Arising from microsoft-hyper-v-f25/powershell-direct ... 92185.html
There is a requirement for ongoing access to the admin$ share on the hypervisor / GIP for PowerShell Direct to work. This should not be needed once all components are deployed. Admin$ was firewalled off as part of hardening the hypervisor (which is also GIP) prior to production. Everything else in VBR has worked fine, but it broke PowerShell Direct.
IMO Nothing in Veeam should require ongoing access to admin$ shares or other attack vectors.
Thanks
-
- Veteran
- Posts: 563
- Liked: 173 times
- Joined: Nov 15, 2019 4:09 pm
- Full Name: Alex Heylin
- Contact:
-
- Veeam Software
- Posts: 3815
- Liked: 643 times
- Joined: Aug 28, 2013 8:23 am
- Full Name: Petr Makarov
- Location: Prague, Czech Republic
- Contact:
Re: [Enhancement Request] Stop needing Admin$ access to use PowerShell Direct
Hi Alex,
For some reason, I overlooked the topic you're referring to. I cannot remember why we have the requirement for admin$ on the hypervisor for PowerShell direct, please let me have some time to clarify this part of our logic and update this topic.
Thanks!
For some reason, I overlooked the topic you're referring to. I cannot remember why we have the requirement for admin$ on the hypervisor for PowerShell direct, please let me have some time to clarify this part of our logic and update this topic.
Thanks!
-
- Veteran
- Posts: 563
- Liked: 173 times
- Joined: Nov 15, 2019 4:09 pm
- Full Name: Alex Heylin
- Contact:
Who is online
Users browsing this forum: No registered users and 1 guest