Throughout 2025, global enterprises like Qantas, Jaguar, Asahi, Workday, and more, have been dealt crushing blows by cyber attacks, bringing their business operations to a standstill for extended periods of time.
These attacks have naturally caused huge disruption, financial loss, and reputational damage for the companies affected.
The mounting frequency, severity, and publicity of these attacks in recent years has given us a sense that well-known brands are being outpaced by malicious actors in the cat and mouse game of cybersecurity. No doubt, there is mounting pressure on IT and information security teams to ensure that their company does not become the next victim of such an attack.
With Cybersecurity Awareness Month coming to a close, we’d like to offer our perspective on a crucial factor in today’s cybersecurity playing field, the governance (or lack thereof) of automation strategies in enterprise-grade Microsoft infrastructure.
Microsoft Automation: A Force for Evil or for Good
IT teams use a variety of tools to automate Microsoft environments, saving hundreds of hours per year in the execution of mundane tasks across the business, such as new user onboarding, device configuration, and network maintenance.
This is a key function in modern digitized business, underpinning the enterprise infrastructure that thousands of employees rely on to do their jobs effectively.
As a rule, only qualified and credentialed professionals should be able to tinker with automation tools such as PowerShell, preventing unvetted individuals from causing costly errors that can affect the business at large.
However, even professionals can make mistakes, and hackers know this.
With the strengthened cybersecurity postures of organizations centered around zero-trust principles, attackers are increasingly turning to PowerShell as a means of infiltrating company networks.
By gaining access to credentials that let them execute PowerShell scripts on company machines with elevated privileges, hackers can cement their covert presence in target systems and make it harder for security teams to track and trace their activities.
This makes admin-level IT professionals with credentialed access to PowerShell a key target for social engineering and other forms of infiltration.
Although measures can be taken to limit a compromised individual or device’s ability to create havoc using PowerShell, things can slip through the cracks, particularly when deception or irrational behaviors are involved.
Because of this, it is extremely important to maintain robust, top-down, centralized oversight over the implementation of automation strategies in Microsoft environments throughout the business, no matter how much you trust the people using them.
Our question to you for Cybersecurity Awareness Month is this: Is your oversight over automation tools like PowerShell comprehensive enough?
Common Pitfalls in PowerShell Automation Strategy
You trust your team. Each member has proven their expertise in using tools like PowerShell and been given security credentials accordingly. You’ve briefed them on cybersecurity policy and best practices. You’re confident that they won’t cause undue errors, and you’ve made sure that they understand the responsibility that lies on their shoulders.
But when push comes to shove, and things go wrong in your IT infrastructure, do you actually know what PowerShell scripts have been used, by whom, and where?
When automation is seen as an individual or team-specific responsibility rather than as a centrally managed function, entropy is inevitable.
This results in a typical snowball of inefficiencies that harm productivity and weaken the company’s overall security posture:
- Teams or individual users create their own version of scripts and workflows.
- These workflows lack proper documentation, version control, standardization, or accountability.
- Over time, conflicting automation methods emerge across departments, and undocumented scripts go under the radar.
- When something goes wrong, no one knows which script version should be restored.
This is an unproductive state of affairs which becomes increasingly likely as businesses grow, in addition to compounding the severity of disruption in the case of an attack.
When Attackers Strike, How Do You Respond?
Due to the fundamentally decentralized nature of your automation strategy, your team faces increased challenges in identifying, tracking, and neutralizing a security breach when things go wrong:
- Lack of Omniscient, Real-Time Visibility
Logs are dispersed across different machines, servers, or cloud storage folders, and there is no comprehensive, real-time overview of PowerShell usage across the business.
- Delayed Incident Response
As a result of the above, IT security teams are forced to investigate malicious activity manually, slowly, and after the fact, by which time it could be too late.
- No Clear Ownership
When undocumented automation scripts go under the radar, it can be difficult to determine where to find them in the logs, and who was responsible for executing them.
The result is a costly delay in responses to breaches or execution failures, and huge headaches for the teams in charge of identifying the cause, mitigating the disruption, and repairing the damage.
During this time, the knock-on effect on the rest of the business is dire. Key infrastructure is down, and teams across the business are prone to SLA breaches, project delays, increased workloads, and audit failures. Meanwhile, the business as a whole suffers from downtime costs, reputational damage, and potential penalties from falling foul of data protection regulations.
Preventing this situation is not just a technical problem, but an organizational one. It must be solved at the foundation of your automation strategy, and not just in your cybersecurity policy.
As recent attacks show, effective centralized oversight is not an option, but a necessity, for ensuring the resilience, productivity, and reliability of your long-term IT strategy.
Centralized Oversight – The Spine of a Resilient IT Team
A centralized approach to Microsoft automation transforms it from a useful time-saving tool for individual teams into a company-wide productivity platform, where every workflow is guaranteed to be accountable, compliant with regulations, and optimized for productivity.
The following are characteristics of a centralized approach to Microsoft automation that we suggest are key to preventing security breaches and minimizing disruption when they do occur:
- Unified Oversight Across All Automations
Every automation is created and executed from a central command hub. This ensures total oversight over automation workflows throughout the business, with no blind spots.
- Pre-Execution Validation
Automation scripts are scanned, logged, and policy-checked before they run, stopping malicious commands disguised as routine IT tasks from ever being executed.
Standardized, pre-approved script libraries can be set up to eliminate shadow automation and allow for seamless self-service use when required.
- Defined Roles and Access Policies
Rather than managing user permissions on an ad-hoc basis, these can easily be tied to specific workflows and job functions through an intuitive interface. This reduces entry points for attackers and allows for total accountability.
- Fast Forensic Analysis
Suspicious executions are flagged in real time. IT teams can easily trace an attack from start to finish and take mitigating action immediately. This cuts forensic response time from days to minutes, radically reducing disruption caused.
The benefits of these four characteristics are felt not only in security but in the overall productivity of Microsoft automations in modern IT infrastructure.
A Final Thought for Strategic IT Leaders: Be Proactive vs Reactive
Throughout this article, we’ve hinted at the need to be proactive instead of reactive. Knowing that security breaches are inevitable, IT leaders must take steps not only to prevent them, but also to minimize the potential disruption and costs that they can cause if they get through.
As cyber threats evolve, so must our approach to defending against them. Microsoft automation is no longer just a nice-to-have time-saving activity for IT professionals; it must be a strategic approach that requires the same governance as any other critical infrastructure in a business.
An effective centralized governance framework established at the foundation of your automation strategy ensures that every base is covered before an attack comes in, and that you’re back on your feet as soon as possible after the threat has been neutralized.
The message from recent attacks is clear: If you don't control your automations, someone else will. Set your system up to win in advance.
See how ScriptRunner's centralized automation platform for Microsoft ecosystems supports resiliency and oversight. Start your free trial here.

