Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PowerShell Protect should be able to enumerate its default rules #1

Open
DataTraveler1 opened this issue Feb 11, 2022 · 1 comment
Open
Labels
enhancement New feature or request

Comments

@DataTraveler1
Copy link

Is your feature request related to a problem? Please describe.

No. This feature request is an informational enhancement. This was discussed on the forums here.

Describe the solution you'd like

The full details of the default built-in rules that are shipped with PowerShellProtect should be enumerable and exportable from within the module (e.g. Get-PSPConfiguration).

Describe alternatives you've considered

I tried looking with the module files but I was not able to find any clues.

Additional context

I am sure there is a demand for this information. Any software that changes the system configuration is going to have demand for a precise list of what is actually being changed. For example, test criteria for a Windows server to pass OAT.

@DataTraveler1 DataTraveler1 added the enhancement New feature or request label Feb 11, 2022
@adamdriscoll
Copy link
Member

This issue has been mentioned on Ironman Software Forums. There might be relevant details there:

https://forums.ironmansoftware.com/t/question-about-the-default-built-in-rules/6607/3

@adamdriscoll adamdriscoll transferred this issue from ironmansoftware/powershell-universal Nov 28, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants