First requirement - limiting access to PowerShell commands