dbatools 🚀
banner
dbatools.io
dbatools 🚀
@dbatools.io
Community driven SQL Server PowerShell module. Works on Windows, Linux and macOS.
If you build software, you're based in the US or Canada, and your organization has been around for at least 3 years, check out Azure Trusted Signing.

It costs $9.99/mo, which after 3 years, costs about the same as a 3-year DigiCert — all without the antiquated ID verification.
Trusted Signing—Managed Signing Services | Microsoft Azure
Secure your applications with a fully managed end-to-end signing service for code, documents, applications, and more with Trusted Signing from Microsoft Azure.
azure.microsoft.com
August 7, 2025 at 10:34 AM
But how cool is it to have your software signed by @microsoft.com?

Also, check out that NotAfter and NotBefore, so short!
August 7, 2025 at 10:34 AM
Or you can stay with version 2.5.1. That signature will be valid pretty much until the end of time.

Oh and going back to Install-Module, if you switch to Install-PSResource, that bypasses the SkipPublisherCheck requirement.

```
Install-Module Microsoft.PowerShell.PSResourceGet
```
August 7, 2025 at 10:34 AM
Not up for dealing with daily cert rotation? You can set your execution policy to Bypass or Unrestricted.

If this sounds concerning to you, the post below should provide you with reassurance. Also, most if not all of us on the dev team set our Execution Policies to Bypass or Unrestricted if we can.
EXPECTED ERROR: Update-Module dbatools Authenticode Issue for 2.5.5 · Issue #9748 · dataplat/dbatools
TLDR: dbatools is moving to Azure Trusted Signing, which means Microsoft backs our reputation and dbatools won't trigger as many antivirus false positives. Users upgrading from older signed version...
github.com
August 7, 2025 at 10:34 AM
In PowerShell 7, we're looking forward to built-in support, hopefully coming soon. Shoutout to @jborean.bsky.social !
Trusted Publisher Checks for Azure Trusted Signing by jborean93 · Pull Request #25824 · PowerShell/PowerShell
PR Summary Add support for checking the Azure Trusted Signing publisher identifier alongside the thumbprint. This check will verify whether the unique Azure TS OID present in the EKU is in any cert...
github.com
August 7, 2025 at 10:34 AM
For users with strict ExecutionPolicies, we have a workaround for the daily cert rotation in Windows PowerShell.

Add this Import-Dbatools function to your profile to auto-trust certs:
Import-Dbatools
Import-Dbatools. GitHub Gist: instantly share code, notes, and snippets.
gist.github.com
August 7, 2025 at 10:34 AM
Our cert now shows Microsoft ID Verified as the issuer. Identity validation took just 30 minutes vs DigiCert's 2+ months.

Azure Trusted Signing provides instant reputation tied to our verified identity & not to a specific cert like the old way. Should finally solve years of false positives.
August 7, 2025 at 10:34 AM
Upgrading from older versions? You'll need this ONE time:

```
Install-Module dbatools -Force -SkipPublisherCheck
```

After that initial transition, you won't need SkipPublisherCheck again since our cert keeps the same subject and root CA for version 2.5.5+ onward.
August 7, 2025 at 10:34 AM
😌 oh good. Happy that was the issue after getting that notification!
March 14, 2025 at 2:34 PM