PowerShell Logo Small

Enable-PSRemoting



This is the built-in help made by Microsoft for the command 'Enable-PSRemoting', in PowerShell version 4 - as retrieved from Windows version 'Microsoft Windows 8.1 Enterprise' PowerShell help files on 2016-06-23.

For PowerShell version 3 and up, where you have Update-Help, this command was run just before creating the web pages from the help files.

SYNOPSIS

Configures the computer to receive remote commands.

SYNTAX


Enable-PSRemoting [-Force] [-SkipNetworkProfileCheck] [-Confirm] [-WhatIf] [<CommonParameters>]



Search powershellhelp.space

DESCRIPTION


The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology.


On Windows Server® 2012, Windows PowerShell remoting is enabled by default. You can use Enable-PSRemoting to enable Windows PowerShell remoting on other supported ver
sions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled.


You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands. Because the config
uration activates listeners, it is prudent to run it only where it is needed.


Beginning in Windows PowerShell 3.0, the Enable-PSRemoting cmdlet can enable Windows PowerShell remoting on client versions of Windows when the computer is on a publi
c network. For more information, see the description of the SkipNetworkProfileCheck parameter.


The Enable-PSRemoting cmdlet performs the following operations:


-- Runs the Set-WSManQuickConfig cmdlet, which performs the following tasks:


----- Starts the WinRM service.


----- Sets the startup type on the WinRM service to Automatic.


----- Creates a listener to accept requests on any IP address.


----- Enables a firewall exception for WS-Management communications.


----- Registers the Microsoft.PowerShell and Microsoft.PowerShell.Workflow session configurations, if it they are not already registered.


----- Registers the Microsoft.PowerShell32 session configuration on 64-bit computers, if it is not already registered.


----- Enables all session configurations.


----- Changes the security descriptor of all session configurations to allow remote access.


----- Restarts the WinRM service to make the preceding changes effective.


To run this cmdlet, start Windows PowerShell with the "Run as administrator" option.


CAUTION: On systems that have both Windows PowerShell 3.0 and the Windows PowerShell 2.0 engine, do not use Windows PowerShell 2.0 to run the Enable-PSRemoting and Di
sable-PSRemoting cmdlets. The commands might appear to succeed, but the remoting is not configured correctly. Remote commands, and later attempts to enable and disabl
e remoting, are likely to fail.



<

RELATED LINKS

Online Version: http://go.microsoft.com/fwlink/p/?linkid=289576
Disable-PSSessionConfiguration
Enable-PSSessionConfiguration
Get-PSSessionConfiguration
Register-PSSessionConfiguration
Set-PSSessionConfiguration
Disable-PSRemoting
WSMan Provider
about_Remote
about_Session_Configurations

REMARKS

<

Examples


-------------------------- EXAMPLE 1 --------------------------

PS C:\>Enable-PSRemoting



This command configures the computer to receive remote commands.








-------------------------- EXAMPLE 2 --------------------------

PS C:\>Enable-PSRemoting -Force



This command configures the computer to receive remote commands. It uses the Force parameter to suppress the user prompts.








Example 3

PS C:\>Enable-PSRemoting -SkipNetworkProfileCheck -Force

PS C:\>Set-NetFirewallRule –Name "WINRM-HTTP-In-TCP-PUBLIC" –RemoteAddress Any



This example shows how to allow remote access from public networks on client versions of Windows. Before using these commands, analyze the security setting and verify
that the computer network will be safe from harm.

The first command enables remoting in Windows PowerShell. By default, this creates network rules that allow remote access from private and domain networks. The comman
d uses the SkipNetworkProfileCheck parameter to allow remote access from public networks in the same local subnet. The command uses the Force parameter to suppress co
nfirmation messages.

The SkipNetworkProfileCheck parameter has no effect on server version of Windows, which allow remote access from public networks in the same local subnet by default.

The second command eliminates the subnet restriction. The command uses the Set-NetFirewallRule cmdlet in the NetSecurity module to add a firewall rule that allows rem
ote access from public networks from any remote location, including locations in different subnets.