From 4514af7f4ab40116823b541d598f500b6cb0408e Mon Sep 17 00:00:00 2001 From: Eric Conrad Date: Tue, 30 Apr 2019 17:12:51 -0300 Subject: [PATCH] Minor update, added Set-ExecutionPolicy bypass example --- README.md | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 95974da..2659f7d 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # DeepBlueCLI -DeepBlueCLI 2.0 +DeepBlueCLI 2.01 Eric Conrad, Backshore Communications, LLC @@ -30,12 +30,18 @@ If you see this error: disabled on this system. For more information, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170.` -You must run Set-ExecutionPolicy as Administrator, here is an example: +You must run Set-ExecutionPolicy as Administrator, here is an example (this will warn every time you run a ps1 script): `Set-ExecutionPolicy RemoteSigned` +This command will bypass Set-Execution entirely: + +`Set-ExecutionPolicy Bypass` + See `get-help Set-ExecutionPolicy` for more options. +Please note that "Set-ExecutionPolicy is not a security control" (quoting @Ben0xA) + ## Examples: ### Process local Windows security event log: