Skip to content

Latest commit

 

History

History
42 lines (23 loc) · 3.01 KB

File metadata and controls

42 lines (23 loc) · 3.01 KB

Microsoft Ecosystem

Microsoft (2023, February 22). Settings list for the windows 10/11 MDM security baselines in Microsoft Intune - Microsoft Intune. Microsoft Learn | Microsoft Learn. https://learn.microsoft.com/en-us/mem/intune/protect/security-baseline-settings-mdm-all?pivots=mdm-november-2021

Microsoft. (2023, June 15). Password policy recommendations. Microsoft Learn. https://learn.microsoft.com/en-us/microsoft-365/admin/misc/password-policy-recommendations?view=o365-worldwide

Microsoft. (n.d.). PowerShell documentation. Microsoft Learn. https://learn.microsoft.com/en-us/powershell/?view=powershell-7.4

Microsoft. (2023, July 11). Security Baselines Guide - Windows Security. Microsoft Learn. https://learn.microsoft.com/en-us/windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines

Microsoft. (n.d.-b). Windows Server Security Documentation. Microsoft Learn. https://learn.microsoft.com/en-us/windows-server/security/security-and-assurance

Red Hat Ecosystem

Ansible. (2023, November 22). Getting started with ansible. Ansible Documentation. https://docs.ansible.com/ansible/latest/getting_started/index.html

Cojot, V. (2021, February 19). Move your Linux from legacy BIOS to UEFI in place with minimal downtime. Red Hat. https://www.redhat.com/sysadmin/bios-uefi FreeIPA Team. (2023). Documentation. FreeIPA. https://www.freeipa.org/page/Documentation.html

Gerardi, R. (2022, November 30). 5 ways to harden your Linux server with Ansible. Red Hat. https://www.redhat.com/sysadmin/ansible-linux-server-security

Hess, K. (2020, June 4). Linux security: Protect your systems with fail2ban. Red Hat. https://www.redhat.com/sysadmin/protect-systems-fail2ban

Madabhushana, A. B. (2021, October 26). Configure Linux system auditing with AUDITD. Red Hat. https://www.redhat.com/sysadmin/configure-linux-auditing-auditd

Red Hat. (2010). Identity Management Guide Red Hat Enterprise Linux 6. Red Hat Customer Portal. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/identity_management_guide/index

Red Hat. (2022, March 18). Is any virus protection software needed for Red Hat Enterprise Linux?. Red Hat Customer Portal. https://access.redhat.com/solutions/9203

Red Hat. (2022). Security hardening red hat enterprise Linux 9. Red Hat Customer Portal. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/index

Mozilla Firefox

Mozilla. (n.d.). Customizing Firefox Using Group Policy (windows). Firefox for Enterprise Help. https://support.mozilla.org/en-US/kb/customizing-firefox-using-group-policy-windows

Mozilla. (n.d.). Deploying Firefox with extensions. Firefox for Enterprise Help. https://support.mozilla.org/en-US/kb/deploying-firefox-with-extensions

Oracle VirtualBox

Oracle. (2024). User Manual. Oracle VM VirtualBox. https://www.virtualbox.org/manual/UserManual.html

pfSense

Netgate. (2023). pfSense documentation. pfSense Documentation . https://docs.netgate.com/pfsense/en/latest/