|
| 1 | +# 🚀 Windows-SysAdmin-ProSuite |
| 2 | +### Enterprise Windows Automation · IAM · Cybersecurity · Forensic Readiness |
1 | 3 |
|
2 | | -# 🚀 Windows-SysAdmin-ProSuite |
3 | | -### Enterprise Automation · IAM · Cybersecurity · Forensic Readiness |
4 | | - |
5 | | -[](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite) [](https://doi.org/10.5281/zenodo.18487320) [](LICENSE) [](https://learn.microsoft.com/powershell) [](https://www.microsoft.com/windows) |
6 | | - |
7 | | -**Windows-SysAdmin-ProSuite** is an **enterprise-grade**, **research-aligned**, and **auditable** collection of **PowerShell** and **VBScript** automation tools authored by **Luiz Hamilton Silva (@brazilianscriptguy)**. |
8 | | - |
9 | | -The project delivers **secure**, **compliant**, and **scalable** automation for **Windows Server (2019/2022)** and **Windows 10/11**, with strong focus on: |
10 | | - |
11 | | -- 🔐 Identity & Access Management (IAM) |
12 | | -- 🛡️ Cybersecurity & Digital Forensics |
13 | | -- 📋 ITSM & Governance |
14 | | -- 📊 Auditability, reproducibility, and traceability |
15 | | - |
16 | | -> ✨ Most tools include **GUI-driven execution**, generate structured `.log` files, and export `.csv` reports suitable for **audits, investigations, and compliance workflows**. |
| 4 | +[](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite) |
| 5 | +[]() |
| 6 | +[]() |
| 7 | +[]() |
| 8 | +[] |
| 9 | +[](LICENSE) |
17 | 10 |
|
18 | 11 | --- |
19 | 12 |
|
20 | | -## 🇺🇸 National Interest & Research Alignment |
21 | | - |
22 | | -[]() []() []() []() |
23 | | - |
24 | | -This repository represents an **independent, ongoing engineering and research initiative** addressing **systemic challenges** in Windows-based infrastructures, particularly in: |
25 | | - |
26 | | -- 🏛️ Courts, universities, and government agencies |
27 | | -- 🏢 Enterprise and hybrid environments |
28 | | -- 🛡️ Blue Team / DFIR operations |
29 | | - |
30 | | -The toolkit contributes to **national-scale objectives** related to: |
31 | | - |
32 | | -- Cybersecurity resilience |
33 | | -- Digital trust and auditability |
34 | | -- Secure identity governance |
35 | | -- Infrastructure reliability |
36 | | - |
37 | | ---- |
| 13 | +## 🧭 Executive Overview |
38 | 14 |
|
39 | | -## 🧭 Scope & Target Audience |
| 15 | +**Windows-SysAdmin-ProSuite** is an **enterprise-grade, research-aligned automation platform** for **Windows infrastructures**, authored and maintained by **Luiz Hamilton Silva (@brazilianscriptguy)**. |
40 | 16 |
|
41 | | -[]() []() []() []() |
| 17 | +The repository consolidates **production-tested PowerShell and VBScript toolchains** designed for: |
42 | 18 |
|
43 | | -Designed for professionals working with: |
| 19 | +- Identity & Access Management (IAM) |
| 20 | +- Secure Windows administration |
| 21 | +- Cybersecurity and forensic readiness |
| 22 | +- ITSM-aligned provisioning and compliance |
| 23 | +- Auditability and operational traceability |
44 | 24 |
|
45 | | -- IT infrastructure administration |
46 | | -- Identity & Access Management |
47 | | -- Security operations and investigations |
48 | | -- ITSM-aligned provisioning |
49 | | -- Compliance and audit preparation |
| 25 | +All tooling is engineered with **runtime safety**, **deterministic logging**, and **PowerShell 5.1 compatibility** as first-class requirements. |
50 | 26 |
|
51 | 27 | --- |
52 | 28 |
|
53 | | -## 🛠️ Repository Architecture |
| 29 | +## 🎯 Scope & Intended Use |
54 | 30 |
|
55 | | -[](BlueTeam-Tools) [](Core-ScriptLibrary) [](SysAdmin-Tools) [](ITSM-Templates-WKS) [](ITSM-Templates-SVR) |
| 31 | +This repository targets **real-world Windows environments**, including: |
56 | 32 |
|
57 | | -| Component | Description | |
58 | | -|---------|-------------| |
59 | | -| **BlueTeam-Tools** | DFIR tooling for Event Logs, artifacts, timelines | |
60 | | -| **Core-ScriptLibrary** | Reusable modules, GUIs, helpers, NuGet engine | |
61 | | -| **SysAdmin-Tools** | AD, GPO, WSUS, DNS, DHCP, PKI automation | |
62 | | -| **ITSM-Templates-WKS** | Windows 10/11 baseline & lifecycle scripts | |
63 | | -| **ITSM-Templates-SVR** | Windows Server 2019/2022 compliance tooling | |
64 | | - |
65 | | ---- |
66 | | - |
67 | | -## 💻 Core Capabilities |
68 | | - |
69 | | -[]() []() []() []() |
| 33 | +- 🏛️ Public sector and judicial institutions |
| 34 | +- 🏢 Enterprise and hybrid infrastructures |
| 35 | +- 🛡️ Blue Team / DFIR operations |
| 36 | +- 📋 Governance, risk, and compliance workflows |
70 | 37 |
|
71 | | -- Event Log parsing and correlation |
72 | | -- AD object and logon behavior analysis |
73 | | -- GPO, registry, and baseline enforcement |
74 | | -- Modular PowerShell orchestration |
75 | | -- Audit-oriented outputs |
| 38 | +It is **not** a collection of demos or isolated scripts, but a **cohesive automation suite** designed to operate safely across **large Windows realms**. |
76 | 39 |
|
77 | 40 | --- |
78 | 41 |
|
79 | | -## 🌟 Engineering Principles |
| 42 | +## 🏗️ Repository Architecture (High Level) |
80 | 43 |
|
81 | | -[]() []() []() []() |
| 44 | +| Domain | Description | |
| 45 | +|------|-------------| |
| 46 | +| **BlueTeam-Tools** | DFIR, Event Log analysis, incident response tooling | |
| 47 | +| **Core-ScriptLibrary** | Shared modules, GUI frameworks, helpers, packaging | |
| 48 | +| **SysAdmin-Tools** | AD, GPO, WSUS, DNS, DHCP, PKI, infrastructure automation | |
| 49 | +| **ITSM-Templates-WKS** | Windows 10/11 lifecycle and baseline enforcement | |
| 50 | +| **ITSM-Templates-SVR** | Windows Server compliance and hardening workflows | |
82 | 51 |
|
83 | | -- GUI-driven safe execution |
84 | | -- Deterministic logging model |
85 | | -- Modular, reusable design |
86 | | -- CI pipelines with linting & SARIF |
87 | | -- Native Windows tooling only |
| 52 | +> 📌 Each top-level directory contains its **own README.md** with domain-specific documentation and usage guidance. |
88 | 53 |
|
89 | 54 | --- |
90 | 55 |
|
91 | | -## 🏛️ Governance, Quality & Security |
| 56 | +## 🛡️ Engineering & Safety Principles |
92 | 57 |
|
93 | | -[]() []() []() []() |
| 58 | +- ✅ **PowerShell 5.1 first**, PowerShell 7.x compatible where applicable |
| 59 | +- ✅ No destructive action without explicit intent (`ShouldProcess` enforced in core logic) |
| 60 | +- ✅ GUI-driven execution for operator safety when appropriate |
| 61 | +- ✅ Structured logging (`.log`) and exportable reports (`.csv`) |
| 62 | +- ✅ No hidden state, no silent failure patterns |
94 | 63 |
|
95 | | -- Semantic versioning (`vMAJOR.MINOR.PATCH`) |
96 | | -- Release-based distribution |
97 | | -- CI for PowerShell, VBScript, Markdown |
98 | | -- SARIF security reporting |
99 | | -- MIT License |
| 64 | +The suite is continuously evaluated using **PSScriptAnalyzer**, **SARIF reporting**, and CI pipelines configured in **report-only mode** to ensure **visibility without delivery interruption**. |
100 | 65 |
|
101 | 66 | --- |
102 | 67 |
|
103 | | -## ⚙️ Requirements |
104 | | - |
105 | | -[]() []() []() |
| 68 | +## 🔍 Quality, CI & Static Analysis |
106 | 69 |
|
107 | | ---- |
| 70 | +- PowerShell linting via **PSScriptAnalyzer** |
| 71 | +- SARIF output integrated with **GitHub Code Scanning** |
| 72 | +- Runtime-safety focused rule profile (low noise, high signal) |
| 73 | +- PowerShell 5.1 compatibility validation |
| 74 | +- Non-blocking CI: reports inform action, not gatekeeping |
108 | 75 |
|
109 | | -## 🚀 Quick Start |
110 | | - |
111 | | -```powershell |
112 | | -git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git |
113 | | -cd Windows-SysAdmin-ProSuite |
114 | | -
|
115 | | -Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned |
116 | | -.\ITSM-Templates-WKS\BeforeJoinDomain\Initialize-WKSBaseline.ps1 |
117 | | -``` |
118 | | - |
119 | | -> ⚠️ Review scripts before execution in production environments. |
| 76 | +> Findings are surfaced as **artifacts and dashboards**, enabling controlled remediation cycles. |
120 | 77 |
|
121 | 78 | --- |
122 | 79 |
|
123 | | -## 📘 Research Software & Citation |
| 80 | +## 📚 Research, Governance & Citation |
124 | 81 |
|
125 | | -[](https://doi.org/10.5281/zenodo.18487320) []() |
| 82 | +[](https://doi.org/10.5281/zenodo.18487320) |
| 83 | +[]() |
126 | 84 |
|
127 | | -This repository may be cited in **academic**, **technical**, and **policy-oriented** works related to: |
| 85 | +This repository is suitable for **academic, technical, and policy-oriented citation**, particularly in areas involving: |
128 | 86 |
|
129 | | -* Cybersecurity engineering |
130 | | -* Digital forensics (DFIR) |
131 | | -* IT governance & compliance |
132 | | -* Identity & Access Management |
| 87 | +- Cybersecurity engineering |
| 88 | +- Digital forensics (DFIR) |
| 89 | +- Identity governance |
| 90 | +- IT governance and compliance |
133 | 91 |
|
134 | 92 | --- |
135 | 93 |
|
136 | | -## 🎓 Academic & Professional Use |
| 94 | +## 👤 Author & Stewardship |
137 | 95 |
|
138 | | -[]() []() |
| 96 | +**Luiz Hamilton Silva** |
| 97 | +Cybersecurity · IAM · Windows Infrastructure · Digital Forensics |
| 98 | +GitHub: `@brazilianscriptguy` |
139 | 99 |
|
140 | | -The project emphasizes: |
141 | | - |
142 | | -* Explainability |
143 | | -* Operational realism |
144 | | -* Engineering discipline |
145 | | -* Reproducibility and auditability |
| 100 | +This project reflects **long-term stewardship**, real operational use, and continuous refinement. |
146 | 101 |
|
147 | 102 | --- |
148 | 103 |
|
149 | | -## 🤝 Collaboration & Attribution |
150 | | - |
151 | | -[]() []() |
152 | | - |
153 | | -When reusing or referencing: |
| 104 | +## 🤝 Contribution & Reuse |
154 | 105 |
|
155 | | -* Preserve attribution to **Luiz Hamilton Silva (@brazilianscriptguy)** |
156 | | -* Respect license and security policy |
157 | | -* Cite repository URL or DOI when applicable |
| 106 | +- Contributions are welcome via pull requests |
| 107 | +- Attribution is required under the MIT License |
| 108 | +- Reuse in academic or institutional contexts should cite the repository or DOI |
158 | 109 |
|
159 | 110 | --- |
160 | 111 |
|
161 | | -## 🤝 Support |
| 112 | +## 📬 Contact & Support |
162 | 113 |
|
163 | | -[](mailto:[email protected]) [](https://www.patreon.com/brazilianscriptguy) [](https://buymeacoffee.com/brazilianscriptguy) [](https://ko-fi.com/brazilianscriptguy) [](https://www.gofundme.com/f/brazilianscriptguy) |
| 114 | + |
| 115 | +- ☕ Buy Me a Coffee: https://buymeacoffee.com/brazilianscriptguy |
| 116 | +- ❤️ Ko-fi: https://ko-fi.com/brazilianscriptguy |
| 117 | +- 💖 Patreon: https://www.patreon.com/brazilianscriptguy |
164 | 118 |
|
165 | 119 | --- |
166 | 120 |
|
167 | | -> 🚀 *Engineering secure, scalable, and auditable Windows automation for enterprise and public-sector environments.* |
| 121 | +> **Engineering secure, auditable, and scalable Windows automation for enterprise and public-sector environments.** |
168 | 122 |
|
169 | | -© 2026 Luiz Hamilton Silva. All rights reserved. |
| 123 | +© 2026 Luiz Hamilton Silva |
0 commit comments