Mrskos-SMP / policiesLinks
34 Policy Templates
☆87Updated last year
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆303Updated this week
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆139Updated 2 years ago
- Kostenlose Prozessbeschreibungen☆12Updated last year
- FBPro Audit Test Automation Package allows you to create compliance reports for your systems. The resulting HTML-reports provide a transp…☆134Updated this week
- Protect your data in minutes !☆121Updated 11 months ago
- ☆161Updated last year
- Samen werken aan de nieuwe Baseline Informatiebeveiliging Overheid: BIO2☆52Updated 2 weeks ago
- Mapping the information system / Cartographie du système d'information☆442Updated this week
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆112Updated 3 months ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆269Updated last week
- ☆83Updated 3 years ago
- Hardening Active Directory version 2☆338Updated last month
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆287Updated 4 years ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆46Updated 2 years ago
- verinice is a tool for managing information security.☆206Updated 8 months ago
- NIST CSF Maturity Toolkit☆105Updated 4 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆108Updated last month
- Policy Module for Microsoft Active Directory Certificate Services☆229Updated 2 months ago
- Useful scripts for those administering Wazuh☆86Updated 2 weeks ago
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆143Updated this week
- Timeline of Active Directory changes with replication metadata☆513Updated 6 months ago
- Guide journalisation Microsoft☆69Updated last year
- Simple hunting script for suspicious M365 OAuth Apps☆296Updated 2 weeks ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆533Updated 3 weeks ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆81Updated 3 weeks ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆98Updated 9 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆149Updated last week
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆107Updated 5 years ago
- PowerShell module for SentinelOne API☆28Updated 4 years ago