Comprehensive Module-Based Multi-Framework Windows Security Assessment/Auditing & Remediation Tool
Overview β’ Key Features β’ Quick Start β’ Documentation β’ Remediation Capabilities β’ Contributing
The Windows Security Audit Project is an advanced PowerShell-based security compliance auditing tool that evaluates Windows systems against multiple industry-standard security frameworks. Version 6.0 introduces severity classification, cross-framework correlation, cache-aware architecture, and standalone module execution, building on the intelligent remediation, enhanced reporting, and SIEM integration introduced in v5.3.
The tool performs 3,199 automated security checks across sixteen compliance modules, generating comprehensive reports in multiple formats with actionable remediation guidance. Every check now includes a severity rating and cross-references to equivalent controls across other frameworks, enabling multi-framework compliance scoring from a single audit run. Whether you're conducting compliance audits, hardening systems, or maintaining security baselines, this tool provides the insights and automation you need.
- β 3,199 Security Checks across 16 major security frameworks
- β Multi-Framework Coverage β CIS, NIST, STIG, NSA, CISA, Microsoft, Microsoft Defender ATP, Core, ACSC Essential Eight, CMMC, ENISA, GDPR, HIPAA, ISO 27001, PCI DSS, SOC 2
- β Modular Architecture β run all frameworks or select specific modules
- β Severity Classification β every check rated Critical/High/Medium/Low/Informational
- β Cross-Framework Correlation β 3,000+ cross-reference mappings linking checks to equivalent controls
- β Standalone Module Execution β run any module independently for targeted testing
- β Result Validation β automated data integrity checks and normalization
- β No External Dependencies β pure PowerShell implementation using stdlib only
- β
Interactive HTML Reports with:
- π Dark/Light theme toggle
- π Advanced filtering and sorting per column
- π€ Export All / Export Selected modal (CSV, Excel, JSON, XML Workbook, SIEM XML, TXT)
- βοΈ Checkbox-based selective export
- π Per-module and global export options
- π Executive dashboard with statistics
- β SIEM-Compatible XML output for security monitoring platforms
- β Multiple Output Formats - HTML, JSON, CSV, XML, Console, plus 6 browser-based exports
- β 9-Field Result Objects β Module, Category, Status, Severity, Message, Details, Remediation, CrossReferences, Timestamp
- β Structured Data β API and automation-friendly formats
- β Interactive Remediation - Review and apply fixes individually
- β Automated Remediation - Batch fix with safety confirmations
- β Selective Remediation - Target specific status types (Fail, Warning, Info)
- β Targeted Remediation - Fix only selected issues from JSON export
- β Remediation Logging - Comprehensive audit trail of all changes
- β Safety Mechanisms - Double-confirmation and countdown timers
- β Rollback Support - Detailed logs for reverting changes
- β Result Validation - Ensures data integrity across all modules
- β Status Normalization - Consistent categorization (Pass/Fail/Warning/Info/Error)
- β Module Statistics - Real-time tracking and reporting
- β Execution Metadata - Complete audit trail preservation
- β Error Handling - Graceful degradation on check failures
- β Severity Classification β every check classified by risk impact (Critical/High/Medium/Low/Informational)
- β Cross-Framework Mapping β correlate findings across NIST, CIS, STIG, NSA, CISA
- β Cache-Aware Architecture β registry query caching for performance optimization
- β Standalone Execution β any module can run independently without the orchestrator
- β Microsoft Defender ATP Module β 86 EDR/ATP-specific checks
- β 8 New Compliance Frameworks β ACSC Essential Eight, CMMC 2.0, ENISA, GDPR, HIPAA, ISO 27001:2022, PCI DSS v4.0, SOC 2 Type II
- β Interactive HTML Dashboard β severity cards, category detail tables, export modal, remediation priority ranking
- β 6 Browser Export Formats β CSV, Excel (XLS), JSON, XML Workbook (XSL-styled), SIEM-compatible XML, Plain Text
- β Automatic JSON Companion β structured JSON file generated alongside every HTML report
- β Deep Navy Dark Theme β matching Linux Security Audit report styling
- β 3.4Γ more checks β expanded from 550+ to 3,199 total checks
- β 9-Field Result Objects β added Severity and CrossReferences to every check output
| Module | Framework | Checks | Focus Areas |
|---|---|---|---|
| Core | Foundational Windows Security Baseline | 177 | Essential system security, hardware, TLS, PowerShell |
| CIS | CIS Microsoft Windows Benchmarks v3.0+ | 223 | Industry best practices, credential protection, MSS registry |
| MS | Microsoft Security Baselines (SCT) | 314 | Defender, AppLocker, ASR, exploit protection, 33 categories |
| MS-DefenderATP | Microsoft Defender for Endpoint | 86 | EDR, onboarding, TVM, AIR, tamper protection |
| NIST | NIST 800-53 Rev 5, CSF 2.0, 800-171 | 474 | Federal compliance, 18 control families (AC, AU, IA, SC, SI, CM) |
| STIG | DISA Security Technical Implementation Guide | 185 | DoD requirements, CAT I/II/III, credential/TLS/hardware hardening |
| NSA | NSA Cybersecurity Information Sheets | 173 | Nation-state threat mitigation, certificate trust, wireless, exploit mitigation |
| CISA | CISA Cybersecurity Performance Goals | 231 | Critical infrastructure, Zero Trust, supply chain, BOD 22-01/23-01 |
| ACSC | Australian CSC Essential Eight | 123 | Application control, patching, macros, hardening, admin privileges, MFA, backups |
| CMMC | CMMC 2.0 Level 2 | 103 | Access control, audit, config management, authentication, media, comms, integrity |
| ENISA | ENISA Cybersecurity Good Practices | 198 | Network security, IAM, patch mgmt, cryptography, logging, data protection |
| GDPR | GDPR Technical Controls (Art. 5/25/32/33) | 133 | Privacy by design, encryption, confidentiality, availability, breach response |
| HIPAA | HIPAA Security Rule (45 CFR 164) | 184 | Access control, audit controls, authentication, integrity, transmission security |
| ISO27001 | ISO/IEC 27001:2022 Annex A | 244 | Organizational, people, physical, authentication, backup, cryptography, hardening |
| PCI-DSS | PCI DSS v4.0 | 227 | Network security, secure config, stored data, crypto, malware, access control |
| SOC2 | SOC 2 Type II Trust Service Criteria | 124 | Control activities, logical access, operations, change mgmt, availability |
Total Coverage: 3,199 security checks with severity classification and cross-framework correlation across access control, authentication, auditing, network security, data protection, malware defense, system hardening, EDR, Zero Trust architecture, privacy compliance, payment card security, and healthcare data protection.
- Operating System: Windows 10/11 or Windows Server 2016/2019/2022/2025
- PowerShell: Version 5.1 or later (included in modern Windows)
- Privileges: Administrator rights required for complete results
- Privileges for Remediation: Administrator rights mandatory for applying fixes
- Clone the repository:
git clone https://github.com/Sandler73/Windows-Security-Audit-Project.git
cd Windows-Security-Audit-Project- Set execution policy (if needed):
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser- Verify prerequisites:
# Check PowerShell version
$PSVersionTable.PSVersion
# Check if running as Administrator
([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)Run full audit with default HTML report:
.\Windows-Security-Audit.ps1Run specific frameworks:
.\Windows-Security-Audit.ps1 -Modules Core,NIST,CISARun with Defender ATP assessment:
.\Windows-Security-Audit.ps1 -Modules Core,MS,MS-DefenderATPGenerate CSV output:
.\Windows-Security-Audit.ps1 -OutputFormat CSVSIEM integration with XML:
.\Windows-Security-Audit.ps1 -OutputFormat XML -OutputPath "\\SIEM\imports\audit.xml"Run a single module standalone (no orchestrator needed):
.\modules\module-cis.ps1Version 5.3 introduces comprehensive remediation features with multiple workflows to suit different needs and risk tolerances.
Review and approve each fix individually:
.\Windows-Security-Audit.ps1 -RemediateIssues- Prompts for each remediation
- Full visibility into changes
- Skip option (Y/N/S)
- Recommended for production systems
Target specific severity levels:
# Fix only critical failures
.\Windows-Security-Audit.ps1 -RemediateIssues_Fail
# Fix warnings interactively
.\Windows-Security-Audit.ps1 -RemediateIssues_Warning
# Address informational items
.\Windows-Security-Audit.ps1 -RemediateIssues_Info
# Fix everything (all status types)
.\Windows-Security-Audit.ps1 -RemediateIssuesBatch remediation with safety confirmations:
.\Windows-Security-Audit.ps1 -RemediateIssues_Fail -AutoRemediateSafety Features:
- Displays all changes before execution
- Requires typing "YES" to confirm
- Secondary confirmation with 10-second timeout
- Requires typing "CONFIRM" to proceed
- Comprehensive remediation logging
Fix only specific issues selected from HTML report:
Workflow:
# Step 1: Run audit and review findings
.\Windows-Security-Audit.ps1
# Step 2: In HTML report, select specific issues and click "Export Selected"
# This generates a JSON file (e.g., Selected-Report.json)
# Step 3: Run targeted auto-remediation
.\Windows-Security-Audit.ps1 -AutoRemediate -RemediationFile "Selected-Report.json"Benefits:
- Surgical precision - fix only what you select
- Review in detail before committing
- Perfect for change control processes
- Ideal for compliance-driven remediation
All remediation actions are logged with full details:
Remediation-Log-YYYYMMDD-HHMMSS.json
Log includes:
- Timestamp for each action
- Module and category
- Issue description
- Remediation command executed
- Success/failure status
- Error messages (if failed)
========================================================================================================
REMEDIATION MODE
========================================================================================================
[*] Mode: Remediate FAIL issues only
[*] Found 42 issue(s) with remediation available
[*] Issue: SMBv1 protocol is ENABLED
Module: STIG | Status: Fail | Category: STIG - V-220968 (CAT II)
Remediation: Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol -NoRestart
Apply remediation? (Y/N/S=Skip remaining): Y
[+] Remediation applied successfully
[*] Issue: Guest account is ENABLED
Module: Core | Status: Fail | Category: Core - Accounts
Remediation: Disable-LocalUser -Name Guest
Apply remediation? (Y/N/S=Skip remaining): Y
[+] Remediation applied successfully
========================================================================================================
Remediation Summary:
Total issues found: 42
Successfully remediated: 38
Failed remediations: 2
Skipped: 2
Success rate: 90.5%
========================================================================================================
[*] Remediation log saved to: Remediation-Log-20250101-120000.json
[*] Some settings may require a system restart to take effect.
Would you like to restart now? (Y/N):
Features:
- π¨ Theme Toggle - Switch between light and dark modes
- π Executive Dashboard - Summary statistics and compliance overview
- π Advanced Filtering - Filter by status, category, or keyword per column
βοΈ Dynamic Sorting - Click column headers to sort- π€ Export Options:
- Export All - Complete report in multiple formats
- Export Selected - Choose specific issues via checkboxes
- Per-Module Export - Export individual framework results
- Format Options - CSV, Excel, JSON, XML, TXT
- π Collapsible Modules - Expand/collapse each framework section
- π§ Remediation Guidance - Detailed fix instructions for each finding
- π± Responsive Design - Works on desktop and tablet displays
Export Workflow:
- Review findings in HTML report
- Use checkboxes to select specific issues
- Click "Export Selected" β Choose format (JSON for remediation)
- Use exported JSON with
-RemediationFileparameter
Standardized format for security monitoring platforms:
<?xml version="1.0" encoding="UTF-8"?>
<security_audit>
<metadata>
<export_date>2025-01-01T12:00:00Z</export_date>
<computer_name>HOSTNAME</computer_name>
<total_checks>3199</total_checks>
<pass_count>456</pass_count>
<fail_count>42</fail_count>
</metadata>
<events>
<event>
<timestamp>2025-01-01T12:00:00Z</timestamp>
<module>STIG</module>
<status>Fail</status>
<category>V-220968</category>
<message>SMBv1 protocol is ENABLED</message>
<remediation>Disable-WindowsOptionalFeature...</remediation>
</event>
</events>
</security_audit>Use Cases:
- Splunk, QRadar, ArcSight integration
- Automated compliance monitoring
- Trend analysis and alerting
- Centralized security dashboards
{
"ExecutionInfo": {
"ComputerName": "HOSTNAME",
"OSVersion": "Windows 11 Pro",
"ScanDate": "2025-01-01 12:00:00",
"Duration": "00:02:34",
"TotalChecks": 3199,
"PassCount": 456,
"FailCount": 42
},
"Results": [
{
"Module": "STIG",
"Category": "STIG - TLS/SSL",
"Status": "Fail",
"Severity": "High",
"Message": "V-220968: SMBv1 protocol is ENABLED",
"Details": "CAT II: Disable SMBv1 immediately β lateral movement vector",
"Remediation": "Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol -NoRestart",
"CrossReferences": { "STIG": "V-220968", "NIST": "SC-8", "CIS": "18.3.3" },
"Timestamp": "2025-03-03 12:00:00"
}
]
}Excel-compatible format for:
- Pivot tables and dashboards
- Remediation tracking
- Progress monitoring
- Management reporting
========================================================================
Windows Security Audit Script v6.0
Comprehensive Multi-Framework Security Assessment
========================================================================
[*] Modules to execute: Core, CIS, MS, MS-DefenderATP, NIST, STIG, NSA, CISA
[Core] Starting core security baseline checks...
[+] Module Core completed: 176 checks (152 pass, 12 fail, 12 warning)
[STIG] Checking DISA STIG compliance...
[+] Module STIG completed: 184 checks (148 pass, 22 fail, 14 warning)
========================================================================
AUDIT SUMMARY
========================================================================
Total Checks: 3199
Passed: 1542 (83.1%)
Failed: 156 (8.4%)
Warnings: 118 (6.4%)
Info: 28 (1.5%)
Errors: 0 (0.0%)
Duration: 00:02:34
========================================================================
[+] HTML report saved to: Security-Audit-Report-20250101-120000.html
[*] Opening report in browser...
[+] Audit completed successfully!
Comprehensive documentation is available in the Project Wiki:
- Quick Start Guide - Get up and running in 5 minutes
- Usage Guide - Detailed command-line options and workflows
- Framework Reference - Detailed framework mappings and control IDs
- Module Documentation - Individual module specifications
- Output Reference - Report format specifications
- Development Guide - Contributing and extending modules
- Troubleshooting Guide - Common issues and solutions
- FAQ - Frequently asked questions
.\Windows-Security-Audit.ps1
[-Modules <String[]>] # Frameworks to run (default: All β includes MS-DefenderATP)
[-OutputFormat <String>] # Output format: HTML, CSV, JSON, XML, Console
[-OutputPath <String>] # Custom output path
[-RemediateIssues] # Interactive remediation (all statuses)
[-RemediateIssues_Fail] # Remediate FAIL status only
[-RemediateIssues_Warning] # Remediate WARNING status only
[-RemediateIssues_Info] # Remediate INFO status only
[-AutoRemediate] # Automated remediation with confirmations
[-RemediationFile <String>] # JSON file with selected issues to remediateFramework Selection:
# Run all frameworks (default)
.\Windows-Security-Audit.ps1
# Run specific frameworks
.\Windows-Security-Audit.ps1 -Modules Core,NIST,CISA
# Run single framework
.\Windows-Security-Audit.ps1 -Modules STIGOutput Control:
# Generate HTML report (default)
.\Windows-Security-Audit.ps1 -OutputFormat HTML
# Generate CSV for Excel analysis
.\Windows-Security-Audit.ps1 -OutputFormat CSV
# Generate XML for SIEM
.\Windows-Security-Audit.ps1 -OutputFormat XML
# Console output only
.\Windows-Security-Audit.ps1 -OutputFormat Console
# Custom output location
.\Windows-Security-Audit.ps1 -OutputPath "C:\SecurityAudits\Report.html"Remediation Workflows:
# Interactive remediation (review each)
.\Windows-Security-Audit.ps1 -RemediateIssues
# Auto-fix critical failures only
.\Windows-Security-Audit.ps1 -RemediateIssues_Fail -AutoRemediate
# Interactive fix warnings
.\Windows-Security-Audit.ps1 -RemediateIssues_Warning
# Targeted remediation from JSON
.\Windows-Security-Audit.ps1 -AutoRemediate -RemediationFile "Selected-Report.json"Scenario: Annual SOC 2, FISMA, or CMMC compliance audit
# Generate comprehensive compliance report
.\Windows-Security-Audit.ps1 -Modules NIST,STIG,CIS -OutputFormat HTML
# Export findings to CSV for compliance tracking
# Use HTML report's "Export All" β CSV featureScenario: Harden new Windows servers before production deployment
# Step 1: Baseline audit
.\Windows-Security-Audit.ps1 -Modules Core,CIS,MS
# Step 2: Review and auto-fix critical issues
.\Windows-Security-Audit.ps1 -RemediateIssues_Fail -AutoRemediate
# Step 3: Verify remediation
.\Windows-Security-Audit.ps1 -Modules Core,CIS,MSScenario: Monthly security posture checks
# Generate baseline
.\Windows-Security-Audit.ps1 -OutputPath "C:\Baselines\2025-01-baseline.html"
# Compare later
.\Windows-Security-Audit.ps1 -OutputPath "C:\Baselines\2025-02-check.html"
# Use CSV exports to track changes in ExcelScenario: Validate system security after suspected compromise
# Quick security validation (core checks)
.\Windows-Security-Audit.ps1 -Modules Core -OutputFormat JSON
# Comprehensive validation (all frameworks)
.\Windows-Security-Audit.ps1 -OutputFormat HTMLScenario: Automated compliance monitoring pipeline
# Scheduled task to generate XML for SIEM
.\Windows-Security-Audit.ps1 -OutputFormat XML -OutputPath "\\SIEM\drops\%COMPUTERNAME%-audit.xml"Scenario: Pre/post-change security validation
# Pre-change baseline
.\Windows-Security-Audit.ps1 -OutputPath "Pre-Change-Audit.json"
# Post-change validation
.\Windows-Security-Audit.ps1 -OutputPath "Post-Change-Audit.json"
# Compare JSON files programmaticallyWindows-Security-Audit/
βββ Windows-Security-Audit.ps1 # Main orchestrator (v5.3)
β βββ Result validation & normalization
β βββ Module execution engine
β βββ Multi-format report generation
β βββ Intelligent remediation system
β
βββ modules/ # Compliance framework modules
β βββ module-acsc.ps1 # ACSC Essential Eight (123 checks)
β βββ module-cis.ps1 # CIS Benchmarks (223 checks)
β βββ module-cisa.ps1 # CISA Best Practices (231 checks)
β βββ module-cmmc.ps1 # CMMC Level 2 (103 checks)
β βββ module-core.ps1 # Core Security Baseline (177 checks)
β βββ module-enisa.ps1 # ENISA Guidelines (198 checks)
β βββ module-gdpr.ps1 # GDPR Technical Controls (133 checks)
β βββ module-hipaa.ps1 # HIPAA Security Rule (184 checks)
β βββ module-iso27001.ps1 # ISO 27001:2022 (244 checks)
β βββ module-ms.ps1 # Microsoft Baselines (314 checks)
β βββ module-ms-defenderatp.ps1 # Defender ATP (86 checks)
β βββ module-nist.ps1 # NIST SP 800-53/CSF (474 checks)
β βββ module-nsa.ps1 # NSA Guidance (173 checks)
β βββ module-pcidss.ps1 # PCI DSS v4.0 (227 checks)
β βββ module-soc2.ps1 # SOC 2 Type II (124 checks)
β βββ module-stig.ps1 # DISA STIGs (185 checks)
β
βββ Reports/ # Generated reports (auto-created)
β βββ Security-Audit-Report-*.html
β βββ Security-Audit-Report-*.json
β βββ Security-Audit-Report-*.csv
β βββ Security-Audit-Report-*.xml
β
βββ Logs/ # Remediation logs (auto-created)
β βββ Remediation-Log-*.json
β
βββ README.md # This file
βββ CONTRIBUTING.md # Contribution guidelines
βββ CHANGELOG.md # Version history
βββ SECURITY.md # Security policy
βββ LICENSE # MIT License
βββ .gitignore # Git ignore rules
| Domain | Checks | Examples |
|---|---|---|
| Access Control | 200+ | Account policies, user rights, privilege management, local admin enumeration |
| Authentication | 160+ | Password policies, MFA requirements, credential protection (WDigest, LSASS) |
| Audit & Accountability | 140+ | Event logging (18+ subcategories), audit policies, log retention, PowerShell logging |
| System Hardening | 250+ | UAC, Secure Boot, service configuration, AutoPlay/AutoRun, least privilege |
| Network Security | 180+ | Firewall (all profiles), SMB security, LLMNR, NetBIOS, protocol hardening |
| Data Protection | 120+ | BitLocker encryption, EFS usage, data at rest/in transit protection |
| Malware Defense | 150+ | Windows Defender (real-time, cloud, behavior), signature updates, ASR rules |
| Application Control | 80+ | AppLocker policies, WDAC, software restriction, execution policies |
| Update Management | 60+ | Windows Update status, pending updates, automatic update configuration |
| Incident Response | 50+ | System Restore, backup configuration, VSS, recovery capabilities |
β Critical Security Controls:
- SMBv1 protocol disabled (WannaCry/NotPetya vector)
- BitLocker encryption enabled on system drive
- Windows Defender real-time protection active
- PowerShell v2 disabled (no logging, downgrade attacks)
- Guest account disabled
- Built-in Administrator renamed/disabled
- UAC enabled with secure desktop prompts
- Account lockout policy configured (β€5 attempts)
- Network Level Authentication required for RDP
- LSASS running as Protected Process Light
β Compliance Requirements:
- Minimum password length β₯14 characters (STIG)
- Password history β₯24 passwords (STIG/CIS)
- Audit policy configured for 18+ subcategories (NIST)
- Security event log β₯1024 MB (STIG)
- Firewall enabled on all profiles (CAT I)
- LAN Manager authentication level β₯5 (STIG)
- SMB signing required (NIST/CIS)
- WDigest credential caching disabled (NSA)
β Hardening Measures:
- Credential Guard enabled (if supported)
- Device Guard/HVCI configured
- Attack Surface Reduction rules active
- Controlled Folder Access (ransomware protection)
- Network Protection enabled
- Exploit Protection configured
- Secure Boot enabled
- Unnecessary services disabled
See Module Documentation for complete check listings.
Audit Mode:
- Many checks require Administrator privileges
- Non-admin execution shows warnings but continues
- Some checks will return "Unable to verify" without elevation
Remediation Mode:
- Administrator privileges MANDATORY
- Script validates admin rights before remediation
- Exits gracefully if running without elevation
Execution Time:
- Full audit (all 16 modules): 3-7 minutes
- Single module: 15-60 seconds
- Factors: System speed, enabled features, module selection
System Impact:
- Read-only operations during audit (no changes)
- Minimal CPU/memory usage
- No network traffic (except Windows Update checks)
- Safe to run on production systems
Remediation Impact:
- Makes persistent configuration changes
- May affect system functionality
- Some changes require restart
- Test in non-production first
β What the script does:
- Reads system configuration (registry, services, policies)
- Queries Windows Security Center
- Checks file/folder permissions
- Generates local reports
β What the script does NOT do:
- Transmit data externally
- Install software
- Create network connections (except localhost)
- Access user data or files
- Modify system during audit (only with remediation flags)
Report Security:
- Reports may contain sensitive system information
- Store reports securely with appropriate access controls
- Sanitize reports before sharing externally
- Consider encrypting reports for compliance
Before Production Use:
- Test on non-production systems first
- Review all remediation commands before auto-applying
- Create system restore point before remediation
- Have backups available
- Plan maintenance window for changes requiring restart
Validation:
- Run baseline audit, remediate, then re-audit
- Compare before/after results
- Verify system functionality after remediation
- Check application compatibility
- Local assessment only - Does not audit remote systems or domains
- Point-in-time - Results represent configuration at execution time
- Platform-specific - Windows 10/11 and Server 2016+ only
- Feature detection - Some checks may not apply to all Windows editions
- No active scanning - Does not test for exploitable vulnerabilities
This tool is provided for security assessment and compliance auditing purposes. Results should be reviewed by qualified security professionals and validated in the context of your environment. The tool identifies potential security issues but does not guarantee comprehensive security coverage. Always test in non-production environments before applying remediations to production systems.
We welcome contributions! Please see CONTRIBUTING.md for details.
- π Report bugs - Found an issue? Open a GitHub issue
- π‘ Suggest features - Have an idea? Start a discussion
- π Improve documentation - Enhance wiki pages and examples
- π§ Submit bug fixes - Fix issues and submit PRs
- β¨ Add checks - Contribute new security checks or modules
- π§ͺ Test - Validate on different Windows versions
- π Translate - Help with internationalization
- Fork the repository
- Create a feature branch (
git checkout -b feature/NewSecurityCheck) - Follow coding standards (see Development Guide)
- Test thoroughly on multiple Windows versions
- Update documentation
- Commit changes (
git commit -m 'Add: New SMB3 encryption check') - Push to branch (
git push origin feature/NewSecurityCheck) - Open a Pull Request with detailed description
- PowerShell style - Follow PowerShell best practices
- Error handling - Use try/catch blocks appropriately
- Comments - Document complex logic
- Function naming - Use Verb-Noun format
- Result format - Follow standardized output structure
- Testing - Validate on Windows 10, 11, Server 2019, 2022
This project is licensed under the MIT License - see LICENSE for details.
β You can:
- Use commercially
- Modify and distribute
- Use privately
- Sublicense
β You cannot:
- Hold authors liable
- Use trademarks
π You must:
- Include license and copyright notice
- State changes made
This project builds upon the work and guidance of various security organizations:
- DISA - Defense Information Systems Agency STIGs
- NIST - National Institute of Standards and Technology
- CIS - Center for Internet Security Benchmarks
- NSA - National Security Agency Cybersecurity Guidance
- CISA - Cybersecurity and Infrastructure Security Agency
- Microsoft - Security Compliance Toolkit
- Contributors who've submitted PRs and reported issues
- Security professionals who've provided feedback
- Windows administrators who've tested in production environments
- PowerShell team for the excellent scripting platform
- Windows security community for research and documentation
- π Documentation - Project Wiki
- β Questions - GitHub Discussions
- π Bug Reports - GitHub Issues
- π¬ Community - [Security Community Forums]
- β Star the repository - Get notifications for new releases
- π Watch - Follow development activity
- π Subscribe to releases - Get notified of new versions
- Review SECURITY.md for vulnerability reporting
- Report security issues privately via GitHub Security Advisories
- Expected response time: 48-72 hours
| Metric | Value |
|---|---|
| Current Version | 6.0 |
| Total Security Checks | 3,199 |
| Frameworks Covered | 8 |
| Code Base | ~21,200 lines of PowerShell (modules: 19,593 + orchestrator: ~1,600) |
| Modules | 8 specialized compliance modules |
| Output Formats | 5 (HTML, JSON, CSV, XML, Console) |
| Windows Versions Tested | 10, 11, Server 2016/2019/2022 |
| PowerShell Version | 5.1+ |
| Result Fields | 9 (with Severity and CrossReferences) |
| Cross-Reference Mappings | 1,568 |
| Active Development | β Yes |
- β¨ NEW: Severity classification on every check (Critical/High/Medium/Low/Informational)
- β¨ NEW: Cross-framework correlation with 1,568 mappings
- β¨ NEW: Microsoft Defender for Endpoint module (86 checks)
- β¨ NEW: Standalone module execution support
- β¨ NEW: Cache-aware registry helpers
- β¨ NEW: 9-field result objects (added Severity and CrossReferences)
- π§ EXPANDED: 3,199 total checks (up from 550+)
- π§ EXPANDED: 16 modules (expanded from original 8)
- π FIXED: STIG $anonSid unused variable, NIST $Priority/$Severity mismatch, MS $profile reserved variable
- β¨ NEW: Interactive and automated remediation system
- β¨ NEW: Targeted remediation from HTML report selections
- β¨ NEW: SIEM-compatible XML output format
- β¨ NEW: Enhanced HTML reports with theme toggle
- β¨ NEW: Multi-format export from HTML (CSV, Excel, JSON, XML, TXT)
- β¨ NEW: Result validation and normalization system
- β¨ NEW: Comprehensive remediation logging
- π§ IMPROVED: Safety mechanisms for automated remediation
- π§ IMPROVED: Module statistics and execution tracking
- π FIXED: Status value consistency across modules
- π FIXED: Result object validation and repair
- Complete rewrite with modular architecture
- 550+ security checks across 7 frameworks
- Multiple output formats (HTML, JSON, CSV)
- Improved error handling and logging
- Comprehensive documentation
See CHANGELOG.md for complete version history.
β If this project helps you secure Windows systems, please consider giving it a star! β
Made with β€οΈ for the Windows security community
π Documentation β’ π Report Bug β’ β¨ Request Feature