Starting the RemoteRegistry service did not help me in this case.
Apparently, there is a difference between deletion accessed through the ComputerName parameter in some cmdlets, such as Get-Service, and a newer form of remote access, accessed using cmdlets such as Invoke-Command.
Since traditional remote access is implemented by individual cmdlets, it is inconsistent (uses different methods and requirements, different requirements) and are available only in selected cmdlets. The technology used for remote access may differ from the cmdlet and cmdlet, and not easily recognizable to you. Each cmdlet uses any remote technology its author has chosen. Most cmdlets use Remote Procedure Call (RPC), but may also require additional services and settings for the target system.
Starting with Windows PowerShell 2.0, there is an alternative and more universal way to access remote systems: Windows PowerShell Remoting. With this type of remote processing, Windows PowerShell provides remote access for all commands. It transfers your commands to the remote system using a relatively new and highly customizable WinRM service, executes the code in a separate session, which runs on the remote system and returns the results to the calling system.
http://powershell.com/cs/media/p/7257.aspx
When I replaced this command
get-eventlog -LogName System -computername <ServerName>
to that
invoke-command {get-eventlog -LogName System} -ComputerName <ServerName>
I no longer received the following error
get-eventlog: network path not found.
source share