Releases: 0x6d69636b/windows_hardening
v.0.9.3
Update HardeningKitty
[*] Bug fixes
[*] Add new finding lists and update existing
[*] Improve documentation
Many thanks to @Maggsi and @rafalfitt
v.0.9.2
Update HardeningKitty
[*] Add new finding lists and update existing
[*] Improve documentation
v.0.9.1
v.0.9.0
Update HardeningKitty
[+] Convert HardeningKitty into a PowerShell module
[+] Create a system restore point before running HailMary
[+] Add module ScheduledTask
[+] Add a filter function
[+] Add parameter SkipUserInformation
[+] Add parsing of Defender configuration when using Microsoft Intune
[*] Update documentation (README)
[*] Rewrite generation of report and log files
[*] Add new finding lists and update existing
[-] Remove Policy Analyzer rules
Many thanks to @BZanten, @rafalfitt, and @ataumo for their support!
v.0.8.1
Update HardeningKitty
[*] Bug fixes and Code Refactoring
Many thanks to @BZanten, @rafalfitt, @ataumo, and @flambye94 for their support!
This is the last release before turning Hardening-Kitty in a proper module.
v.0.8.0
Update HardeningKitty
[+] Add new list Security Baseline Edge 97, 98
[+] Add new list Security baseline for Microsoft 365 Apps for enterprise, v2206
[+] Add new list CIS Microsoft Windows 10 Enterprise 21H2
[+] Add new list CIS Microsoft Windows Server 2022 21H2
[+] Add new list CIS Microsoft Windows 11 Enterprise 21H2
[+] Add new list CIS Microsoft Windows 10 Enterprise 21H1
[+] Add new list CIS Microsoft Windows Server 2016 v1.3.0
[*] Bug fixes and Code Refactoring
Many thanks to @An78toi13ne06, @chadmando, and @ataumo for their support!
v.0.7.0
Update HardeningKitty
[+] Add new list Security Baseline Edge 91 - 96
[+] Add new list Security baseline for Microsoft 365 Apps
[+] Add new list Security Baseline Windows Server 2022
[+] Add new list Security Baseline Windows 11
[+] Add new list Security Baseline Windows 10 21H2
[+] Add new ASR rule: "Block abuse of exploited vulnerable signed drivers"
[+] Add finding "Enable sandboxing for Microsoft Defender Antivirus"
[+] Add findings for countermeasures against CVE-2021-34527
[+] Add new countermeasures against PrintNightmare
[+] Add new findig Disable Co-Installer (USB Autoinstall)
[+] Add parameter Backup
[+] Add PowerShell version and System Language to Log
[+] Add language warning and update machine information
[*] Update auditpol audit
[*] Bug fixes
Many thanks to @ataumo, @linkmk, @lordfiSh, @gderybel, and @Harvester57 for their support!
v.0.6.0
Update HardeningKitty
[+] Add new list Microsoft Windows Server TLS Settings
[+] Add new lists BSI SiSyPHuS Win10
[+] Add new operator equal or null
[+] Add parameter SkipMachineInformation
[+] Add functions for SID translation
[+] Add SID translation for accesschk
[+] Add HardeningKittyVersion
[+] Add CIS Windows Server lists
[*] Rewrite Module accessck, use secedit instead of accessck in Audit mode
[*] Use new operator for some services (disabled or not installed)
[*] Update RecommendedValue for ID 19.7.7.1 / 19.7.8.1
[*] Update RegistryPath for ID 2.3.7.7
[*] Update RegistryPath for ID 18.8.22.1.1
[*] Use new operator for ID 18.9.77.3.2 (Join MAPS)
[*] Update RecommendedValue for ID V-74413
[*] Update RecommendedValue for ID 1064
[*] Update README
[-] Remove Dependency for accessck
Many thanks to @lordfiSh, @Harvester57, @An78toi13ne06 and @mrsheepsheep for their support!
v.0.5.5
Update HardeningKitty
[+] Add new CIS lists
[+] Add new DoD STIG lists
[+] Add new operator less-than but not 0
[+] Add module ProcessmitigationApplication
[*] Bug fixes
Many thanks to @beerisgood for his support!
v.0.5.0
Update Hardening Kitty
[+] Add lists for CIS benchmarks and Microsoft Office
[+] Add HardeningKitty Score and Statistics
[+] Add modules for Firewall Rules, ASR, Windows services
[+] Add various modules for HailMary mode
Many thanks to @ConstantinT and @GlennMatthys for their support!