Managing Windows with Remote Admin Tools

Practice Labs Module
13 minutes

The "Managing Windows with Remote Admin Tools" module provides you with the instructions and devices to develop your hands-on skills in the following topics. Working with RDP, Administering Windows with PowerShell Remoting.

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »



The Managing Windows with Remote Admin Tools module provides you with the instructions and devices to develop your hands-on skills in the following topics.

  • Working with RDP
  • Administering Windows with PowerShell Remoting

Exam Objectives

The following exam objectives are covered in this lab.

  • Learn how to configure and access RDP in Windows 10
  • Demonstrate how to configure Windows PowerShell remoting

Lab Duration

It will take approximately 30 minutes to complete this lab.

Exercise 1 - Working with RDP

Remote Desktop is a built-in remote management tool in Windows 10. This tool allows you to connect to another computer’s desktop using the Remote Desktop Protocol (RDP).

When connected to another computer’s desktop via RDP, you can further investigate problems reported by the users and make the necessary remediation to fix any errors. By default, Administrators are allowed to RDP a Windows device and take over the system control using the tool. This means that any user currently signed on to Windows will be disconnected from his current session, should the administrator proceed to sign on via RDP. By default, Remote Desktop feature in Windows 10 is enabled.

In this exercise, you will work with RDP and connect computers remotely.

Exercise 2 - Administering Windows with PowerShell Remoting

Windows PowerShell has the ability to remotely manage a Windows computer by enabling a feature called PowerShell remoting. This feature can be useful when using a GUI-based tool is not viable due to low network bandwidth situation between two locations.

A service called Windows Remote Management (WinRM) makes a Windows device capable of being managed remotely. You need to set the appropriate firewall rules on both sides of the network or hosts to make PowerShell remoting possible. When connected via PowerShell remoting, you can run cmdlets and scripts like you are running those commands interactively on the local computer. However, the Windows Firewall exception for the WinRM listener will fail if any of the network cards are configured to have public type. The firewall will refuse to create exceptions on public network cards. Hence, you must change the network card type to either private or domain. Alternatively, you can disable the public network connections for establishing PowerShell remoting.

In this exercise, you will configure and enable Windows PowerShell remoting between PLABWIN10 and PLABWIN801. You will remotely access PLABWIN801 from PLABWIN10 and transmit commands to PLABWIN801. As a pre-requisite to this task, you will first disable public network connections in PLABWIN10 and PLABWIN810 machines for establishing PowerShell remoting.

Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.