What is the protocol used by Powershell based connection for MID based integration?Issue For some customers, the WMI:135 protocol is disabled in their environment. Their security team would like to understand the port number used for Powershell activity step by MID. What is the protocol used by Powershell-based connection for MID-based integration?CauseWMC uses ports such as 135 discussed in the community article WMI, PowerShell and Windows Firewalls. However, regarding IntegrationHub - Powershell activity step, we use a power shell remote to talk to the AD controller The next article has the list of port(s) that customers can validate with their network team:What port does Powershell remoting usePowershell will use the same ports as WinRMResolutionFor internal ServiceNow operations that use PowerShell, the customer may configure to use SSL with mid config parameter mid.powershell_api.winrm.use_ssl=true Regarding the below properties, if customer is ok with defaults, there is no need to change: mid.powershell_api.winrm.remote_port: the port used for http (default 5985) mid.powershell_api.winrm.remote_https_port: the port used for https (default 5986) An example where this is used is for testing PowerShell credentials. However, the above properties are actually not relevant when customers use custom IntegrationHub PowerShell step scripts. If any customer needs Get-ADGroupMember to make a secure connection to $server, we suggest they consult the Microsoft documentation.