Enterprise-Grade Windows Security Auditing & Threat Detection Toolkit
π― Zero Dependencies β’ π Production Ready β’ π Community Driven β’ πΌ Enterprise Tested
Features β’ Installation β’ Quick Start β’ Support
If you find this tool valuable for your security operations, consider supporting its development:
In today's rapidly evolving threat landscape, organizations face unprecedented challenges in maintaining robust security postures across their Windows infrastructure. Traditional security tools often fall short, requiring multiple expensive licenses, complex integrations, and specialized expertise. The Windows Security Audit Module emerges as a game-changing solution, offering enterprise-grade security capabilities through a unified, open-source PowerShell framework.
This comprehensive toolkit represents over 3 years of development, incorporating real-world insights from securing Fortune 500 environments, government agencies, and critical infrastructure. With 58 meticulously crafted functions organized into 14 specialized modules, it delivers capabilities typically found only in solutions costing $50,000+ annually - completely free and open source.
Our mission is to democratize enterprise security by providing world-class security tools to organizations of all sizes. Whether you're a solo IT administrator protecting a small business or a CISO managing security for thousands of endpoints, this module provides the professional-grade capabilities you need to detect threats, validate compliance, and respond to incidents effectively.
The Problem We Solve:
Modern enterprises typically juggle 15-20 different security tools, each with its own interface, licensing model, and learning curve. This fragmentation leads to:
- Security Gaps: Critical threats missed between tool boundaries
- Operational Inefficiency: Hours wasted switching between platforms
- Budget Constraints: Millions spent on overlapping capabilities
- Skill Requirements: Need for multiple specialized experts
- Integration Nightmares: Custom development for tool interoperability
Our Solution:
A single, cohesive PowerShell module that consolidates essential security functions into one powerful toolkit. Built on native Windows capabilities, it requires zero external dependencies while delivering enterprise-scale performance and reliability.
- π Deployment Speed: From download to production in under 10 minutes
- π° Cost Savings: Replace $100,000+ in commercial tools
- β±οΈ Time Efficiency: Reduce security assessments from days to hours
- π― Detection Rate: Identify threats missed by leading commercial solutions
- π Compliance: Automate 90% of audit evidence collection
| Capability | Windows Security Audit Module | Commercial Solutions | Other Open Source |
|---|---|---|---|
| Total Cost | β Free Forever | β $50K-200K/year | β Free |
| Functions | β 58 Comprehensive | ||
| Dependencies | β None (Native PowerShell) | β Multiple Agents | β Python/Ruby/Tools |
| Enterprise Scale | β 10,000+ Endpoints | β Varies | β Limited |
| Learning Curve | β PowerShell Knowledge | β Vendor Training | |
| Customization | β Full Source Code | β Limited APIs | β Open Source |
| Support | β Community + Pro | β Vendor Support |
WindowsSecurityAudit/
β
βββ π WindowsSecurityAudit.psd1 # Module manifest
βββ π WindowsSecurityAudit.psm1 # Module loader
βββ π CreateProjectFolderStructure.ps1 # Setup script
βββ π Test-Module.ps1 # Testing script
β
βββ π ActiveDirectory/ # AD Security (6 functions)
β βββ Find-ADBackdoors.ps1
β βββ Find-ADVulnerabilities.ps1
β βββ Find-StaleADObjects.ps1
β βββ Get-ADPasswordPolicy.ps1
β βββ Get-ADPrivilegedAccounts.ps1
β βββ Test-ADSecurityPosture.ps1
β
βββ π Analysis/ # System Analysis (4 functions)
β βββ Get-EventLogAnalysis.ps1
β βββ Get-FileSystemAnalysis.ps1
β βββ Get-MemoryAnalysis.ps1
β βββ Get-RegistryAnalysis.ps1
β
βββ π CloudSecurity/ # Cloud Security (3 functions)
β βββ Get-AzureADRiskySignIns.ps1
β βββ Get-CloudComplianceStatus.ps1
β βββ Test-M365SecurityPosture.ps1
β
βββ π Compliance/ # Compliance (5 functions)
β βββ Export-ComplianceEvidence.ps1
β βββ Get-ComplianceReport.ps1
β βββ Test-CISBenchmark.ps1
β βββ Test-NISTCompliance.ps1
β βββ Test-PCI-DSS.ps1
β
βββ π Core/ # Core Security (4 functions)
β βββ Get-EventIdDescription.ps1
β βββ Get-SecurityBaseline.ps1
β βββ Get-SystemInfo.ps1
β βββ Test-SystemIntegrity.ps1
β
βββ π Detection/ # Threat Detection (4 functions)
β βββ Find-NetworkAnomalies.ps1
β βββ Find-PersistenceMechanisms.ps1
β βββ Find-SuspiciousAuthentication.ps1
β βββ Find-SuspiciousProcesses.ps1
β
βββ π Enterprise/ # Enterprise (3 functions)
β βββ Get-MultiSystemAudit.ps1
β βββ Invoke-EnterpriseSecurityScan.ps1
β βββ Invoke-SecurityAssessment.ps1
β
βββ π Forensics/ # Digital Forensics (5 functions)
β βββ Export-MemoryDump.ps1
β βββ Get-ArtifactCollection.ps1
β βββ Get-ExecutionArtifacts.ps1
β βββ Get-USBHistory.ps1
β βββ New-ForensicTimeline.ps1
β
βββ π Hardening/ # Security Hardening (3 functions)
β βββ Enable-AuditPolicies.ps1
β βββ Enable-PowerShellSecurity.ps1
β βββ Set-SecurityBaseline.ps1
β
βββ π Private/ # Internal functions (hidden)
β
βββ π Reporting/ # Reporting (3 functions)
β βββ Get-SecurityMetrics.ps1
β βββ New-ExecutiveReport.ps1
β βββ New-SecurityDashboard.ps1
β
βββ π Response/ # Incident Response (3 functions)
β βββ Export-SecurityReport.ps1
β βββ Invoke-ForensicCollection.ps1
β βββ Invoke-IncidentResponse.ps1
β
βββ π Tests/ # Pester tests (in development)
β
βββ π ThreatHunting/ # Threat Hunting (6 functions)
β βββ Find-APTIndicators.ps1
β βββ Find-DataExfiltration.ps1
β βββ Find-LateralMovement.ps1
β βββ Find-LivingOffLand.ps1
β βββ Get-MITREAttackMapping.ps1
β βββ Get-ThreatIntelligence.ps1
β
βββ π Vulnerability/ # Vulnerability Management (6 functions)
β βββ Find-EOLSoftware.ps1
β βββ Get-ExposedServices.ps1
β βββ Get-SecurityMisconfigurations.ps1
β βββ Get-VulnerabilityAssessment.ps1
β βββ Test-CertificateHealth.ps1
β βββ Test-PatchCompliance.ps1
β
βββ π WindowsDefender/ # Windows Defender (3 functions)
βββ Get-DefenderStatus.ps1
βββ Invoke-DefenderScan.ps1
βββ Update-DefenderConfiguration.ps1
- Operating System: Windows 10 1809+ / Windows Server 2016+
- PowerShell: Version 5.1 (Windows PowerShell) or PowerShell 7+
- Memory: 4GB RAM (8GB recommended for enterprise scanning)
- Storage: 1GB for module + 10GB for reports and logs
- Processor: 2 cores minimum (4+ cores recommended)
- Network: Required for cloud security and multi-system scanning
- Local Administrator (most functions)
- Domain Administrator (Active Directory module)
- Global Administrator (Cloud Security module)
- Active Directory PowerShell Module: For AD security functions
- Azure AD PowerShell: For Azure/M365 assessments
- Windows Defender: For AV management functions
- .NET Framework 4.7.2+: For advanced reporting features
# Install from PowerShell Gallery
Install-Module -Name WindowsSecurityAudit -Scope CurrentUser -Force
# Import the module
Import-Module WindowsSecurityAudit
# Verify installation - should return 58
(Get-Command -Module WindowsSecurityAudit).Count# Download latest release
$url = "https://github.com/okanyildiz/WindowsSecurityAudit/releases/latest/download/WindowsSecurityAudit.zip"
$output = "$env:TEMP\WindowsSecurityAudit.zip"
Invoke-WebRequest -Uri $url -OutFile $output
# Extract to modules directory
$modulePath = "$env:USERPROFILE\Documents\PowerShell\Modules\WindowsSecurityAudit"
Expand-Archive -Path $output -DestinationPath $modulePath -Force
# Import module
Import-Module WindowsSecurityAudit -Force# Clone repository
git clone https://github.com/okanyildiz/WindowsSecurityAudit.git
cd WindowsSecurityAudit
# Run setup script
.\CreateProjectFolderStructure.ps1
# Test module
.\Test-Module.ps1# 1. Import the module
Import-Module WindowsSecurityAudit
# 2. Run quick assessment
$security = Get-SecurityBaseline
Write-Host "Security Score: $($security.SecurityScore)/100" -ForegroundColor Yellow
# 3. Check for threats
$threats = Find-SuspiciousProcesses
if ($threats) {
Write-Warning "Found $($threats.Count) suspicious processes!"
$threats | Format-Table Name, Path, RiskLevel
}# Run full security assessment
$report = Invoke-SecurityAssessment -Verbose
# Export professional report
$report | Export-SecurityReport -Format HTML -Path "C:\SecurityReports"
# Open report
Start-Process "C:\SecurityReports\SecurityReport.html"The Core module serves as the foundation of the entire security assessment framework. These functions provide essential baseline measurements and system integrity verification that other modules build upon. Every security assessment should begin with these core evaluations to establish a security context.
| Function | Purpose | Key Features | Output Type |
|---|---|---|---|
Get-SecurityBaseline |
Evaluates overall security posture against industry best practices | β’ Windows Defender real-time protection status β’ Firewall profile configuration (Domain/Private/Public) β’ UAC elevation settings β’ BitLocker encryption status β’ Windows Update compliance β’ Generates 0-100 security score based on CIS benchmarks |
PSCustomObject with scores, status, and recommendations |
Get-SystemInfo |
Collects comprehensive system information for security context | β’ Hardware specifications (CPU, RAM, Disks) β’ Operating system version and patches β’ Installed software inventory β’ Network adapter configuration β’ Domain membership and policies β’ Running services and drivers |
Detailed system profile for analysis |
Test-SystemIntegrity |
Verifies Windows system file integrity and health | β’ SFC (System File Checker) execution β’ DISM component store validation β’ Windows image health check β’ Corrupted file detection β’ Automatic repair recommendations β’ Boot configuration verification |
Integrity report with repair actions |
Get-EventIdDescription |
Provides security context for Windows Event IDs | β’ Maps Event IDs to security implications β’ MITRE ATT&CK technique correlation β’ Severity classification (Critical/High/Medium/Low) β’ Investigation guidance β’ False positive indicators β’ Response recommendations |
Event analysis with threat context |
The Detection module provides real-time threat identification capabilities using both signature-based and behavioral analysis techniques. These functions are designed to identify active threats, suspicious behaviors, and potential compromises that traditional antivirus might miss.
| Function | Purpose | Detection Capabilities | Risk Indicators |
|---|---|---|---|
Find-PersistenceMechanisms |
Identifies malware persistence techniques across the system | β’ 11+ Registry autorun locations (Run, RunOnce, etc.) β’ Scheduled Tasks (hidden, system, unusual) β’ Windows Services (unsigned, suspicious paths) β’ WMI Event Subscriptions β’ Startup folders (all users, system) β’ DLL hijacking opportunities |
High: Unknown entries Medium: Unsigned binaries Low: Unusual locations |
Find-SuspiciousProcesses |
Detects malicious process behaviors and anomalies | β’ Unsigned or invalid signatures β’ Execution from temporary directories β’ Encoded PowerShell commands β’ Process injection indicators β’ Unusual parent-child relationships β’ Network connections to suspicious IPs |
Critical: Known malware High: Injection detected Medium: Unsigned from temp |
Find-NetworkAnomalies |
Identifies abnormal network communications | β’ Connections to known C2 servers β’ Non-standard port usage β’ DNS tunneling indicators β’ Large data transfers β’ Tor/proxy connections β’ Suspicious protocol usage |
Critical: Known C2 High: DNS tunneling Medium: Unusual ports |
Find-SuspiciousAuthentication |
Detects authentication attacks and anomalies | β’ Brute force attempts (multiple failures) β’ Pass-the-hash indicators β’ Golden/Silver ticket detection β’ After-hours authentication β’ Impossible travel scenarios β’ Service account anomalies |
Critical: Pass-the-hash High: Brute force Medium: After hours |
The Analysis module performs deep forensic examination of system components to uncover hidden threats, investigate incidents, and gather evidence. These functions go beyond surface-level scanning to analyze system internals for sophisticated attack indicators.
| Function | Purpose | Analysis Techniques | Key Findings |
|---|---|---|---|
Get-EventLogAnalysis |
Deep analysis of Windows event logs for security insights | β’ Security log correlation (4624, 4625, 4672) β’ PowerShell operational log analysis β’ System log anomalies β’ Application error patterns β’ Custom XML query execution β’ Timeline reconstruction |
Authentication patterns Privilege escalations System modifications PowerShell abuse |
Get-RegistryAnalysis |
Examines registry for malicious modifications | β’ Autorun entry validation β’ Security policy tampering β’ Browser helper objects β’ Shell extensions β’ Recent document tracking β’ User activity artifacts |
Persistence mechanisms Policy bypasses User behaviors Malware artifacts |
Get-MemoryAnalysis |
Analyzes process memory for advanced threats | β’ Process injection detection β’ Hollowing identification β’ Memory pattern matching β’ String extraction β’ Suspicious allocations β’ Fileless malware indicators |
Injected code Credential theft Rootkit presence APT indicators |
Get-FileSystemAnalysis |
Comprehensive file system security analysis | β’ Alternate Data Stream detection β’ Hidden file discovery β’ Suspicious extensions β’ Recent file modifications β’ Ransomware indicators β’ Permission auditing |
Hidden malware Data staging Exfiltration prep Ransomware signs |
The Response module provides automated incident response capabilities, enabling rapid containment of threats and systematic evidence collection. These functions follow industry-standard incident response procedures while maintaining forensic integrity.
| Function | Purpose | Response Actions | Evidence Types |
|---|---|---|---|
Invoke-IncidentResponse |
Orchestrates automated incident response procedures | β’ Threat containment (process termination) β’ System isolation (network disconnection) β’ Evidence preservation β’ User notification β’ Backup initiation β’ Recovery planning |
Response timeline Actions taken System state Threat indicators |
Invoke-ForensicCollection |
Systematically collects forensic evidence | β’ Memory dump acquisition β’ Network state capture β’ Registry snapshot β’ Event log extraction β’ File artifact collection β’ Browser history preservation |
Memory dumps Network captures System artifacts User data |
Export-SecurityReport |
Generates professional security reports | β’ HTML interactive dashboards β’ PDF executive summaries β’ JSON for SIEM integration β’ CSV for data analysis β’ XML for compliance tools β’ Markdown for documentation |
Multi-format reports Executive summaries Technical details Recommendations |
The Enterprise module enables security operations at scale, providing centralized management and reporting across multiple systems. These functions are optimized for large environments with thousands of endpoints.
| Function | Purpose | Enterprise Features | Scalability |
|---|---|---|---|
Invoke-EnterpriseSecurityScan |
Performs security scanning across multiple systems | β’ Parallel execution (up to 50 threads) β’ Credential management β’ Progress tracking β’ Error handling β’ Resource throttling β’ Centralized logging |
1-10,000+ systems Domain-wide scanning Cross-forest support |
Get-MultiSystemAudit |
Consolidated auditing across system groups | β’ Role-based scanning (DC, File, Web) β’ Compliance aggregation β’ Risk scoring β’ Baseline comparison β’ Trend analysis β’ Executive dashboards |
Server groups Department systems Geographic regions |
Invoke-SecurityAssessment |
Comprehensive security evaluation orchestration | β’ All module coordination β’ Risk prioritization β’ Attack path analysis β’ Business impact assessment β’ Remediation roadmap β’ KPI/KRI metrics |
Complete assessment Risk matrices Action plans |
The Hardening module implements security best practices and configurations to reduce attack surface and improve system resilience. These functions apply industry-standard security baselines and monitoring configurations.
| Function | Purpose | Hardening Actions | Compliance |
|---|---|---|---|
Set-SecurityBaseline |
Applies comprehensive security configurations | β’ 50+ security settings β’ CIS Level 1/2 benchmarks β’ Microsoft Security Baseline β’ DISA STIG implementation β’ Custom baseline support β’ Rollback capability |
CIS: 95%+ NIST: High PCI: Compliant |
Enable-PowerShellSecurity |
Hardens PowerShell environment | β’ Constrained Language Mode β’ Script Block Logging β’ Module Logging β’ Transcription β’ AMSI integration β’ JEA configuration |
Blocks 90% of PS attacks Full audit trail Malware prevention |
Enable-AuditPolicies |
Configures advanced security auditing | β’ Process creation with command line β’ Logon/Logoff tracking β’ Object access monitoring β’ Privilege use auditing β’ System integrity monitoring β’ Account management tracking |
Complete visibility Forensic capability Compliance ready |
The Windows Defender module provides comprehensive management and monitoring of Windows Defender Antivirus, ensuring optimal protection and threat visibility.
| Function | Purpose | Management Features | Protection Level |
|---|---|---|---|
Get-DefenderStatus |
Comprehensive Defender health check | β’ Real-time protection status β’ Signature age and version β’ Last scan results β’ Threat history β’ Exclusion audit β’ Performance impact |
Status monitoring Health validation Alert generation |
Invoke-DefenderScan |
Initiates custom antivirus scans | β’ Quick scan (critical areas) β’ Full scan (complete system) β’ Custom path scanning β’ Offline scan capability β’ Boot sector verification β’ Performance optimization |
Threat detection Malware removal System cleanup |
Update-DefenderConfiguration |
Optimizes Defender settings | β’ Cloud protection level β’ Sample submission β’ PUA protection β’ Network protection β’ Exploit protection β’ ASR rules configuration |
Maximum protection Zero-day defense Behavior monitoring |
The Threat Hunting module provides proactive threat detection capabilities using advanced techniques, threat intelligence, and behavioral analysis to identify sophisticated attackers that evade traditional security controls.
| Function | Purpose | Hunting Techniques | Detection Coverage |
|---|---|---|---|
Find-APTIndicators |
Hunts for Advanced Persistent Threats | β’ 200+ behavioral patterns β’ MITRE ATT&CK mapping β’ Known APT group TTPs β’ Command & Control patterns β’ Data staging detection β’ Stealth technique identification |
Nation-state actors Organized crime Insider threats |
Find-DataExfiltration |
Detects data theft attempts | β’ Large file transfers β’ Compression before transfer β’ Cloud upload monitoring β’ DNS tunneling detection β’ Encrypted channel analysis β’ Removable media tracking |
Data breaches IP theft Espionage |
Find-LateralMovement |
Tracks attacker movement between systems | β’ RDP session analysis β’ SMB connection monitoring β’ WMI activity tracking β’ PSRemoting detection β’ Service creation β’ Scheduled task deployment |
Network propagation Privilege escalation Domain compromise |
Find-LivingOffLand |
Detects abuse of legitimate tools | β’ PowerShell exploitation β’ WMI weaponization β’ LOLBins detection β’ Script host abuse β’ Certutil misuse β’ Mshta execution |
Fileless attacks Evasion techniques Stealth persistence |
Get-MITREAttackMapping |
Maps findings to ATT&CK framework | β’ Technique classification β’ Tactic identification β’ Kill chain mapping β’ Detection gap analysis β’ Priority scoring β’ Coverage reporting |
Framework alignment Gap identification Defense planning |
Get-ThreatIntelligence |
Analyzes threat intelligence indicators | β’ IOC matching β’ Threat feed integration β’ Reputation checking β’ Hash validation β’ Domain analysis β’ IP geolocation |
Known threats Emerging campaigns Zero-day indicators |
The Compliance module automates security framework validation and generates audit-ready evidence, significantly reducing the time and effort required for compliance assessments.
| Function | Purpose | Frameworks Supported | Automation Level |
|---|---|---|---|
Test-CISBenchmark |
Validates CIS security controls | β’ CIS Level 1 (Basic) β’ CIS Level 2 (High Security) β’ 100+ control points β’ Windows 10/11/Server β’ Remediation scripts β’ Detailed scoring |
95% automated Pass/Fail/NA results Evidence collection |
Test-NISTCompliance |
Assesses NIST 800-53 controls | β’ Access Control (AC) β’ Audit & Accountability (AU) β’ System Integrity (SI) β’ Incident Response (IR) β’ Risk Assessment (RA) β’ Control families mapping |
Control validation Gap analysis Maturity scoring |
Test-PCI-DSS |
Validates PCI-DSS requirements | β’ Network segmentation β’ Access control β’ Encryption validation β’ Log monitoring β’ Vulnerability management β’ Security testing |
Requirement mapping Evidence generation SAQ support |
Get-ComplianceReport |
Generates comprehensive compliance reports | β’ Multi-framework dashboard β’ Executive summaries β’ Technical evidence β’ Gap analysis β’ Remediation roadmap β’ Trend analysis |
Professional reports Audit-ready format Action plans |
Export-ComplianceEvidence |
Collects and packages audit evidence | β’ Automated screenshots β’ Configuration exports β’ Log extraction β’ Policy documentation β’ Change tracking β’ Chain of custody |
Complete evidence Timestamp verification Integrity hashing |
The Active Directory module provides specialized security assessment for AD environments, identifying vulnerabilities and misconfigurations that attackers commonly exploit for domain compromise.
| Function | Purpose | Security Checks | Risk Areas |
|---|---|---|---|
Find-ADVulnerabilities |
Comprehensive AD vulnerability scanning | β’ Kerberoasting targets (SPNs) β’ ASREP roasting accounts β’ Weak ACLs and permissions β’ Unconstrained delegation β’ Trust vulnerabilities β’ GPO security issues |
Account compromise Privilege escalation Lateral movement |
Find-ADBackdoors |
Detects persistence in Active Directory | β’ AdminSDHolder modifications β’ DCSync permissions β’ SID history abuse β’ Golden/Silver tickets β’ Skeleton key indicators β’ Shadow credentials |
Domain persistence Privileged access Stealth backdoors |
Find-StaleADObjects |
Identifies unused AD objects for cleanup | β’ Inactive user accounts β’ Stale computer objects β’ Empty security groups β’ Orphaned objects β’ Disabled accounts β’ Service account audit |
Attack surface reduction Compliance cleanup Performance improvement |
Test-ADSecurityPosture |
Evaluates overall AD security health | β’ Password policy strength β’ Kerberos configuration β’ LDAP signing/channel binding β’ Trust relationships β’ LAPS deployment β’ Tier model implementation |
Domain hardening Best practices Security maturity |
Get-ADPasswordPolicy |
Analyzes password security settings | β’ Default domain policy β’ Fine-grained policies β’ Complexity requirements β’ History enforcement β’ Lockout thresholds β’ Expiration settings |
Weak passwords Brute force risk Compliance gaps |
Get-ADPrivilegedAccounts |
Maps privileged access | β’ Domain/Enterprise Admins β’ Custom admin groups β’ Service accounts β’ Delegation rights β’ Schema admins β’ Backup operators |
Privilege creep Excessive rights Account security |
The Vulnerability module identifies, assesses, and prioritizes security weaknesses across the environment, providing actionable remediation guidance based on exploitability and business impact.
| Function | Purpose | Assessment Areas | Priority Scoring |
|---|---|---|---|
Get-VulnerabilityAssessment |
Comprehensive vulnerability scanning | β’ CVE identification β’ CVSS scoring (v3.1) β’ Exploit availability (EPSS) β’ Patch availability β’ Workaround options β’ Asset criticality |
Critical: CVSS 9.0+ High: CVSS 7.0-8.9 Medium: CVSS 4.0-6.9 Low: CVSS 0-3.9 |
Get-SecurityMisconfigurations |
Identifies configuration weaknesses | β’ Weak file permissions β’ Default credentials β’ Open network shares β’ Service account issues β’ Registry permissions β’ Group Policy gaps |
Exploitability rating Impact assessment Fix complexity |
Find-EOLSoftware |
Detects unsupported software | β’ End-of-life products β’ Unsupported versions β’ Legacy applications β’ Missing security updates β’ Vendor bulletins β’ Migration paths |
Support status Risk exposure Upgrade options |
Get-ExposedServices |
Maps attack surface | β’ Internet-facing services β’ Weak protocols (SMBv1, TLS 1.0) β’ Default configurations β’ Unnecessary services β’ Port exposure β’ Authentication methods |
External exposure Protocol weaknesses Access controls |
Test-CertificateHealth |
Certificate security validation | β’ Expiration monitoring β’ Algorithm strength (RSA/ECC) β’ Chain validation β’ Revocation checking β’ Trust store audit β’ Key usage validation |
Expiry risk Crypto strength Trust issues |
Test-PatchCompliance |
Patch management assessment | β’ Missing critical patches β’ Security bulletin coverage β’ Update history analysis β’ WSUS/SCCM compliance β’ Third-party patches β’ Rollback capability |
Patch age Severity rating Exploit activity |
The Forensics module provides digital forensic capabilities for incident investigation, evidence collection, and timeline reconstruction while maintaining chain of custody and legal admissibility.
| Function | Purpose | Forensic Capabilities | Evidence Types |
|---|---|---|---|
Export-MemoryDump |
Captures memory for analysis | β’ Full memory dump β’ Process-specific dumps β’ Minidump creation β’ Hibernation file β’ Page file extraction β’ Crash dump analysis |
RAM contents Running processes Network connections Encryption keys |
Get-ArtifactCollection |
Collects forensic artifacts | β’ Browser history (all browsers) β’ Download history β’ Temporary files β’ Recycle bin contents β’ Jump lists β’ Thumbnail cache |
User activity File access Internet activity Deleted items |
Get-ExecutionArtifacts |
Traces program execution | β’ Prefetch analysis β’ Amcache parsing β’ ShimCache examination β’ UserAssist decoding β’ RecentDocs β’ BAM/DAM analysis |
Program execution Timestamps Frequency User attribution |
Get-USBHistory |
USB device forensics | β’ Device enumeration β’ First/Last connection β’ Serial numbers β’ Volume names β’ Drive letters β’ User correlation |
Device usage Data transfer Timeline User activity |
New-ForensicTimeline |
Timeline reconstruction | β’ Multi-source correlation β’ Event sequencing β’ File system timeline β’ Registry timeline β’ Log correlation β’ Visual timeline generation |
Incident timeline Attack chain User actions System events |
The Cloud Security module extends security assessment capabilities to cloud platforms, providing visibility into Azure AD and Microsoft 365 security posture.
| Function | Purpose | Cloud Platforms | Key Assessments |
|---|---|---|---|
Get-CloudComplianceStatus |
Cloud compliance validation | β’ Azure Policy compliance β’ AWS Config rules β’ Security Center scores β’ Regulatory alignment β’ Best practices β’ CIS cloud benchmarks |
Policy violations Configuration drift Compliance gaps |
Get-AzureADRiskySignIns |
Detects risky authentication | β’ Impossible travel β’ Anonymous IP addresses β’ Malware-linked IPs β’ Leaked credentials β’ Atypical locations β’ Risk score calculation |
Account compromise Credential theft Suspicious activity |
Test-M365SecurityPosture |
Microsoft 365 security assessment | β’ Secure Score analysis β’ Conditional Access gaps β’ MFA coverage β’ DLP policy review β’ Threat protection status β’ Identity protection |
Configuration weaknesses Policy gaps Security improvements |
The Reporting module transforms raw security data into actionable intelligence through professional reports, interactive dashboards, and executive presentations.
| Function | Purpose | Report Types | Delivery Formats |
|---|---|---|---|
Get-SecurityMetrics |
Collects and calculates KPIs/KRIs | β’ Security scores β’ Threat statistics β’ Compliance rates β’ Vulnerability metrics β’ Trend analysis β’ Benchmarking data |
JSON metrics Time-series data Comparison charts |
New-ExecutiveReport |
Creates C-level presentations | β’ Risk matrices β’ Business impact analysis β’ Trend visualization β’ Key findings β’ Recommendations β’ Action items |
PDF presentation PowerPoint HTML dashboard |
New-SecurityDashboard |
Interactive security dashboard | β’ Real-time metrics β’ Drill-down charts β’ Heat maps β’ Risk indicators β’ Compliance status β’ Alert summary |
HTML5 responsive Auto-refresh Export capable |
- 24/7 Monitoring: Continuous threat detection and alerting
- Incident Response: Rapid containment and investigation
- Threat Hunting: Proactive APT detection
- Metrics Tracking: KPI/KRI dashboards
- Daily Checks: Automated morning security reports
- Patch Management: Vulnerability and update tracking
- Compliance: Audit preparation and evidence
- System Hardening: Security baseline implementation
- Assessments: Comprehensive security evaluations
- Penetration Testing: Post-exploitation validation
- Compliance Audits: Multi-framework validation
- Executive Reporting: Professional deliverables
- Multi-Tenant: Isolated customer assessments
- Scalability: Thousands of endpoints
- Automation: Scheduled scanning
- White-Label: Customizable reports
| Environment Size | Scan Time | Resource Usage | Optimization |
|---|---|---|---|
| 1-10 Systems | 5 minutes | 200MB RAM, 15% CPU | Single-threaded |
| 10-100 Systems | 45 minutes | 500MB RAM, 25% CPU | 10 parallel threads |
| 100-1000 Systems | 4 hours | 1GB RAM, 30% CPU | 20 parallel threads |
| 1000+ Systems | 8 hours | 2GB RAM, 40% CPU | Distributed scanning |
- Parallel Processing: Configurable thread pools
- Smart Caching: Reduce redundant operations
- Selective Scanning: Module-specific execution
- Resource Throttling: CPU/Memory limits
- Network Optimization: Bandwidth management
- β Price: 100% FREE - No hidden costs
- β Functions: All 58 functions included
- β Source Code: Full access on GitHub
- β Updates: Regular security updates
- β License: MIT (commercial use allowed)
- β Support: Community-driven
We believe enterprise-grade security should be accessible to everyone. This project is our contribution to the security community. While the tool is free, we offer professional services for organizations needing additional support.
For organizations requiring specialized assistance, we offer:
- Implementation Support: Help with deployment and configuration
- Custom Development: Tailored modules for your specific needs
- Security Assessments: Professional evaluation of your environment
- Training Programs: Team education and best practices
- Priority Support: Direct access to developers
π§ Contact us for professional services: yildzokan@gmail.com
πΌ LinkedIn: https://www.linkedin.com/in/yildizokan/
We welcome contributions from the security community!
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
- Follow PowerShell best practices
- Include Pester tests for new functions
- Update documentation
- Sign commits with GPG
- Respect code of conduct
# Clone repository
git clone https://github.com/okanyildiz/WindowsSecurityAudit.git
cd WindowsSecurityAudit
# Install development dependencies
Install-Module -Name Pester, PSScriptAnalyzer -Force
# Run tests
Invoke-Pester -Path .\Tests\
# Run linter
Invoke-ScriptAnalyzer -Path . -RecurseWe offer professional services to help organizations maximize the value of this toolkit:
- π Implementation Support: Expert guidance for deployment and configuration
- π§ Custom Development: Tailored security modules for your specific requirements
- π Security Assessments: Comprehensive evaluation by experienced professionals
- π Training Programs: Hands-on workshops for your security team
- π― Priority Support: Direct access to module developers
Get in touch for professional services:
π§ Email: yildzokan@gmail.com
πΌ LinkedIn: Connect with me on LinkedIn
π Website: www.securedebug.com
Response time: Within 24 hours for all inquiries
- π GitHub Discussions - Ask questions, share experiences
- π Issue Tracker - Report bugs, request features
- π Wiki Documentation - Comprehensive guides
- π‘ Feature Requests - Suggest improvements
For large-scale deployments, custom licensing, or enterprise support contracts:
Enterprise Contact: yildzokan@gmail.com
We work with Fortune 500 companies, government agencies, and organizations of all sizes to implement robust security monitoring solutions.
- Web-based GUI dashboard
- REST API for remote management
- Linux/macOS PowerShell Core support
- Machine learning anomaly detection
- Automated remediation workflows
- Container security scanning
- Kubernetes integration
- Cloud-native architecture
- Mobile app for monitoring
- AI-powered threat hunting
- Become the industry standard for Windows security assessment
- Build a thriving ecosystem of security modules
- Enable zero-trust architecture validation
- Integrate quantum-resistant cryptography checks
This project is licensed under the MIT License - see the LICENSE file for details.
- β Commercial use allowed
- β Modification allowed
- β Distribution allowed
- β Private use allowed
β οΈ No liabilityβ οΈ No warranty
- Okan Yildiz - Project Creator & Lead Developer
Supporting the development of enterprise security tools: