Configuration examples for more secure servers
-
Updated
May 8, 2023 - PowerShell
Configuration examples for more secure servers
Make Windows more secure without installing any program
PowerShell Secure / Self-Verifying Library Demo
Local Group Policy template based on Microsoft Windows Server 2016 RTM CIS criteria.
🔮 Clean your windows to actually see the applications more than the frame !!
IT Infrastructure Hardening Automation
This GitHub repository focuses on enhancing the security posture of Windows systems by implementing rigorous hardening measures aligned with the guidelines provided by the Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) and the Center for Internet Security (CIS) Benchmarks.
Windows Anti-Forensics Script (WAFS) hardened your Windows OS against forensics analysis.
A DSC composite resource for hardening Windows Server OS
Set of PolicyRules used by the PolicyAnalyzer tool. Security-oriented.
Scripts and Documentation for Hardening Windows Command Prompt and PowerShell
Windows Hardening Powershell Scripts
Script to check for CVE-2023-36884 hardening
Ultimate Applocker Hardening Configuration Script.
🚀Optimizes Windows without changing how it's used. No breaking apps by default.
Harden Windows with Windows Defender Application Control (WDAC)
Windows 10/11 Security & Privacy Hardening
Windows Exploit Protection Settings (Ultimate)
Enhance the security and compliance of your standalone Windows servers with our STIG script, specifically designed to meet DoD STIG/SRG requirements and NSACyber guidance. Achieve ultimate Windows Server protection with our easy-to-use script.
Add a description, image, and links to the hardening topic page so that developers can more easily learn about it.
To associate your repository with the hardening topic, visit your repo's landing page and select "manage topics."