Windows-10-Hardening Logo

Windows-10-Hardening

0
Free
Visit Website

A collective resource of settings modifications (mostly opt-outs) that attempt to make Windows 10 as private and as secure as possible. Running Download all.bat, make any required modifications, and run the script as administrator. Reboot. Issues Group policy registry references often change after major updates. This requires updates to these scripts. Many of these modifications are mere opt-outs, and are not means to ensure Microsoft are unable to collect telemetry data. Privacy This collection of scripts does not collect any user data. License Copyright 2018 Aaron Horler Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and

FEATURES

ALTERNATIVES

Monitor WMI consumers and processes for potential malicious activity

Comprehensive endpoint protection solution providing advanced threat detection, proactive defense, and efficient management.

A robust endpoint security solution that offers data security, network security, and advanced threat prevention, all managed from a single console to protect your devices and data.

A Python library for loading and executing Beacon Object Files (BOFs) in-memory.

Xcitium's unified zero-trust platform secures endpoints to cloud workloads using patented Zero Dwell technology, providing complete protection from ransomware and malware infections.

CrowdStrike Falcon Insight XDR is an AI-powered endpoint detection and response solution that provides comprehensive protection, visibility, and automated response capabilities.

A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.

Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved