Skip to content

Commit

Permalink
Update Rule “sysadmin-cybersecurity-tools/rule”
Browse files Browse the repository at this point in the history
  • Loading branch information
RobJT-wq committed Feb 13, 2025
1 parent 94fdf98 commit 0e3a5c3
Showing 1 changed file with 64 additions and 33 deletions.
97 changes: 64 additions & 33 deletions rules/sysadmin-cybersecurity-tools/rule.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,85 +21,116 @@ Cybersecurity threats are constantly evolving, as a sysadmin, it's your job to s

A well-rounded cybersecurity strategy should include tools for:


#### 1. **Active Directory Security**

Active Directory Security tools are used for on-demand secrity assessments of the environment these tools can prevent misconfiguration of an AD Environment.
✅ Recommended tools:
- **PingCastle**
- **BloodHound**

* **PingCastle**
* **BloodHound**

#### 2. **Vulnerability Management**

Provideds Centralised reporting for all potential vulnerabilities in a companies system.
✅ Recommended tools:
- **Nessus**
- **Qualys**
- **OpenVAS**

* **Nessus**
* **Qualys**
* **OpenVAS**

#### 3. **Patch Management**

Allows SysAdmins to deploy regular patches to company hardware.
✅ Recommended tools:
- **Patch ManageEngine**
- **WSUS (Windows Server Update Services)**

* **Patch ManageEngine**
* **WSUS (Windows Server Update Services)**

#### 4. **Multi-Factor Authentication (MFA)**

Ensures users are protected even if their passwords are breached.
✅ Recommended tools:
- **Duende Identity Server**
- **Microsoft Entra ID (formerly Azure AD)**
- **Okta**
- **Duo Security**

* **Duende Identity Server**
* **Microsoft Entra ID (formerly Azure AD)**
* **Okta**
* **Duo Security**

#### 5. **Privileged Access Management (PAM)**

Protects companies most sensitive systems and ensurses that they only have the necessary level of access to complete tasks.
✅ Recommended tools:
- **CyberArk**
- **BeyondTrust**


* **CyberArk**
* **BeyondTrust**

#### 6. **Automated Backup Solutions**:

Automated backup solutions and backup solutions that promote immutable backups can protect companies from ransomware attacks.
✅ Recommended tools:
- **Veeam**
- **Acronis**
- **Azure Backup**

* **Veeam**
* **Acronis**
* **Azure Backup**

#### 7. **Endpoint Security Suites**

Endpoint security tools help protect companies from currently infected devices.
✅ Recommended tools:
- **Microsoft Defender for Business**
- **Bitdefender**
- **Sophos**

* **Microsoft Defender for Business**
* **Bitdefender**
* **Sophos**

#### 8. **Email Filtering & Phishing Protection**

Email and phising tools prevent organisations from receiveing malicious emails.
✅ Recommended tools:
- **Microsoft Defender for Office 365**
- **Proofpoint**
- **Mimecast**

* **Microsoft Defender for Office 365**
* **Proofpoint**
* **Mimecast**

#### 9. **Penetration Testing**

These are specialised tools used to test a wide variety of scenarios
✅ Recommended tools:
- **Metasploit**
- **Nmap**
- **Kali OS**

* **Metasploit**
* **Nmap**
* **Kali OS**

#### 10. **SIEM (Security Information and Event Management)**

SIEM tools allow us to create a centralised view of all security and event logs in an organisation
✅ Recommended tools:
- **Microsoft Sentinel**
- **Splunk**

* **Microsoft Sentinel**
* **Splunk**

#### 11. **EDR (Endpoint Detection and Response)**

EDR Tools allow us to identify systems at risk and run automated fixes for known issues.
✅ Recommended tools:
- **Microsoft Defender for Endpoint**
- **CrowdStrike Falcon**

* **Microsoft Defender for Endpoint**
* **CrowdStrike Falcon**

#### 12. **Adversary Simulation**

Specialised tools to simulate cybersecurity threats in an organisation
✅ Recommended tools:
- **Cobalt Strike**
- **Havoc Framework**

* **Cobalt Strike**
* **Havoc Framework**

#### 13. **Web Auditing Tools**

Tools to audit web security.\
✅ Recommended tools:

* **[SSL Labs](https://www.ssllabs.com/)**
* **[DNS Inspect](https://dnsinspect.com/)**

### Implementing a Strong Cybersecurity Strategy

Expand Down

0 comments on commit 0e3a5c3

Please sign in to comment.