- Notifications
You must be signed in to change notification settings - Fork2
PowerShellCrack/STIGSCAPWinTool
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
A PowerShell script that will take a GPO backup or SCAP XCCDF file and generate STIGs settingsThen apply them to a Windows OS using Microsoft's LGPO.exe tool from their Security Compliance Manager Toolkit
ApplySTIGAndGPOs.ps1This is a more dynamic PowerShell script. This will detect roles,and features and even software and install the appropriate GPO backup.
ApplySTIGBySCAPs.ps1STILL DEVELOPING: This is the most advanced PowerShell script. This script will be a lotlike Linux's OpenSCAP, it will parse the XCCDF file from DISA and build a datasetof all STIG components and one by one it will apply the STIG based on the configuration files.Configuration files still need to be created, check out theREADME.md
RemoveSTIGAndGPOs.ps1This script just removes the group policy folders and clear the security database.
- Modules need to be downloaded. FollowREADME.md instructions in modules folder
- STIG Naming conventions is required for STIG Tools. FollowREADME.md instructions in GPO folder
- CCI required for SCAP Tools. FollowREADME.md instructions in CCI folder
- SCAP Benchmarks required for SCAP Tools. FollowREADME.md instructions in SCAP folder
- LGPO executable required for all tools. FollowREADME.md instructions in Tools folder
- Configs files for each STIG ID. FollowREADME.md instructions in Tools folder
ApplySTIGAndGPOs.ps1: The script will read into the GPO's backup.xml inside each GUID and identify the name of the policy. Using that information it will determine if the name matches identified system information, roles, features and install products and apply them locally using Microsoft's Security Compliance Manager tool LGPO. This ultimately read the GPO settings, and builds a file with all the registry and security settings, then applies those settings within the local gpo. These settings can then be viewed using the systems gpedit.msc. All keys and settings are backed up in the temp folder and logged in log folder.
CCI\U_CCI_List.xml <-- Used with ApplySTIGBySCAPs.ps1. Control Correlation Identifier (CCI) provides a standard identifier and description for each of the singular, actionable statements that comprise an IA control or IA best practiceConfigs\ <-- Used with ApplySTIGBySCAPs.ps1. Configuration files for each STIG ID. These are ini like files with commands for validation and remediation steps.Extensions\ <-- Used with ApplySTIGBySCAPs.ps1. PowerShell extension folder provides additional PowerShell functionsModules\ <-- Additional PowerShell modules found in PowerShell Gallery and elsewhereGPO\ <-- Used with ApplySTIGAndGPOs.ps1. Follow README.md instructions in folderLogs\ <-- Output logs for LGPO and advanced logging (Use CMTRACE)SCAP\ <-- SCAP Benchmark files. Follow README.md instructions in folderTemp\ <-- Store generated LGPO config and pol filesTools\ <-- Tools used in scripts, such as LGPODSC\ <-- NEW. The idea is to add dsc configuration files here and and apply them along with STIGS/SCAP- https://github.com/CyberSecDef/STIG
- http://www.entelechyit.com/2017/01/02/powershell-and-disa-nist-stigs-part-1/
- http://iase.disa.mil/stigs/compilations/Pages/index.aspx
- https://www.powershellgallery.com/profiles/michael.haken/
- https://github.com/alulsh/SharePoint-2013-STIGs
- https://blogs.technet.microsoft.com/matt_hinsons_manageability_blog/2016/01/29/gpo-packs-in-mdt-2013-u1-for-windows-10/
- https://www.microsoft.com/en-us/download/confirmation.aspx?id=55319
- https://github.com/search?l=PowerShell&q=STIG&type=Repositories&utf8=%E2%9C%93
- https://github.com/mwrlabs/gists/blob/master/PowerView-with-RemoteAccessPolicyEnumeration.ps1
- https://github.com/Microsoft/PowerStig
About
Applies DISA STIGS GPO Policy's offline
Topics
Resources
Uh oh!
There was an error while loading.Please reload this page.