Mrskos-SMP / policiesLinks
34 Policy Templates
☆88Updated last year
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆141Updated 2 years ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆329Updated last week
- Kostenlose Prozessbeschreibungen☆12Updated last year
- Samen werken aan de nieuwe Baseline Informatiebeveiliging Overheid: BIO2☆56Updated 2 weeks ago
- ☆165Updated 2 months ago
- Protect your data in minutes !☆126Updated last year
- FBPro Audit Test Automation Package allows you to create compliance reports for your systems. The resulting HTML-reports provide a transp…☆158Updated last week
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆127Updated last month
- ☆86Updated 3 years ago
- Mapping the information system / Cartographie du système d'information☆468Updated this week
- BITS-Quellcode, auch für das hugo-Tool zum Erzeugen statischer HTML-Seiten☆18Updated last month
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆571Updated last month
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated last month
- verinice is a tool for managing information security.☆214Updated 11 months ago
- Hardening Active Directory version 2☆372Updated last month
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆274Updated 3 weeks ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆86Updated last month
- Guide journalisation Microsoft☆69Updated 2 weeks ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆266Updated 3 years ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆48Updated 2 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆291Updated 4 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Updated last week
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Updated 6 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆103Updated last year
- Simple hunting script for suspicious M365 OAuth Apps☆319Updated 4 months ago
- A production ready Dockered MISP☆315Updated last week
- Graylog Content Pack for Watchguard Fireware Logging☆38Updated 6 years ago
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆145Updated last week
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆277Updated 4 years ago
- Powershell module for VMWare vSphere forensics☆157Updated last year