Contact Info

Crumbtrail

ActiveXperts.com » Administration » Powershell » Powershell 2.0 » Register-PSSessionConfiguration

Register-PSSessionConfiguration - Powershell 2.0 CmdLet

ActiveXperts Network Monitor ships with integrated Powershell scripts to monitor complex network. The scripts run out of the box
Download the ActiveXperts Network Monitor FREE version now »

Register-PSSessionConfiguration

Short description
Creates and registers a new session configuration.

Syntax
Register-PSSessionConfiguration [-AssemblyName] <string> [-ConfigurationTypeName] <string> [-ApplicationBase <strin
g>] [-Name] <string> [-Force] [-MaximumReceivedDataSizePerCommandMB <double>] [-MaximumReceivedObjectSizeMB <double
>] [-NoServiceRestart] [-ProcessorArchitecture <string>] [-SecurityDescriptorSDDL <string>] [-ShowSecurityDescripto
rUI] [-StartupScript <string>] [-ThreadApartmentState {STA | MTA | Unknown}] [-ThreadOptions {Default | UseNewThrea
d | ReuseThread | UseCurrentThread}] [-Confirm] [-WhatIf] [<CommonParameters>]

Description
The Register-PSSessionConfiguration cmdlet creates and registers a  new session configuration on the local computer
. This is an advanced cmdlet that is designed to be used by system administrators to manage customized session conf
igurations for their users.

Every Windows PowerShell remote session uses a session configuration. When users create a session that connects to 
the computer, they can select a configuration or use the default configurations that are registered when you enable
 Windows PowerShell remoting. Users can also set the $PSSessionConfigurationName preference variable, which specifi
es a default configuration for sessions created in the current session. 

The session configuration configures the environment for the session. You can define the configuration by using an 
assembly that implements a new configuration class and by using a script that runs in the session. The configuratio
n can determine which commands are available in the session, and it can include settings that protect the computer,
 such as those that limit the amount of data that the session can receive remotely in a single object or command.  
You can also specify a security descriptor that determines the permissions that are required to use the configurati
on.