Reports and tools for performing various assessments
The following repository contains xml files and scripts for use for full and post cutover threat assessments. The intent of the reports is to query live data from the platform to discover where improvements to the configuration and overall security posture.
- Logging and Alerting
- System Hardening
- Misconfigurations
- SSL Percentage
- Possible Compromise
- URL Filtering
- Brute Force
- File Blocking
- Inbound, Outbound, and Internal Threat Tuning
- Inbound, Outbound, and Internal Rule Tuning
- Miscellaneous
- Possible Compromise
- SSL Percentage
- Brute Force
- Inbound, Outbound, and Internal Threat Tuning
- Inbound, Outbound, and Internal Rule Tuning
- Misconfigurations