{"version":"1.0","provider_name":"PowerShell Team","provider_url":"https:\/\/devblogs.microsoft.com\/powershell","author_name":"PowerShell Team","author_url":"https:\/\/devblogs.microsoft.com\/powershell\/author\/powershellteam\/","title":"PowerShell\u2019s Security Guiding Principles - PowerShell Team","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SkXFxcXOO7\"><a href=\"https:\/\/devblogs.microsoft.com\/powershell\/powershells-security-guiding-principles\/\">PowerShell\u2019s Security Guiding Principles<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/devblogs.microsoft.com\/powershell\/powershells-security-guiding-principles\/embed\/#?secret=SkXFxcXOO7\" width=\"600\" height=\"338\" title=\"&#8220;PowerShell\u2019s Security Guiding Principles&#8221; &#8212; PowerShell Team\" data-secret=\"SkXFxcXOO7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/devblogs.microsoft.com\/powershell\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/devblogs.microsoft.com\/powershell\/wp-content\/uploads\/sites\/30\/2018\/09\/Powershell_256.png","thumbnail_width":256,"thumbnail_height":256,"description":"One of most common issues we face with PowerShell comes from users or ISVs misunderstanding PowerShell\u2019s security guiding principles. At a high-level, it seems to all make sense \u2013 execution policies help ensure that you only run scripts that you trust on your system. These protections are driven by PowerShell\u2019s three main security features. For [&hellip;]"}