Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuratio…
☆284Nov 28, 2022Updated 3 years ago
Alternatives and similar repositories for SecCon-Framework
Users that are interested in SecCon-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust and practical application control for Windows☆694Aug 12, 2022Updated 3 years ago
- Repository for Intune Reporting using Azure Monitor, Log Analytics and Azure Workbooks☆54Jun 21, 2024Updated last year
- GoldenSAML Attack Libraries and Framework☆77Jun 5, 2024Updated last year
- An Azure automation runbook to automaticly patch Win32 Available apps in MSIntune and integration with Proactive Remediations for End Use…☆21Oct 3, 2020Updated 5 years ago
- ☆647Jun 6, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,935Feb 26, 2026Updated 2 months ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆336Aug 28, 2024Updated last year
- TrustedSec Sysinternals Sysmon Community Guide☆1,413Feb 10, 2026Updated 3 months ago
- Documentation and tools to access Windows Defender Application Control (WDAC) technology.☆269May 14, 2026Updated last week
- Tooling for assessing an Azure AD tenant state and configuration☆843Jun 12, 2024Updated last year
- A repo for sample MDATP Power BI Templates☆209Jun 15, 2021Updated 4 years ago
- WordPress version identification and vulnerability finder.☆32Apr 21, 2026Updated last month
- Microsoft Defender for Endpoint PowerShell module☆12Dec 28, 2023Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆274Feb 12, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A set of tools to assist with the creation of Intune managed virtual machines in Hyper-V.☆93Aug 19, 2024Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆89Jan 11, 2024Updated 2 years ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆615Aug 17, 2024Updated last year
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- PowerShell Module that queries Microsoft Graph, and allows for cross-tenant Backup & Restore actions of your Intune Configuration.☆441Dec 16, 2025Updated 5 months ago
- Sysmon configuration file template with default high-quality event tracing☆590Jan 21, 2026Updated 4 months ago
- Directory Services Internals (DSInternals) PowerShell Module and Framework☆1,942Updated this week
- Automated review process for your Azure AD guest accounts.☆17Sep 22, 2020Updated 5 years ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,173May 8, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of awesome Security Hardening techniques for Windows.☆1,794Jan 7, 2020Updated 6 years ago
- Additional Resources to improve Customer Experience with Microsoft Cloud App Security☆158Nov 28, 2022Updated 3 years ago
- ☆19May 27, 2024Updated last year
- Contact: CRT@crowdstrike.com☆753Apr 27, 2023Updated 3 years ago
- Scripts and tools for Cloud Managed Windows 10☆51Sep 24, 2025Updated 7 months ago
- Security and Privacy Research at Microsoft☆46Sep 9, 2024Updated last year
- Malware, spam, and phishing indicators of compromise that involve the use of COVID-19 or coronavirus in some way☆35Jul 4, 2020Updated 5 years ago
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,574Updated this week
- Simplify PAW and SPA for the masses, unify the MS Internal, and public PAW specs, and expedite deployment to ~5min or less.☆61Aug 30, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,590Dec 24, 2022Updated 3 years ago
- Provides tools that support implementing Privileged Access Workstations in a Active Directory Forest☆34Jun 5, 2023Updated 2 years ago
- ☆585Oct 9, 2020Updated 5 years ago
- HardeningKitty and Windows Hardening Settings☆2,621Apr 10, 2026Updated last month
- This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 a…☆459Mar 4, 2026Updated 2 months ago
- Collection of KQL queries☆1,635Jan 29, 2026Updated 3 months ago
- Tool to backup, update and document configurations in Intune☆388May 13, 2026Updated last week