Microsoft BitLocker is a full volume encryption feature built into Windows, available in various editions of Windows Vista, 7, 8/8.1, 10, and Windows Server since 2008. It is intended to protect data on lost or stolen devices and has been validated against NIST FIPS 140-2 program multiple times. This repository provides Group Policy Objects, compliance checks, and configuration tools for implementing BitLocker, including a BitLocker PowerShell module for provisioning on standalone systems and using Group Policy and Microsoft SCCM 1910 CB for domain joined systems.
FEATURES
ALTERNATIVES
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
An advanced Content Disarm and Reconstruction software for enhancing computer safety by removing dynamic content from Office files.
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.