Mrskos-SMP / policiesLinks
34 Policy Templates
☆87Updated last year
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆305Updated 2 weeks ago
- Kostenlose Prozessbeschreibungen☆12Updated last year
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆140Updated 2 years ago
- FBPro Audit Test Automation Package allows you to create compliance reports for your systems. The resulting HTML-reports provide a transp…☆140Updated last week
- Protect your data in minutes !☆123Updated last year
- BITS-Quellcode, auch für das hugo-Tool zum Erzeugen statischer HTML-Seiten☆18Updated 2 months ago
- ☆162Updated 2 weeks ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆47Updated 2 years ago
- verinice is a tool for managing information security.☆209Updated 9 months ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆273Updated last month
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 4 years ago
- Guide journalisation Microsoft☆69Updated last year
- Graylog Content Pack for Watchguard Fireware Logging☆38Updated 6 years ago
- ☆84Updated 3 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- Hardening Active Directory version 2☆354Updated 3 weeks ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆101Updated 10 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆118Updated 4 months ago
- Timeline of Active Directory changes with replication metadata☆517Updated 8 months ago
- Mapping the information system / Cartographie du système d'information☆453Updated this week
- PowerShell module for SentinelOne API☆28Updated 4 years ago
- The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA)☆349Updated last year
- PowerShell module for Office 365 and Azure log collection☆276Updated 2 months ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆559Updated 3 weeks ago
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆143Updated this week
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆264Updated 4 years ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆112Updated 5 years ago
- ☆338Updated last month
- Random Cyber Threat Intelligence☆49Updated 9 months ago
- ☆67Updated 2 years ago