Skip to content

Commit de6d76c

Browse files
Update README.md
Signed-off-by: LUIZ HAMILTON ROBERTO DA SILVA <[email protected]>
1 parent b00aeb3 commit de6d76c

1 file changed

Lines changed: 66 additions & 59 deletions

File tree

README.md

Lines changed: 66 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Welcome to **Windows-SysAdmin-ProSuite** — a comprehensive and enterprise-grad
1313
This toolkit is purpose-built for:
1414

1515
* 🏛️ **Public-sector IT environments** (courts, universities, government agencies)
16-
* 🏢 **Enterprise Windows domains** (on-prem and hybrid)
16+
* 🏢 **Enterprise Windows domains** (on-premises and hybrid)
1717
* 🛡️ **Blue Team / DFIR operations** (event logs, artifacts, investigations)
1818
* 📋 **ITSM-aligned provisioning** of servers and workstations
1919
* 📑 **Compliance-driven automation** (auditability, repeatability, governance)
@@ -24,13 +24,13 @@ This toolkit is purpose-built for:
2424

2525
**Organized by critical IT service domains:**
2626

27-
| Folder | Description |
28-
| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
29-
| [![BlueTeam Tools](https://img.shields.io/badge/BlueTeam%20Tools-Forensics-orange?style=for-the-badge\&logo=protonmail\&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/BlueTeam-Tools) | PowerShell forensic tooling for DFIR, including **Event Log monitoring**, **incident response**, and investigative workflows aligned with digital evidence handling. |
30-
| [![Core ScriptLibrary](https://img.shields.io/badge/Core%20ScriptLibrary-Modules-red?style=for-the-badge\&logo=visualstudiocode\&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/Core-ScriptLibrary) | Foundational scripting modules for **reusability**, **helper functions**, **GUI backends**, CI/CD integration, and **NuGet packaging** automation. |
31-
| [![ITSM SVR](https://img.shields.io/badge/ITSM%20Templates-SVR-purple?style=for-the-badge\&logo=windows11\&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/ITSM-Templates-SVR) | Standardized **Windows Server 2019/2022** baselines: DNS, AD CS, GPO, DHCP, IIS, WSUS, and institutional compliance automation. |
32-
| [![ITSM WKS](https://img.shields.io/badge/ITSM%20Templates-WKS-green?style=for-the-badge\&logo=windows\&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/ITSM-Templates-WKS) | ITSM automation for **Windows 10/11**: `BeforeJoinDomain`, `AfterJoinDomain`, asset tagging, security hardening, and workstation standardization routines. |
33-
| [![SysAdmin Tools](https://img.shields.io/badge/SysAdmin%20Tools-Management-blue?style=for-the-badge\&logo=microsoft\&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/SysAdmin-Tools) | Centralized **PowerShell + VBScript GUIs** for AD, GPO, WSUS, DNS, DHCP, CA, and infrastructure orchestration, organized into multiple operational categories. |
27+
| Folder | Description |
28+
|-------|-------------|
29+
| [![BlueTeam Tools](https://img.shields.io/badge/BlueTeam%20Tools-Forensics-orange?style=for-the-badge&logo=protonmail&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/BlueTeam-Tools) | PowerShell forensic tooling for DFIR, including **Event Log monitoring**, **incident response**, and investigative workflows aligned with digital evidence handling. |
30+
| [![Core ScriptLibrary](https://img.shields.io/badge/Core%20ScriptLibrary-Modules-red?style=for-the-badge&logo=visualstudiocode&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/Core-ScriptLibrary) | Foundational scripting modules for **reusability**, **helper functions**, **GUI backends**, CI/CD integration, and **NuGet packaging** automation. |
31+
| [![ITSM SVR](https://img.shields.io/badge/ITSM%20Templates-SVR-purple?style=for-the-badge&logo=windows11&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/ITSM-Templates-SVR) | Standardized **Windows Server 2019/2022** baselines: DNS, AD CS, GPO, DHCP, IIS, WSUS, and institutional compliance automation. |
32+
| [![ITSM WKS](https://img.shields.io/badge/ITSM%20Templates-WKS-green?style=for-the-badge&logo=windows&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/ITSM-Templates-WKS) | ITSM automation for **Windows 10/11**: `BeforeJoinDomain`, `AfterJoinDomain`, asset tagging, security hardening, and workstation standardization routines. |
33+
| [![SysAdmin Tools](https://img.shields.io/badge/SysAdmin%20Tools-Management-blue?style=for-the-badge&logo=microsoft&logoColor=white)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite/tree/main/SysAdmin-Tools) | Centralized **PowerShell + VBScript GUIs** for AD, GPO, WSUS, DNS, DHCP, CA, and infrastructure orchestration, organized into multiple operational categories. |
3434

3535
---
3636

@@ -61,7 +61,7 @@ This repository follows **enterprise-grade governance standards**:
6161

6262
* Semantic versioning (`vMAJOR.MINOR.PATCH`)
6363
* Tag- and release-based distribution
64-
* CI pipelines with PowerShell & VBScript SARIF analysis
64+
* CI pipelines with PowerShell and VBScript SARIF analysis
6565
* Documented **Security Policy**, **Code of Conduct**, and **Contribution Guidelines**
6666
* Responsible vulnerability disclosure process
6767
* MIT License (SPDX compatible)
@@ -70,14 +70,14 @@ This repository follows **enterprise-grade governance standards**:
7070

7171
## ⚙️ Requirements & Environment Setup
7272

73-
| Requirement | Minimum Version / Notes |
74-
| ------------------------ | -------------------------------------------------------------- |
75-
| **PowerShell** | Windows PowerShell **5.1** or **PowerShell 7.x** (recommended) |
76-
| **Operating System** | Windows **10/11**, Windows Server **2019/2022** |
77-
| **Execution Policy** | Recommended: `RemoteSigned` |
78-
| **Administrator Rights** | Required for most automation tasks |
79-
| **.NET Framework** | **4.8** recommended (legacy GUI compatibility) |
80-
| **Optional Tools** | Git, Visual Studio Code, Task Scheduler |
73+
| Requirement | Minimum Version / Notes |
74+
|------------|--------------------------|
75+
| **PowerShell** | Windows PowerShell **5.1** or **PowerShell 7.x** (recommended) |
76+
| **Operating System** | Windows **10/11**, Windows Server **2019/2022** |
77+
| **Execution Policy** | Recommended: `RemoteSigned` |
78+
| **Administrator Rights** | Required for most automation tasks |
79+
| **.NET Framework** | **4.8** recommended (legacy GUI compatibility) |
80+
| **Optional Tools** | Git, Visual Studio Code, Task Scheduler |
8181

8282
---
8383

@@ -88,7 +88,7 @@ git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
8888
cd Windows-SysAdmin-ProSuite
8989
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
9090
.\ITSM-Templates-WKS\BeforeJoinDomain\Initialize-WKSBaseline.ps1
91-
```
91+
````
9292
9393
> ⚠️ Always review scripts before running them in production environments.
9494
@@ -98,80 +98,87 @@ Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
9898
9999
### Run scripts
100100
101-
| File Type | Execution Method |
102-
| --------- | ----------------------------------------------------------------------- |
103-
| `.ps1` | Right-click → **Run with PowerShell** or execute from elevated terminal |
104-
| `.vbs` | Run via `cscript.exe` (recommended) or `wscript.exe` |
105-
| `.hta` | Double-click (run as administrator when required) |
101+
| File Type | Execution Method |
102+
| --------- | -------------------------------------------------------------------------- |
103+
| `.ps1` | Right-click → **Run with PowerShell** or execute from an elevated terminal |
104+
| `.vbs` | Run via `cscript.exe` (recommended) or `wscript.exe` |
105+
| `.hta` | Double-click (run as administrator when required) |
106106
107107
### Logs and reports
108108
109-
| Path | Purpose |
110-
|-----------------------------------|-------------------------------------------------------------------------|
111-
| `C:\ITSM-Logs-WKS\` | Workstation automation execution logs |
112-
| `C:\ITSM-Logs-SVR\` | Server-side automation and execution logs |
113-
| `C:\Scripts-LOGS\` | GPO synchronization, agents, and security tooling logs |
114-
| `C:\Logs-TEMP\` | General-purpose, transient, and legacy script outputs |
115-
| `%USERPROFILE%\Documents\` | CSV and exported reports for compliance, forensics, and ITSM workflows |
109+
| Path | Purpose |
110+
| -------------------------- | ---------------------------------------------------------------------- |
111+
| `C:\ITSM-Logs-WKS\` | Workstation automation execution logs |
112+
| `C:\ITSM-Logs-SVR\` | Server-side automation and execution logs |
113+
| `C:\Scripts-LOGS\` | GPO synchronization, agents, and security tooling logs |
114+
| `C:\Logs-TEMP\` | General-purpose, transient, and legacy script outputs |
115+
| `%USERPROFILE%\Documents\` | CSV and exported reports for compliance, forensics, and ITSM workflows |
116116
117117
---
118118
119119
## 🌍 Openness, Visibility, and Academic Alignment
120120
121121
This repository is intentionally maintained as an **open, transparent, and auditable body of work**, designed to serve multiple audiences:
122122
123-
- 🎓 **Academic and research communities**
124-
- 🧑‍💼 **Recruiters and technical evaluators**
125-
- 🏛️ **Public-sector and enterprise IT teams**
126-
- 🔐 **Security, forensics, and governance professionals**
123+
* 🎓 **Academic and research communities**
124+
* 🧑‍💼 **Recruiters and technical evaluators**
125+
* 🏛️ **Public-sector and enterprise IT teams**
126+
* 🔐 **Security, forensics, and governance professionals**
127127
128-
All scripts, templates, workflows, and documentation are published with a strong emphasis on:
128+
All scripts, templates, workflows, and documentation emphasize:
129129
130-
- **Reproducibility** — deterministic execution, structured logs, and traceable outputs
131-
- **Auditability** — consistent logging, CSV exports, and evidence-oriented design
132-
- **Pedagogical clarity** — readable code, descriptive naming, and documented intent
133-
- **Operational realism** — solutions derived from real-world institutional environments
130+
* 🔁 **Reproducibility:** Deterministic execution, structured logs, and traceable outputs
131+
* 📋 **Auditability:** Consistent logging, CSV exports, and evidence-oriented design
132+
* 📘 **Pedagogical clarity:** Readable code, descriptive naming, and documented intent
133+
* 🏗️ **Operational realism:** Solutions derived from real-world institutional environments
134+
135+
---
134136
135137
### 🎓 Academic & Research Perspective
136138
137-
This repository may be referenced, studied, or cited in academic or technical contexts involving:
139+
This repository may be referenced, studied, or cited in contexts involving:
138140
139-
- Windows systems administration and automation
140-
- Digital forensics and incident response (DFIR)
141-
- IT governance, ITSM, and compliance frameworks
142-
- Identity and Access Management (IAM)
143-
- Secure scripting and infrastructure-as-code practices
141+
* Windows systems administration and automation
142+
* Digital forensics and incident response (DFIR)
143+
* IT governance, ITSM, and compliance frameworks
144+
* Identity and Access Management (IAM)
145+
* Secure scripting and infrastructure-as-code practices
144146
145-
The project favors **clear structure over obfuscation**, **explainability over shortcuts**, and **engineering discipline over ad-hoc scripting** — aligning with academic evaluation standards and peer review expectations.
147+
The project prioritizes **clear structure**, **explainability**, and **engineering discipline**, aligning with academic evaluation and peer review standards.
148+
149+
---
146150
147151
### 🧑‍💼 Recruiter & Technical Evaluation Note
148152
149-
For recruiters, reviewers, and hiring committees:
153+
For recruiters and technical reviewers:
150154
151-
- This repository represents **production-grade automation patterns**, not isolated code samples
152-
- Emphasis is placed on **defensive coding**, **error handling**, and **operational safety**
153-
- Tooling reflects **enterprise constraints**, including legacy compatibility, auditing, and governance
155+
* This repository reflects **production-grade automation patterns**
156+
* Emphasis is placed on **defensive coding**, **error handling**, and **operational safety**
157+
* Tooling mirrors **enterprise constraints**, including legacy compatibility and governance
154158
155-
Each folder and module reflects a **functional domain**, allowing targeted technical assessment (e.g., Blue Team, IAM, ITSM, infrastructure).
159+
Each module corresponds to a **functional domain**, enabling targeted technical assessment.
160+
161+
---
156162
157163
### 🤝 Collaboration & Attribution
158164
159165
Contributions, forks, and academic references are welcome.
160166
161167
When reusing or referencing this work:
162-
- Preserve attribution to **Luiz Hamilton Silva (@brazilianscriptguy)**
163-
- Respect the repository license and security policy
164-
- Cite the repository URL in academic or technical materials when applicable
168+
169+
* Preserve attribution to **Luiz Hamilton Silva (@brazilianscriptguy)**
170+
* Respect the repository license, security policy, and contribution guidelines
171+
* Cite the repository URL in academic or technical materials when applicable
165172
166173
---
167174
168175
## 🤝 Support & Contributions
169176
170-
[![Email](https://img.shields.io/badge/[email protected]?style=for-the-badge&logo=gmail)](mailto:[email protected])
171-
[![Patreon](https://img.shields.io/badge/Support%20Me-Patreon-red?style=for-the-badge&logo=patreon)](https://www.patreon.com/brazilianscriptguy)
172-
[![Buy Me a Coffee](https://img.shields.io/badge/Buy%20Me%20a%20Coffee-yellow?style=for-the-badge&logo=buymeacoffee)](https://buymeacoffee.com/brazilianscriptguy)
173-
[![Ko-fi](https://img.shields.io/badge/Ko--fi-blue?style=for-the-badge&logo=kofi)](https://ko-fi.com/brazilianscriptguy)
174-
[![GoFundMe](https://img.shields.io/badge/GoFundMe-green?style=for-the-badge&logo=gofundme)](https://www.gofundme.com/f/brazilianscriptguy)
177+
[![Email](https://img.shields.io/badge/[email protected]?style=for-the-badge\&logo=gmail)](mailto:[email protected])
178+
[![Patreon](https://img.shields.io/badge/Support%20Me-Patreon-red?style=for-the-badge\&logo=patreon)](https://www.patreon.com/brazilianscriptguy)
179+
[![Buy Me a Coffee](https://img.shields.io/badge/Buy%20Me%20a%20Coffee-yellow?style=for-the-badge\&logo=buymeacoffee)](https://buymeacoffee.com/brazilianscriptguy)
180+
[![Ko-fi](https://img.shields.io/badge/Ko--fi-blue?style=for-the-badge\&logo=kofi)](https://ko-fi.com/brazilianscriptguy)
181+
[![GoFundMe](https://img.shields.io/badge/GoFundMe-green?style=for-the-badge\&logo=gofundme)](https://www.gofundme.com/f/brazilianscriptguy)
175182
176183
---
177184

0 commit comments

Comments
 (0)