Audit-Test-Automation
windows_hardening
Audit-Test-Automation | windows_hardening | |
---|---|---|
2 | 14 | |
78 | 2,179 | |
- | - | |
9.6 | 7.3 | |
7 days ago | 24 days ago | |
PowerShell | PowerShell | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Audit-Test-Automation
-
ATAPAuditor - alternative/fork?
I'm using this toolset to audit our compliance to CIS baseline. The output however is so-so and I would love to work with someone who has presentation design skills to make it better, so that it could be used in reports. I also don't like that it runs multiple compliance tests instead of a chosen set (i.e. DISA or CIS or Microsoft, not all of them). I'm willing to spend time to fork it or build anew should the project interest anyone. If there is a better solution out there, I'd also like to see it :) https://github.com/fbprogmbh/Audit-Test-Automation
-
IIS 10 CIS audit and hardening
So far i was really impressed by ATAPAuditor - https://github.com/fbprogmbh/Audit-Test-Automation
windows_hardening
-
Enabling Services on Windows 10 to Improve System Security
You can try this tool, or some other similar tool. It hardens Windows 10 using the latest guidelines from several organisations. Of course you need to be careful doing this, it can very easily ruin your Windows installation.
-
Any firewall has a solution to this 2020 problem?
Endpoint-based prevention: Harden endpoints, including browser settings (https://www.cisa.gov/uscert/publications/securing-your-web-browser; https://stigviewer.com/stig/google_chrome_browser/) and software firewall including ingress and egress rules (https://www.stigviewer.com/stig/microsoft_windows_firewall_with_advanced_security/2021-10-15/). If you're primarily worried about Windows endpoints, take a look at Hardening Kitty and the solid STIG-based Windows Firewall list (https://github.com/0x6d69636b/windows_hardening/blob/master/lists/finding_list_dod_windows_firewall_stig_v1r7.csv) for some relatively easy wins.
- CIS Benchmark deployment approach
- Moved my All-in-one pentest lab from a 2u case to a sub 4L sff case
- Windows hardening (10 and 11)
-
How can I batch convert H264 to H265 this command on Window?
#1: "HardeningKitty was created to simplify the hardening of Windows. Now, HardeningKitty supports guidelines from Microsoft, CIS Benchmarks, DoD STIG and BSI SiSyPHuS Win10. And of course [their] own hardening list." | 20 comments #2: For those that work in IT Admin, what are the key Powershell Commands that every admin should know? #3: I wrote the mother-of-all onboarding scripts and now everyone blames me for everything...
-
Securing domain users pc's via Windows policy
The above documents mandate a lot of testing and analysis, together with potential design decisions you are not in a position to make; still - you should dedicate the time to do it "properly" from the beginning. Anyhow, in case you are a renegade daredevil - HardeningKitty to the rescue https://github.com/0x6d69636b/windows_hardening =]
-
Automation Query - WinZip
#1: /u/betterthangoku has passed away #2: "HardeningKitty was created to simplify the hardening of Windows. Now, HardeningKitty supports guidelines from Microsoft, CIS Benchmarks, DoD STIG and BSI SiSyPHuS Win10. And of course [their] own hardening list." | 20 comments #3: For those that work in IT Admin, what are the key Powershell Commands that every admin should know?
- "HardeningKitty was created to simplify the hardening of Windows. Now, HardeningKitty supports guidelines from Microsoft, CIS Benchmarks, DoD STIG and BSI SiSyPHuS Win10. And of course [their] own hardening list." (/r/PowerShell)
- "HardeningKitty was created to simplify the hardening of Windows. Now, HardeningKitty supports guidelines from Microsoft, CIS Benchmarks, DoD STIG and BSI SiSyPHuS Win10. And of course [their] own hardening list."
What are some alternatives?
HardeningKitty - HardeningKitty - Checks and hardens your Windows configuration
QA-Checks-v4 - PowerShell scripts to ensure consistent and reliable build quality and configuration for your servers
awesome-security-hardening - A collection of awesome security hardening guides, tools and other resources
IISParser - IISParser is a PowerShell module to read IIS logs. It's very fast and easy to use. This module is based on IISLogParser library that does all the heavy lifting.
Hard_Configurator - GUI to Manage Software Restriction Policies and harden Windows Home OS
cis-vsphere - A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.
OpenMediaVault - openmediavault is the next generation network attached storage (NAS) solution based on Debian Linux. Thanks to the modular design of the framework it can be enhanced via plugins. openmediavault is primarily designed to be used in home environments or small home offices.
WebAdministrationDsc - This module contains DSC resources for deploying and configuring web servers and related components.
microsoft-windows-10-stig-baseline - InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
infraspective - Infrastructure testing using pester
kiosk-demo-electron - Package and distribute Electron Apps and run them in Kiosk mode on Windows 10