Windows-10-Hardening Logo

Windows-10-Hardening

0
Free
Visit Website

A collective resource of settings modifications (mostly opt-outs) that attempt to make Windows 10 as private and as secure as possible. Running Download all.bat, make any required modifications, and run the script as administrator. Reboot. Issues Group policy registry references often change after major updates. This requires updates to these scripts. Many of these modifications are mere opt-outs, and are not means to ensure Microsoft are unable to collect telemetry data. Privacy This collection of scripts does not collect any user data. License Copyright 2018 Aaron Horler Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and

FEATURES

ALTERNATIVES

A guide to implementing Microsoft AppLocker for application whitelisting

Powerfully simple endpoint security solution that takes down threats without interrupting business.

ClamAV is an open-source antivirus engine that detects trojans, viruses, malware, and other malicious threats.

A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.

Sangfor Technologies is a leading cybersecurity, cloud, and infrastructure vendor providing effective cybersecurity and efficient enterprise cloud solutions.

A set of utility programs that monitor and control the SMART system built into modern hard drives, providing proactive measures to prevent data loss.

Read-only FUSE driver for Apple File System with support for encrypted volumes and fusion drives on Linux.

OpenEDR is an open-source platform enhancing cybersecurity through real-time detection and analysis of cyber threats.