jdgregson / Exploit-Protection-Settings
☆32Updated 2 years ago
Alternatives and similar repositories for Exploit-Protection-Settings:
Users that are interested in Exploit-Protection-Settings are comparing it to the libraries listed below
- Microsoft Active Directory (AD) Awesome List☆19Updated last month
- ☆18Updated 8 months ago
- Custom ADMX template focused on hardening Windows 10 & Windows 11 systems☆78Updated 2 months ago
- ☆41Updated last year
- Automation around Entra ID☆34Updated 2 months ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆32Updated 3 years ago
- System Tray Tool for WDAC☆32Updated 3 weeks ago
- Defender for Endpoint☆27Updated 7 months ago
- This tool is designed to assist you in analyzing issues related to Defender for Endpoint on your local endpoint. It offers a centralized …☆54Updated 2 weeks ago
- ☆44Updated this week
- AppLocker hardening policies☆25Updated 6 years ago
- ☆18Updated 3 months ago
- ☆68Updated this week
- A group of PowerShell scripts to check that your environment is ready for Windows Hello for Business - Hybrid Key Trust☆23Updated 6 months ago
- ☆28Updated 2 months ago
- A WDAC configuration repository with the sole intention of enriching MDE☆28Updated 2 years ago
- A set of troubleshooting, diagnostic, and information utilities for Windows☆53Updated 3 months ago
- ☆48Updated 7 months ago
- KQL for Azure Resource Manager and AppID search☆23Updated 6 months ago
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆42Updated last year
- PowerShell Module for managing Microsoft Defender Advanced Threat Protection☆71Updated 2 years ago
- A list of Entra ID (Azure AD) Audit event names and the corresponding Microsoft Graph Request Uri☆27Updated 4 months ago
- ☆44Updated last year
- ☆13Updated 3 years ago
- ☆59Updated last year
- ClientInspectorV2 - Unleashing the power of Azure LogAnalytics, Azure Data Collection Rules, Log Ingestion API by doing client inventory …☆25Updated last year
- Little PowerShell module to extract PowerShell scripts that no longer exists on disk but were run and are still in Event Logs.☆40Updated 4 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆42Updated 3 weeks ago