nsacyber / Mitigating-Obsolete-TLS
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
☆270Updated 4 years ago
Alternatives and similar repositories for Mitigating-Obsolete-TLS:
Users that are interested in Mitigating-Obsolete-TLS are comparing it to the libraries listed below
- CISA's catalog of bad practices that are exceptionally risky.☆206Updated 2 weeks ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆603Updated 8 months ago
- CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your…☆101Updated 3 years ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆284Updated 2 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆217Updated 2 months ago
- Logging Made Easy☆711Updated last year
- DShield Raspberry Pi Sensor☆466Updated this week
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆282Updated 3 years ago
- ☆625Updated last year
- Building environments to replicate small networks and deploy applications☆321Updated 3 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,418Updated 2 years ago
- ☆436Updated 3 years ago
- Understand adversary tradecraft and improve detection strategies☆707Updated 2 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Incident Response Hierarchy of Needs☆459Updated 2 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆188Updated this week
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 6 months ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 2 years ago
- ☆560Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 9 months ago
- External monitoring for organization assets☆397Updated 10 months ago
- An open source custom password filter DLL and userspace service to better protect / control Active Directory domain passwords.☆59Updated 7 years ago
- A site for CISA directives☆162Updated 10 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆865Updated 4 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆402Updated 3 weeks ago
- Tools for hunting for threats.☆581Updated 6 months ago
- Rapidly apply hundreds of security controls in Azure☆184Updated last year
- TrustedSec Sysinternals Sysmon Community Guide☆1,208Updated 11 months ago
- EventList☆375Updated 4 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,067Updated 4 months ago