Feb. 27, 2023, 7:16 p.m. | /u/HotCakeXXXXXXXXXXXXX

cybersecurity www.reddit.com

Created a few GitHub wiki posts about WDAC (Windows Defender Application Control), only using first party resources. Created some PowerShell script myself and added it there too for automation. Feel free to check them out.

Here is the main portal to my WDAC posts: [https://github.com/HotCakeX/Harden-Windows-Security/wiki/Introduction](https://github.com/HotCakeX/Harden-Windows-Security/wiki/Introduction)

I had previously shared [my hardening script](https://github.com/HotCakeX/Harden-Windows-Security) here but this one is beyond that. Highly suggest reading the [Signed WDAC policy post](https://github.com/HotCakeX/Harden-Windows-Security/wiki/How-to-Create-and-Deploy-a-Signed-WDAC-Policy-(Windows-Defender-Application-Control)), especially the [system behavior section](https://github.com/HotCakeX/Harden-Windows-Security/wiki/How-to-Create-and-Deploy-a-Signed-WDAC-Policy-(Windows-Defender-Application-Control)#system-behavior).

P.S no paid product, promotion/self-promotion or 3rd party …

advanced application automation centers check control copy cybersecurity data data centers defender enterprises free github hardening information links paid party powershell powershell script product resources script servers target wiki windows windows defender windows defender application control workstations

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Security Manager & ISSO

@ Federal Reserve System | Minneapolis, MN

Forensic Lead

@ Arete | Hyderabad

Lead Security Risk Analyst (GRC)

@ Justworks, Inc. | New York City

Consultant Senior en Gestion de Crise Cyber et Continuité d’Activité H/F

@ Hifield | Sèvres, France