SecurityPosture

0.4

Security Posture is a powershell script for detecting status of different security related device features related to Microsoft 365 on Windows 10.
Currently the script detects the status of:

Operating System
TPM
Bitlocker
UEFI
SecureBoot
Defender
CloudProtectionService (MAPS for Defender)
DefenderATP
ApplicationGuard
Windows Sandbox
Credential Guard
Device Guard
Atta
Security Posture is a powershell script for detecting status of different security related device features related to Microsoft 365 on Windows 10.
Currently the script detects the status of:

Operating System
TPM
Bitlocker
UEFI
SecureBoot
Defender
CloudProtectionService (MAPS for Defender)
DefenderATP
ApplicationGuard
Windows Sandbox
Credential Guard
Device Guard
Attack Surface Reduction
Controlled Folder Access

Each area listed above can be called as individual functions or every function in the script can be called utilizing the -All switch.

The script will write entries to a log file residing at the client (C:\Windows\Temp\Client-SecurityPosture.log)
which preferably is read using CMTrace or OneTrace.

Installation Options

Copy and Paste the following command to install this package using PowerShellGet More Info

Install-Script -Name SecurityPosture

You can deploy this package directly to Azure Automation. Note that deploying packages with dependencies will deloy all the dependencies to Azure Automation. Learn More

Manually download the .nupkg file to your system's default download location. Note that the file won't be unpacked, and won't include any dependencies. Learn More

Author(s)

@0fflineDocs

Version History

Version Downloads Last updated
0.4 (current version) 22 7/30/2020
0.3 3 7/30/2020
0.2 11 7/30/2020
0.1 3 7/30/2020