Mrskos-SMP / policiesLinks
34 Policy Templates
☆88Updated last year
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆140Updated 2 years ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆313Updated 2 weeks ago
- Kostenlose Prozessbeschreibungen☆12Updated last year
- FBPro Audit Test Automation Package allows you to create compliance reports for your systems. The resulting HTML-reports provide a transp…☆150Updated 3 weeks ago
- ☆164Updated last month
- Protect your data in minutes !☆125Updated last year
- verinice is a tool for managing information security.☆209Updated 10 months ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆273Updated 2 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆121Updated 3 weeks ago
- Mapping the information system / Cartographie du système d'information☆455Updated this week
- BITS-Quellcode, auch für das hugo-Tool zum Erzeugen statischer HTML-Seiten☆18Updated 3 months ago
- ☆84Updated 3 years ago
- Samen werken aan de nieuwe Baseline Informatiebeveiliging Overheid: BIO2☆56Updated this week
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆145Updated this week
- Hardening Active Directory version 2☆362Updated 3 weeks ago
- Guide journalisation Microsoft☆69Updated 2 weeks ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆47Updated 2 years ago
- Random Cyber Threat Intelligence☆49Updated 10 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆115Updated 2 weeks ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆290Updated 4 years ago
- Graylog Content Pack for Watchguard Fireware Logging☆38Updated 6 years ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆112Updated 5 years ago
- Simple hunting script for suspicious M365 OAuth Apps☆318Updated 2 months ago
- Useful scripts for those administering Wazuh☆88Updated this week
- Policy Module for Microsoft Active Directory Certificate Services☆244Updated 4 months ago
- Easy way to read a NPS DTS format log file☆29Updated 3 years ago
- NIST CSF Maturity Toolkit☆113Updated 6 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated last week
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- SOCFortress CoPilot☆417Updated this week