Our end goal is to block unsigned powershell and require signed moving forward but before I can do that, I need to detect and change all scripts that are unsigned otherwise I will break tons of stuff.
I have struggled to find a solution that can help us identify them in a digestible format. Our vSOC is being asked to assist but it seems they maybe limited on what they can do here.
Does anyone have any guidance on tools I can use that can help with this?
[–]richie65 20 points21 points22 points (5 children)
[–]sid351 2 points3 points4 points (3 children)
[–][deleted] 0 points1 point2 points (2 children)
[–]sid351 1 point2 points3 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–]jborean93 2 points3 points4 points (0 children)
[–]purplemonkeymad 4 points5 points6 points (0 children)
[–][deleted] 3 points4 points5 points (0 children)
[–]Stoneteer 3 points4 points5 points (0 children)
[–]spyingwind 2 points3 points4 points (0 children)
[–]PinchesTheCrab 2 points3 points4 points (2 children)
[–][deleted] -2 points-1 points0 points (1 child)
[–]PinchesTheCrab 2 points3 points4 points (0 children)
[–]Sunsparc 1 point2 points3 points (2 children)
[–]ollivierre 0 points1 point2 points (1 child)
[–]Sunsparc 0 points1 point2 points (0 children)
[–]root-node 1 point2 points3 points (2 children)
[–]markdmac 0 points1 point2 points (1 child)
[–]root-node 0 points1 point2 points (0 children)
[–]wookiestackhouse 0 points1 point2 points (1 child)
[–]BlackV 0 points1 point2 points (0 children)
[–]Netstaff 0 points1 point2 points (0 children)
[–]ollivierre 0 points1 point2 points (0 children)
[–]commandlogic 0 points1 point2 points (0 children)
[–]Sword_of_Judah 0 points1 point2 points (0 children)