winrm set winrm/config/service @{AllowUnencrypted="false"} winrm set winrm/config/service/auth @{Basic="false"} winrm set winrm/config/service/auth @{CredSSP="false"} winrm set winrm/config/service/auth @{Kerberos="true"} winrm set winrm/config/service/auth @{Certificate="true"} winrm get winrm/config/service winrm e winrm/config/listener New-SelfSignedCertificate –DnsName ([System.Net.Dns]::GetHostByName($env:computerName)).Hostname -CertStoreLocation "cert:\LocalMachine\My" -FriendlyName WinRM $Thumb = Get-ChildItem Cert:\LocalMachine\My\ | where FriendlyName -eq WinRM | select Thumbprint New-WSManInstance -ResourceURI winrm/config/Listener -SelectorSet @{address="*";transport="https"} -ValueSet @{Hostname=[System.Net.Dns]::GetHostByName(($env:computerName)).Hostname;CertificateThumbprint=$thumb.thumbprint} New-NetFirewallRule -DisplayName "Windows Remote Management (HTTPS-In)" -Name "Windows Remote Management (HTTPS-In)" -Profile Any -LocalPort 5986 -Protocol TCP New-NetFirewallRule -DisplayName "Windows Remote Management (HTTPS-In)" -Name "Windows Remote Management (HTTPS-In)" -Profile Any -LocalPort 5986 -Protocol TCP Enter-PSSession -ComputerName Win10 -UseSSL -SessionOption (New-PSSessionOption -SkipCACheck -SkipCNCheck) -Credential (Get-Credential) Configure-SMRemoting.exe -get Configure-SMRemoting.exe -enable Get-ChildItem WSMan:\localhost\Client\DefaultPorts winrm delete winrm/config/Listener?Address=*+Transport=HTTP winrm get http://schemas.microsoft.com/wbem/wsman/1/config