@@ -23,7 +23,8 @@ All tools follow the same engineering principles applied across **Windows-SysAdm
2323
2424## 🧪 Core Capabilities
2525
26- [ ![ Forensics] ( https://img.shields.io/badge/Forensics-Ready-black?style=for-the-badge )] ( ) [ ![ Logging] ( https://img.shields.io/badge/Logging-Structured-success?style=for-the-badge )] ( ) [ ![ Reports] ( https://img.shields.io/badge/Reports-CSV-informational?style=for-the-badge )] ( ) [ ![ GUI] ( https://img.shields.io/badge/GUI-Available-blueviolet?style=for-the-badge )] ( )
26+ [ ![ Forensics] ( https://img.shields.io/badge/Forensics-Ready-black?style=for-the-badge )] ( ) [ ![ Logging] ( https://img.shields.io/badge/Logging-Structured-success?style=for-the-badge )] ( ) [ ![ Reports] ( https://img.shields.io/badge/Reports-CSV-informational?style=for-the-badge )] ( ) [ ![ GUI] ( https://img.shields.io/badge/GUI-Available-blueviolet?style=for-the-badge )] ( )
27+
2728- 🔍 ** Forensic Automation**
2829 Extraction of Windows Event Logs, registry artifacts, network sessions, user activity, and volatile system state.
2930
@@ -40,7 +41,7 @@ All tools follow the same engineering principles applied across **Windows-SysAdm
4041[ ![ Architecture] ( https://img.shields.io/badge/Architecture-Modular-008080?style=for-the-badge )] ( ) [ ![ Pipeline] ( https://img.shields.io/badge/Integration-IR%20Pipelines-4B0082?style=for-the-badge )] ( )
4142
4243| Component | Purpose | Documentation |
43- | ---------| ---------| --------|
44+ | ----------- | ---------| ------- --------|
4445| ** EventLogMonitoring** | Security-focused analysis of Windows Event Logs, including authentication failures, privilege escalation, lateral movement indicators, and policy violations. | [ ![ Docs] ( https://img.shields.io/badge/View%20Docs-EventLogMonitoring-0A66C2?style=for-the-badge&logo=github )] ( EventLogMonitoring/README.md ) |
4546| ** IncidentResponse** | Live-response and post-incident utilities for volatile artifacts, active sessions, system metadata, and threat indicators. | [ ![ Docs] ( https://img.shields.io/badge/View%20Docs-IncidentResponse-0A66C2?style=for-the-badge&logo=github )] ( IncidentResponse/README.md ) |
4647
@@ -64,75 +65,63 @@ Designed for professionals operating in:
6465
6566[ ![ PS] ( https://img.shields.io/badge/PowerShell-5.1%20%7C%207.x-5391FE?style=for-the-badge&logo=powershell )] ( ) [ ![ Admin] ( https://img.shields.io/badge/Privileges-Administrator-critical?style=for-the-badge )] ( )
6667
67- - ** PowerShell: **
68+ - ** PowerShell**
6869 Minimum ** 5.1** (PowerShell 7+ recommended)
6970
70- - ** Administrative Privileges: **
71+ - ** Administrative Privileges**
7172 Required to access protected system artifacts.
7273
73- - ** RSAT (when applicable):**
74- ``` powershel
75- Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability -Online
74+ - ** RSAT (when applicable)**
75+
76+ ``` powershell
77+ Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability -Online
78+ ```
79+
80+ - ** Execution Policy (session-scoped)**
7681
77- ```
82+ ``` powershell
83+ Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process
84+ ```
7885
79- - **Execution Policy (session-scoped):**
80-
81- ```powershell
82- Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process
83-
84- ```
85-
86- - **Optional Modules:**
87- `ActiveDirectory`, `Defender`, `DHCPServer`
88-
86+ - ** Optional Modules**
87+ ` ActiveDirectory ` , ` Defender ` , ` DHCPServer `
8988
9089---
9190
9291## 🚀 Getting Started
9392
94- ```powershel
95- git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
96-
97- cd Windows-SysAdmin-ProSuite/BlueTeam-Tools
98- ```
99-
93+ ``` powershell
94+ git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
95+ cd Windows-SysAdmin-ProSuite/BlueTeam-Tools
96+ ```
97+
10098** Recommended workflow:**
10199
102- 1. Select the appropriate category
103-
104- 2. Review the local `README.md`
105-
106- 3. Execute the script:
107-
108- ```powershell
109- .\Script-Name.ps1
110-
111- ```
112-
113- 4. Review generated `.log` and `.csv` artifacts
114-
100+ 1 . Select the appropriate category
101+ 2 . Review the local ` README.md `
102+ 3 . Execute the script:
103+
104+ ``` powershell
105+ .\Script-Name.ps1
106+ ```
107+
108+ 4 . Review generated ` .log ` and ` .csv ` artifacts
115109
116110> ⚠️ Always validate execution context before running in production or investigative environments.
117111
118112---
119113
120114## 🔗 Integration & Interoperability
121115
122- [](https://chatgpt.com/c/69865ef3-2314-832b-bf49-c095b60862ae ) [](https://chatgpt.com/c/69865ef3-2314-832b-bf49-c095b60862ae ) [](https://chatgpt.com/c/69865ef3-2314-832b-bf49-c095b60862ae )
116+ [ ![ GPO] ( https://img.shields.io/badge/Integration-GPOs-blue?style=for-the-badge )] ( https://chatgpt.com/ ) [ ![ Scheduled Tasks] ( https://img.shields.io/badge/Integration-Scheduled%20Tasks-4682B4?style=for-the-badge )] ( https://chatgpt.com/ ) [ ![ SIEM] ( https://img.shields.io/badge/Integration-SIEM-informational?style=for-the-badge )] ( https://chatgpt.com/ )
123117
124118BlueTeam tools are designed to integrate with:
125119
126- - Incident response playbooks
127-
128- - GPO-based execution models
129-
130- - Scheduled forensic snapshots
131-
132- - SIEM ingestion pipelines
133-
134- - Compliance and audit evidence chains
135-
120+ - Incident response playbooks
121+ - GPO-based execution models
122+ - Scheduled forensic snapshots
123+ - SIEM ingestion pipelines
124+ - Compliance and audit evidence chains
136125
137126---
138127
0 commit comments