Windows-10-Hardening Logo

Windows-10-Hardening

0
Free
Visit Website

A collective resource of settings modifications (mostly opt-outs) that attempt to make Windows 10 as private and as secure as possible. Running Download all.bat, make any required modifications, and run the script as administrator. Reboot. Issues Group policy registry references often change after major updates. This requires updates to these scripts. Many of these modifications are mere opt-outs, and are not means to ensure Microsoft are unable to collect telemetry data. Privacy This collection of scripts does not collect any user data. License Copyright 2018 Aaron Horler Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and

FEATURES

ALTERNATIVES

A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.

Xcitium's unified zero-trust platform secures endpoints to cloud workloads using patented Zero Dwell technology, providing complete protection from ransomware and malware infections.

Code injection library for OS X with cross-architecture support.

Deep Instinct is a predictive prevention platform that uses deep learning to prevent unknown threats, including ransomware and zero-day malware, from infiltrating storage environments, applications, and endpoints.

Comprehensive cybersecurity platform for hybrid and multi-cloud environments

Santa is a binary and file access authorization system for macOS.

Acronis Cyber Protect is an integrated cybersecurity and data protection platform that provides comprehensive protection for businesses, service providers, and individuals.

A static analysis framework for extracting key characteristics from various file formats

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved