Skip to content

This is an Active Directory security project based on PingCastle analysis, automated remediation of weaknesses, and systematic validation of measures, respecting operational constraints and security standards. There is a file for each version of Windows Server.

Notifications You must be signed in to change notification settings

MDulche/PingCastle-Resolver

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 

Repository files navigation

Active Directory Security Hardening Guide

Guide de durcissement de la sécurité Active Directory


⚠️ Legal Notice / Avis juridique

This repository is not affiliated with PingCastle. The proposed solutions are based on generic best practices and not PingCastle reports.
Official PingCastle Website

Ce dépôt n'est pas affilié à PingCastle. Les solutions proposées sont basées sur des bonnes pratiques génériques.
Site officiel PingCastle


Project Description / Description du projet

English

This project provides a systematic methodology for securing Active Directory environments through:

  1. Vulnerability assessment using industry-standard tools
  2. Automated remediation via PowerShell scripts
  3. Compliance validation with ANSSI/Microsoft benchmarks

Key Features

  • Windows Server version-specific configurations (2012R2 to 2022)
  • MITRE ATT&CK mitigation mapping
  • Operational constraint considerations

Developed with Perplexity AI for technical analysis.

Français

Ce projet propose une méthodologie systématique pour sécuriser les environnements Active Directory :

  1. Évaluation des vulnérabilités avec outils standards
  2. Correction automatisée via scripts PowerShell
  3. Validation de conformité ANSSI/Microsoft

Caractéristiques

  • Configurations spécifiques par version Windows Server
  • Cartographie des atténuations MITRE ATT&CK
  • Prise en compte des contraintes opérationnelles

Développé avec Perplexity AI pour l'analyse technique.


Structure / Structure

[Nom du Problème]

(ex : Délégation Kerberos non protégée)

Explication du Problème / Problem Explanation

Brève description technique du risque (ex : Permet des attaques DCSync via délégation de compte administrateur).
Impact / Impact : Description succincte des conséquences (ex : compromission totale du domaine).

Raisons potentielles de non-résolution / Possible Reasons for Non-Resolution

  1. Erreur de syntaxe dans les commandes PowerShell / Syntax error in PowerShell commands
  2. Droits insuffisants de l'utilisateur exécutant le script / Insufficient permissions of the executing user
  3. Réplication AD non terminée entre contrôleurs / AD replication not completed across domain controllers

Solution proposée / Proposed Solution

  • Commandes PowerShell / PowerShell commands
  • Recommandations / Recommendations
  • Explication de la solution / Explanation of the solution

Vérification / verification

  • Vérification de la mise en place de la solution / Verification of solution implementation

Sources / Sources

Resource Lien
ANSSI Guide PDF
Microsoft Security Baselines Docs
CIS Benchmarks Windows Server
PingCastle Methodology White Paper

Contribution Guidelines / Contribution

  1. Fork the repository
  2. Create feature branches (git checkout -b feature/improvement)
  3. Follow PowerShell scripting standards (PSScriptAnalyzer)
  4. Submit Pull Request with detailed description

All contributions must comply with Non-Profit OSL 3.0


License / Licence

License: Non-Profit OSL 3.0

Commercial use prohibited - See PingCastle EULA for auditing services.

About

This is an Active Directory security project based on PingCastle analysis, automated remediation of weaknesses, and systematic validation of measures, respecting operational constraints and security standards. There is a file for each version of Windows Server.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published