Dargslan.WinFirewallAudit.psd1
|
@{ RootModule = 'Dargslan.WinFirewallAudit.psm1' ModuleVersion = '1.0.0' GUID = 'a3f1c7b2-4e55-46d0-9a11-7c2e00111111' Author = 'Dargslan' CompanyName = 'Dargslan' Copyright = '(c) 2026 Dargslan. All rights reserved.' Description = 'Audit Windows Firewall profiles and rules. Detect risky Allow Any Any rules, disabled profiles and GPO overrides. JSON / HTML compliance report.' PowerShellVersion = '5.1' FunctionsToExport = @('Get-DargslanFirewallProfile','Get-DargslanFirewallRules','Get-DargslanFirewallRiskyRules','Get-DargslanFirewallAuditReport','Export-DargslanFirewallAuditReport') CmdletsToExport = @() VariablesToExport = @() AliasesToExport = @() PrivateData = @{ PSData = @{ Tags = @('firewall','netsec','audit','compliance','windows','sysadmin','dargslan','hardening','cis') LicenseUri = 'https://github.com/Dargslan/powershell-admin-scripts/blob/main/LICENSE' ProjectUri = 'https://dargslan.com/blog/windows-firewall-audit-powershell-2026' IconUri = 'https://dargslan.com/assets/img/dargslan-icon.png' ReleaseNotes = 'Initial release. Profile state, rule inventory, risky-rule detection, scoring and HTML / JSON report.' } } } |