Trusted Hosts

This policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses the list specified in TrustedHostsList to determine if the destination host is a trusted entity. If you enable this policy setting the WinRM client uses the list specified in TrustedHostsList to determine if the destination host is a trusted entity. The WinRM client uses this list when neither HTTPS nor Kerberos are used to authenticate the identity of the host. If you disable or do not configure this policy setting and the WinRM client needs to use the list of trusted hosts you must configure the list of trusted hosts locally on each computer.

Allow remote server management through WinRM

This policy setting allows you to manage whether the Windows Remote Management (WinRM) service automatically listens on the network for requests on the HTTP transport over the default HTTP port. If you enable this policy setting the WinRM service automatically listens on the network for requests on the HTTP transport over the default HTTP port. To allow WinRM service to receive requests over the network configure the Windows Firewall policy setting with exceptions for Port 5985 (default port for HTTP). If you disable or do not configure this policy setting the WinRM service will not respond to requests from a remote computer regardless of whether or not any WinRM listeners are configured. The service listens on the addresses specified by the IPv4 and IPv6 filters. The IPv4 filter specifies one or more ranges of IPv4 addresses and the IPv6 filter specifies one or more ranges of IPv6addresses. If specified the service enumerates the available IP addresses on the computer and uses only addresses that fall within one of the filter ranges. You should use an asterisk (*) to indicate that the service listens on all available IP addresses on the computer. When * is used other ranges in the filter are ignored. If the filter is left blank the service does not listen on any addresses. For example if you want the service to listen only on IPv4 addresses leave the IPv6 filter empty. Ranges are specified using the syntax IP1-IP2. Multiple ranges are separated using “” (comma) as the delimiter. Example IPv4 filters: -> n2. 0. 0. 1-2. 0. 0. 20 24. 0. 0. 1-24. 0. 0. 22Example IPv6 filters: -> n3FFE:FFFF:7654:FEDA:1245:BA98:0000:0000-3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562

Turn On Compatibility HTTP Listener

This policy setting turns on or turns off an HTTP listener created for backward compatibility purposes in the Windows Remote Management (WinRM) service. If you enable this policy setting the HTTP listener always appears. If you disable or do not configure this policy setting the HTTP listener never appears. When certain port 80 listeners are migrated to WinRM 2. 0 the listener port number changes to 5985. A listener might be automatically created on port 80 to ensure backward compatibility.

Turn On Compatibility HTTPS Listener

This policy setting turns on or turns off an HTTPS listener created for backward compatibility purposes in the Windows Remote Management (WinRM) service. If you enable this policy setting the HTTPS listener always appears. If you disable or do not configure this policy setting the HTTPS listener never appears. When certain port 443 listeners are migrated to WinRM 2. 0 the listener port number changes to 5986. A listener might be automatically created on port 443 to ensure backward compatibility.

Allow Basic authentication

This policy setting allows you to manage whether the Windows Remote Management (WinRM) service accepts Basic authentication from a remote client. If you enable this policy setting the WinRM service accepts Basic authentication from a remote client. If you disable or do not configure this policy setting the WinRM service does not accept Basic authentication from a remote client.

Allow unencrypted traffic

This policy setting allows you to manage whether the Windows Remote Management (WinRM) service sends and receives unencrypted messages over the network. If you enable this policy setting the WinRM client sends and receives unencrypted messages over the network. If you disable or do not configure this policy setting the WinRM client sends or receives only encrypted messages over the network.

Disallow WinRM from storing RunAs credentials

This policy setting allows you to manage whether the Windows Remote Management (WinRM) service will not allow RunAs credentials to be stored for any plug-ins. If you enable this policy setting the WinRM service will not allow the RunAsUser or RunAsPassword configuration values to be set for any plug-ins. If a plug-in has already set the RunAsUser and RunAsPassword configuration values the RunAsPassword configuration value will be erased from the credential store on this computer. If you disable or do not configure this policy setting the WinRM service will allow the RunAsUser and RunAsPassword configuration values to be set for plug-ins and the RunAsPassword value will be stored securely. If you enable and then disable this policy settingany values that were previously configured for RunAsPassword will need to be reset.

Disallow Negotiate authentication

This policy setting allows you to manage whether the Windows Remote Management (WinRM) service accepts Negotiate authentication from a remote client. If you enable this policy setting the WinRM service does not accept Negotiate authentication from a remote client. If you disable or do not configure this policy setting the WinRM service accepts Negotiate authentication from a remote client.

Disallow Kerberos authentication

This policy setting allows you to manage whether the Windows Remote Management (WinRM) service accepts Kerberos credentials over the network. If you enable this policy setting the WinRM service does not accept Kerberos credentials over the network. If you disable or do not configure this policy setting the WinRM service accepts Kerberos authentication from a remote client.

Allow CredSSP authentication

This policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses CredSSP authentication. If you enable this policy setting the WinRM client uses CredSSP authentication. If you disable or do not configure this policy setting the WinRM client does not use CredSSP authentication.