But I ran Set-Executionpolicy unrestricted, what is going on?
Hello All,
So first let's be clear, if you can run with a properly set execution policy using only signed scripts then I will recommend that you keep that way. If you want to learn how to sign your scripts here is a great blog that should get you started https://www.hanselman.com/blog/SigningPowerShellScripts.aspx. But if you are like all my customers and I'm assuming 99% of the world then you don't have the time to get all your scripts that will run against Production signed before you need to run them.\
And with my customer that is exactly the case, we needed to run several of my install scripts which are not signed (I have one central script that uses Start-Process to start other scripts), and he trusts me so he was comfortable running the following command.
Set-ExecutionPolicy unrestricted
Then when he went to run the script he was getting this prompt several times
Security Warning
Run only scripts that you trust. While scripts from the
Internet can be useful, this script can potentially harm your computer. Do you want to run
E:\InstallFiles\install Scripts\SharePointServers.ps1?
[D] Do not run [R] Run once [S] Suspend [?] Help (default is "D"):
WHAT? But I set the execution policy to unrestricted...ran the following command just to check
Get-ExecutionPolicy
Yup, it was set just I had expected. So started to dig and try to figure what is going on and discovered in fact by design PowerShell will by design prompt you when you run a script using an execution policy of unrestricted (https://technet.microsoft.com/en-us/library/dd347641) and what you have to do is run the command
Set-ExecutionPolicy Bypass
What this command does is set the following in the security of PowerShell for the local server
- Nothing is blocked and there are no warnings or prompts.
- This execution policy is designed for configurations in which a Windows PowerShell script is built in to a larger application or for configurations in which Windows PowerShell is the foundation for a program that has its own security model.
So lesson learned unrestricted is not enough if you plan to run more complex scripts that open other PowerShell shells.
To learn more about setting execution policies start reading here https://www.techrepublic.com/blog/datacenter/set-the-powershell-execution-policy-via-group-policy/3305
Comments
- Anonymous
January 01, 2003
The comment has been removed- Anonymous
May 04, 2017
The comment has been removed
- Anonymous
- Anonymous
June 14, 2014
Yet another stupid pointless poorly documented part of powershell. Nothing makes any logical sense. Unrestricted means exactly what it says. - Anonymous
April 18, 2016
Yeah, cause lets make everything harder than it needs to be without actually making it more secure.Well done. - Anonymous
January 03, 2017
There appears to be a bug in powershell where when setting unrestricted does not truly set it properly. If you set to Bypass and then back to Unrestricted it should work just fine. - Anonymous
March 01, 2017
I am running powershell.exe -ExecutionPolicy ByPass -file ".\filename.ps1" and I still get the warning. What gives?