPolicy` for more options.
|
||||
|
||||
Please note that "Set-ExecutionPolicy is not a security control" (quoting @Ben0xA)
|
||||
|
||||
## Examples:
|
||||
|
||||
### Process local Windows security event log:
|
||||
|
Reference in New Issue
Block a user