Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Applies DISA STIGS GPO Policy's offline

NotificationsYou must be signed in to change notification settings

PowerShellCrack/STIGSCAPWinTool

Repository files navigation

WHAT IS IT:

A PowerShell script that will take a GPO backup or SCAP XCCDF file and generate STIGs settingsThen apply them to a Windows OS using Microsoft's LGPO.exe tool from their Security Compliance Manager Toolkit

HOW TO USE IT:

ApplySTIGAndGPOs.ps1This is a more dynamic PowerShell script. This will detect roles,and features and even software and install the appropriate GPO backup.

ApplySTIGBySCAPs.ps1STILL DEVELOPING: This is the most advanced PowerShell script. This script will be a lotlike Linux's OpenSCAP, it will parse the XCCDF file from DISA and build a datasetof all STIG components and one by one it will apply the STIG based on the configuration files.Configuration files still need to be created, check out theREADME.md

RemoveSTIGAndGPOs.ps1This script just removes the group policy folders and clear the security database.

REQUIREMENTS:

  • Modules need to be downloaded. FollowREADME.md instructions in modules folder
  • STIG Naming conventions is required for STIG Tools. FollowREADME.md instructions in GPO folder
  • CCI required for SCAP Tools. FollowREADME.md instructions in CCI folder
  • SCAP Benchmarks required for SCAP Tools. FollowREADME.md instructions in SCAP folder
  • LGPO executable required for all tools. FollowREADME.md instructions in Tools folder
  • Configs files for each STIG ID. FollowREADME.md instructions in Tools folder

WHAT IT DOES:

ApplySTIGAndGPOs.ps1: The script will read into the GPO's backup.xml inside each GUID and identify the name of the policy. Using that information it will determine if the name matches identified system information, roles, features and install products and apply them locally using Microsoft's Security Compliance Manager tool LGPO. This ultimately read the GPO settings, and builds a file with all the registry and security settings, then applies those settings within the local gpo. These settings can then be viewed using the systems gpedit.msc. All keys and settings are backed up in the temp folder and logged in log folder.

FOLDERS:

CCI\U_CCI_List.xml <-- Used with ApplySTIGBySCAPs.ps1. Control Correlation Identifier (CCI) provides a standard identifier and description for each of the singular, actionable statements that comprise an IA control or IA best practiceConfigs\   <-- Used with ApplySTIGBySCAPs.ps1. Configuration files for each STIG ID. These are ini like files with commands for validation and remediation steps.Extensions\   <-- Used with ApplySTIGBySCAPs.ps1. PowerShell extension folder provides additional PowerShell functionsModules\   <-- Additional PowerShell modules found in PowerShell Gallery and elsewhereGPO\   <-- Used with ApplySTIGAndGPOs.ps1. Follow README.md instructions in folderLogs\   <-- Output logs for LGPO and advanced logging (Use CMTRACE)SCAP\   <-- SCAP Benchmark files. Follow README.md instructions in folderTemp\   <-- Store generated LGPO config and pol filesTools\   <-- Tools used in scripts, such as LGPODSC\   <-- NEW. The idea is to add dsc configuration files here and and apply them along with STIGS/SCAP

SOURCES:

About

Applies DISA STIGS GPO Policy's offline

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp