Powershell scripts for making your Windows System secured against Ransomeware threats! This scripts allow an administrator to harden the Windows Environment
Read the comments in powershell code before executing them
Run this scripts using powershell
- It does NOT prevent software from being exploited
- It does NOT prevent the abuse of every available risky feature.
- It does NOT prevent the changes it implements from being reverted. If malicious code runs on the system and it is able to restore them, the premise of the tool is defeated
yes, this script enforces Zero Trust to a certain level supported by OS
- Applocker
- WDAC
- Group Policy
- MS Defender
All of the scripts run latest Windows 11 , Windows 10 and latest version of Windows server edition and some of these script won't run on older version of Windows
- Use this scripts with care and modify these scripts according to your system and environment
- Always install an Antivirus or Windows Defender along with these scripts
-
Enable_ASR.ps1 - This script enables Attack Surface Reduction modules in Windows
-
Enable_netprotection.ps1 - this script enables network protection of Windows Defender
-
Block_lolbins.ps1 - This script blocks certain executable in system32 missused by malware
-
block-modification-services.ps1 - This script block modification of Windows services
-
block-sctask.ps1 - This script disable scheduled task creation
-
block_debug_exe.ps1 - This script blocks executables compiled in debug mode from execution
-
block_unsigned_exe.ps1 - This script block executables which are not signed from execution
-
block_write_autorun.ps1 - This script block process from modification of autorun in registry
-
disable-cmd.ps1 - This script blocks cmd.exe
-
disable-powershell.ps1 - This script blocks powershell.exe (Run this script at last)
-
enable-protected-folder.ps1 - This script enable protected folder
-
restrict-dll.ps1 - This script allow dll loading from program files directory only
-
restrict-exe.ps1 - This script allow exe loading from program files directory only
-
restrict-download.ps1 - This script blocks downloads in edge and internet explorer
-
Whitelist_lolbins.ps1 - This script whitelist blocked certain executable in system32 missused by malware
-
harden_step1.ps1 - This script witll do the following
- Disable Remote Desktop
- Send NTLMv2 response only/refuse LM and NTLM
- Do not allow anonymous enumeration of SAM accounts and shares
- Restrict Anonymous Access
- Disable IE Password Cache
- Disable Edge Password Cache
-
harden_step4.ps1: This script hardens the Office
https://github.com/securitywithoutborders/hardentools Thanks @securitywithoutborders for harden
Run Hardentool before Runing these scripts and Run only scripts who features are not covered by Hardentools