Windows-10-Hardening Logo

Windows-10-Hardening

0
Free
Visit Website

A collective resource of settings modifications (mostly opt-outs) that attempt to make Windows 10 as private and as secure as possible. Running Download all.bat, make any required modifications, and run the script as administrator. Reboot. Issues Group policy registry references often change after major updates. This requires updates to these scripts. Many of these modifications are mere opt-outs, and are not means to ensure Microsoft are unable to collect telemetry data. Privacy This collection of scripts does not collect any user data. License Copyright 2018 Aaron Horler Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and

FEATURES

ALTERNATIVES

Comprehensive cybersecurity platform for hybrid and multi-cloud environments

Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.

Open-source tool for monitoring macOS hosts with detailed system activity insights.

Sangfor Technologies is a leading cybersecurity, cloud, and infrastructure vendor providing effective cybersecurity and efficient enterprise cloud solutions.

A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.

A discontinued project for Windows system administration that has been archived due to the author's dissatisfaction with the Windows operating system.

Cortex XDR is a comprehensive endpoint security solution that blocks advanced attacks with behavioral threat protection, AI, and cloud-based analysis, and provides complete endpoint security and lightning-fast investigation and response.

An endpoint monitoring tool for Linux and macOS that reports file, socket, and process events to Zeek.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security