From ee73bde40d746ccbd1f223dc9ebeb1b6c3541978 Mon Sep 17 00:00:00 2001 From: beerisgood Date: Thu, 23 Dec 2021 17:05:36 +0100 Subject: [PATCH] PR for https://github.com/decalage2/awesome-security-hardening/issues/32 --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index cdb5632..04cccf5 100644 --- a/README.md +++ b/README.md @@ -124,7 +124,7 @@ This is work in progress: please contribute by sending your suggestions. You may - [Microsoft - Windows Server Security | Assurance](https://docs.microsoft.com/en-us/windows-server/security/security-and-assurance) - [Microsoft - Windows 10 Enterprise Security](https://docs.microsoft.com/en-us/windows/security/) - [BSI/ERNW - Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities](https://www.bsi.bund.de/EN/Topics/Cyber-Security/Recommendations/SiSyPHuS_Win10/AP11/SiSyPHuS_AP11_node.html) (2021) - focused on Windows 10 LTSC 2019 -- [ACSC - Hardening Microsoft Windows 10, version 1709, Workstations](https://www.cyber.gov.au/publications/hardening-microsoft-windows-10-build-1709) +- [ACSC - Hardening Microsoft Windows 10, version 21H1, Workstations](https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-windows-10-version-21h1-workstations) - [ACSC - Securing PowerShell in the Enterprise](https://www.cyber.gov.au/publications/securing-powershell-in-the-enterprise) - [Awesome Windows Domain Hardening](https://github.com/PaulSec/awesome-windows-domain-hardening) - [Microsoft - How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server](https://support.microsoft.com/en-gb/help/2696547/detect-enable-disable-smbv1-smbv2-smbv3-in-windows-and-windows-server)