Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/juju4/ansible-win-powershell
Configure Windows Powershell security with ansible
https://github.com/juju4/ansible-win-powershell
Last synced: 12 days ago
JSON representation
Configure Windows Powershell security with ansible
- Host: GitHub
- URL: https://github.com/juju4/ansible-win-powershell
- Owner: juju4
- License: bsd-2-clause
- Created: 2018-02-26T01:06:59.000Z (almost 7 years ago)
- Default Branch: main
- Last Pushed: 2023-08-05T16:50:38.000Z (over 1 year ago)
- Last Synced: 2024-11-07T17:40:50.510Z (2 months ago)
- Language: PowerShell
- Size: 69.3 KB
- Stars: 1
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
[![Appveyor - Master](https://ci.appveyor.com/api/projects/status/1033u05y7ymce0w5/branch/master?svg=true)](https://ci.appveyor.com/project/juju4/ansible-win-powershell/branch/master)
[![Appveyor - Devel](https://ci.appveyor.com/api/projects/status/1033u05y7ymce0w5/branch/devel?svg=true)](https://ci.appveyor.com/project/juju4/ansible-win-powershell/branch/devel)# Windows powershell ansible role
Ansible role to setup powershell security on Windows system (logging, profile...).
## Requirements & Dependencies
### Ansible
It was tested on the following versions:
* 2.4 (required since s/include:/include_tasks:/)
* up to 2.7
* 4.10.0
* 5.3.0### Operating systems
Tested in Appveyor
## Example Playbook
Just include this role in your list.
For example```
- host: all
roles:
- juju4.win_powershell
```Run
```
$ ansible -i inventory -m win_ping win --ask-pass
$ ansible-playbook -i inventory --limit win site.yml
```## Variables
See defaults/main.yml for full scope
## Continuous integration
This role has a travis basic test (for github, syntax check only), Appveyor test and a Vagrantfile (test/vagrant).
```
$ cd /path/to/roles/juju4.win_powershell/test/vagrant
$ vagrant up
$ vagrant provision
$ vagrant destroy
$ ansible -i .vagrant/provisioners/ansible/inventory/vagrant_ansible_inventory -m win_ping -e ansible_winrm_server_cert_validation=ignore -e ansible_ssh_port=55986 all
```## Troubleshooting & Known issues
## FAQ
* Pay attention to [Powershell v6 Core](http://www.labofapenetrationtester.com/2018/01/powershell6.html)! Not covered currently.
* Don't use constrained mode or test appropriately as it will likely break ansible and most powershell dependencies.
* Reference links
* PowerShell5, WMF5. regedit or GPO. https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.html
* https://blogs.msdn.microsoft.com/powershell/2015/06/09/powershell-the-blue-team/
* https://www.blackhat.com/docs/us-14/materials/us-14-Kazanciyan-Investigating-Powershell-Attacks-WP.pdf
* http://fr.slideshare.net/Hackerhurricane/ask-aalware-archaeologist/25
* http://www.asd.gov.au/publications/protect/securing-powershell.htm
* https://www.leeholmes.com/blog/2017/03/17/detecting-and-preventing-powershell-downgrade-attacks/
* https://blogs.msdn.microsoft.com/daviddasneves/2017/05/25/powershell-security-at-enterprise-customers/
* https://www.trendmicro.com/vinfo/us/security/news/security-technology/security-101-the-rise-of-fileless-threats-that-abuse-powershell
* Forward EID 4104 to SIEM at least. https://msdn.microsoft.com/en-us/library/cc748890.aspx
* https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf
* https://dfir.it/blog/2018/05/08/down-the-rabbit-hole-with-packaged-powershell-scripts/* Signing powershell scripts
* https://blogs.technet.microsoft.com/heyscriptingguy/2010/06/17/hey-scripting-guy-how-can-i-sign-windows-powershell-scripts-with-an-enterprise-windows-pki-part-2-of-2/
* https://redmad.com/pki/sign-powershell-scripts-enterprise-pki/## License
BSD 2-clause