nsacyber / Mitigating-Obsolete-TLSLinks
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
☆271Updated 4 years ago
Alternatives and similar repositories for Mitigating-Obsolete-TLS
Users that are interested in Mitigating-Obsolete-TLS are comparing it to the libraries listed below
Sorting:
- CISA's catalog of bad practices that are exceptionally risky.☆208Updated 3 weeks ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆287Updated 3 years ago
- ☆436Updated 3 years ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆285Updated 2 years ago
- Logging Made Easy☆712Updated last year
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆606Updated 10 months ago
- A set of guidelines and best practices for an awesome engineering team☆240Updated 3 weeks ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆297Updated 8 months ago
- ☆627Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 9 months ago
- ☆561Updated 2 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆221Updated 4 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,425Updated 2 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆868Updated 4 years ago
- This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 a…☆425Updated last week
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆139Updated last month
- Search a filesystem for indicators of compromise (IoC).☆74Updated last week
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated last year
- Configuration guidance for implementing BitLocker. #nsacyber☆121Updated 5 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,221Updated last year
- A site for CISA directives☆163Updated last year
- Building environments to replicate small networks and deploy applications☆324Updated 5 months ago
- DShield Raspberry Pi Sensor☆473Updated last month
- Incident Response Hierarchy of Needs☆462Updated 2 years ago
- External monitoring for organization assets☆404Updated last year
- Contact: CRT@crowdstrike.com☆734Updated 2 years ago
- All sysmon event types and their fields explained☆552Updated 3 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago