Overview
Recently one of our Engineers ran into a problem while setting up a honeypot in Threat Manager. The deployment wouldn’t complete, and there was no logging to help figure out what was wrong
.
Something was being executed from Threat Manager to the distant server, but it didn’t seem to complete correctly
.
I was asked to come onto this problem and help the Engineer get things set up.
Description
To help out I suggested a different approach. ![]()
Threat Manager provides two methods of setting up Honey Pots.
One click setup with a button
Downloading the PowerShell file directly
The one click setup is great, but there may be barriers along the way, such as permission issues or remote script execution firewalls. ![]()
For example your server may be setup with one of these:
- PowerShell script disabled: Disable-PSRemoting (Microsoft.PowerShell.Core) - PowerShell | Microsoft Learn
- WinRM not setup properly: Installation and configuration for Windows Remote Management - Win32 apps | Microsoft Learn
- Remote PowerShell execution policies: Set-ExecutionPolicy (Microsoft.PowerShell.Security) - PowerShell | Microsoft Learn
Downloading the PowerShell script to execute directly on the server is quite useful, not only it bypasses potential remote execution, but it also provides a clearer view of any errors occurring during execution
.
Once the script has been downloaded. It has been copy pasted into the remote server and executed within PowerShell ISE:
^ Example of the script failing with explicit error.
Running the script locally worked like a charm, and the honeypot setup was successfully completed
. This experience solved the problem in the Engineer’s lab and made them prepared assist the client with their deployment.

