Using Windows PowerShell Remoting
- By Ed Wilson
- Using Windows PowerShell remoting
- Configuring Windows PowerShell remoting
- Troubleshooting Windows PowerShell remoting
When you need to use Windows PowerShell on your local computer, it is pretty easy: You open the Windows PowerShell console or the Windows PowerShell ISE, and you run a command or a series of commands. Assuming you have rights to make the changes in the first place, it just works. But what if the change you need to make must be enacted on a hundred or a thousand computers? In the past, these types of changes required expensive specialized software packages, but with Windows PowerShell 3.0 running a command on a remote computer is as easy as running the command on your local computer; in some cases, it is even easier.
Using Windows PowerShell remoting
One of the great improvements in Windows PowerShell 3.0 is the change surrounding remoting. The configuration is easier than it was in Windows PowerShell 2.0, and in many cases, Windows PowerShell remoting “just works.” When we talk about Windows PowerShell remoting, a bit of confusion can arise because there are several different ways of running commands against remote servers. Depending on your particular network configuration and security needs, one or more methods of remoting might not be appropriate.
Classic remoting relies on protocols such as the Distributed Component Object Model (DCOM) and remote procedure call (RPC) to make connections to remote machines. Traditionally, these techniques require opening many ports in the firewall and starting various services the different cmdlets utilize. To find the Windows PowerShell cmdlets that natively support remoting, use the Get-Help cmdlet. Specify a value of computername for the parameter of the Get-Help cmdlet. This command produces a nice list of all cmdlets that have native support for remoting. The following example shows the command and associated output (this command does not display all cmdlets with support for computername unless the associated modules are preloaded):
PS C:\> Get-Help * -Parameter computername | sort name | ft name, synopsis -auto -wrap Name Synopsis ---- -------- Add-Computer Add the local computer to a domain or workgroup. Add-Printer Adds a printer to the specified computer. Add-PrinterDriver Installs a printer driver on the specified computer. Add-PrinterPort Installs a printer port on the specified computer. <…Output Truncated …>
Some of the cmdlets provide the ability to specify credentials. This allows you to use a different user account to make the connection and retrieve the data.
The following example shows this technique of using the computername and the credential parameters in a cmdlet:
PS C:\> Get-WinEvent -LogName application -MaxEvents 1 -ComputerName ex1 -Credential nwtraders\administrator TimeCreated ProviderName Id Message ----------- ------------ -- ------- 7/1/2012 11:54:14 AM MSExchange ADAccess 2080 Process MAD.EXE (…
However, as mentioned earlier, use of these cmdlets often requires opening holes in the firewall or starting specific services. By default, these types of cmdlets fail when run against remote machines that have not relaxed access rules. The following example shows this type of error:
PS C:\> Get-WinEvent -LogName application -MaxEvents 1 -ComputerName dc1 -Credential nwtraders\administrator Get-WinEvent : The RPC server is unavailable At linE:1 chaR:1 + Get-WinEvent -LogName application -MaxEvents 1 -ComputerName dc1 -Credential iam … + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : NotSpecifieD: (:) [Get-WinEvent], EventLogException + FullyQualifiedErrorId : System.Diagnostics.Eventing.Reader.EventLogException, Microsoft.PowerShell.Commands.GetWinEventCommand
Other cmdlets, such as Get-Service or Get-Process, do not have a credential parameter, and therefore the command impersonates the logged-on user, as shown in the following example:
PS C:\> Get-Service -ComputerName hyperv -Name bits Status Name DisplayName ------ ---- ----------- Running bits Background Intelligent Transfer Ser… PS C:\>
Just because the cmdlet does not support alternative credentials does not mean the cmdlet must impersonate the logged-on user. Holding down the Shift key and right-clicking on the Windows PowerShell icon brings up an action menu that allows you to run the program as a different user. When you use the Run as different user dialog box, you have alternative credentials available for Windows PowerShell cmdlets that do not support the credential parameter.