Intune-ACSC-Windows-Hardening-Guidelines
lynis
Intune-ACSC-Windows-Hardening-Guidelines | lynis | |
---|---|---|
7 | 72 | |
234 | 12,664 | |
3.8% | 1.2% | |
5.0 | 8.6 | |
about 2 months ago | 20 days ago | |
PowerShell | Shell | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Intune-ACSC-Windows-Hardening-Guidelines
-
Is migrating to Azure AD worth it over upgrading 5 year old servers?
For the ACSC stuff, the guides are linked in the repo wiht the configs, which is referenced in the E8 docs.
-
ACSC - Essential 8 Application Hardening
Two practical destinations I would look at: 1. https://github.com/microsoft/Intune-ACSC-Windows-Hardening-Guidelines 2. https://aka.ms/E8guides
- Essential 8 + Intune settings
- Intune-ACSC-Windows-Hardening-Guidelines: Collection of Intune policies that could assist with implementing ACSC's Windows hardening guidance.
-
How do you lock down company laptops?
Not OP, but these Intune policies are worth checking out
- Essential 8 Cyber checklist question - Australia
- Server Hardening Checklist
lynis
-
Who does check linux distros of malware - open source
Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata...
- Learn security best practices
- How do i find and remove the compilers installed in fedora?
-
Fight against scans, bots and script-kiddies
What I would do in your place is run this https://github.com/CISOfy/lynis and follow some of the instructions.
-
What are your favorite sites that are privacy related that you bookmarked?
https://github.com/CISOfy/Lynis (Linux hardening)
- Server security/hardening baselines for Linux Template
- Ultimate privacy when setting up Fedora?
- Linux security tests?
- Vulnerability scanning tools for homelab?
-
Cyber Security for developers: what and where to learn?
Linux security audit scanner
What are some alternatives?
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
OSSEC - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
OSQuery - SQL powered operating system instrumentation, monitoring, and analytics.
cve-check-tool - Original Automated CVE Checking Tool
debian-cis - PCI-DSS compliant Debian 10/11/12 hardening
pfSense - Main repository for pfSense
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
Snort - Snort++
syft - CLI tool and library for generating a Software Bill of Materials from container images and filesystems
grype - A vulnerability scanner for container images and filesystems
Fail2Ban - Daemon to ban hosts that cause multiple authentication errors