From the course: PowerShell for SQL Server Administration
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Removing over HTTP ports - PowerShell Tutorial
From the course: PowerShell for SQL Server Administration
Removing over HTTP ports
- [Instructor] So let's talk a little bit about how this remoting works. That's where the communication is going to happen. So we've got a couple of options for using remoting and how it's going to talk to the machines. So, by default, PowerShell's going to use WMI to communicate between those machines. So between the machine you're running the scripts on and the machine you're remoting into. So WMI is going to use port 5985 and 5986 by default. Obviously, you can change that and you can tweak firewall settings along that if you want to. If, for some reason, you can't use WMI to open those, so maybe you've got machines in your DMZ that you're tryin' to remote into and you can't have connectivity over the WMI ports into the machines in your DMZ. What you can do is you can specify to use HTTP for remoting, instead of WMI. So those HTTP calls, those are going to go over ports 80 and 443 just like normal HTTP traffic. And odds are those are going to be open to whatever boxes you're tryin'…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
What is remoting?5m 18s
-
(Locked)
Removing over HTTP ports2m 11s
-
(Locked)
Enabling remoting via PowerShell3m 15s
-
(Locked)
Enabling remoting via GPO3m 16s
-
(Locked)
Starting a remote session1m 59s
-
(Locked)
Ending a remote session1m 31s
-
(Locked)
Using alternate credentials for remoting3m 27s
-
(Locked)
Invoking a remote command2m 48s
-
(Locked)
-