mirror of
				https://github.com/decalage2/awesome-security-hardening.git
				synced 2025-11-04 07:45:31 +01:00 
			
		
		
		
	added IPv6 hardening guides
This commit is contained in:
		@@ -79,6 +79,7 @@ This is work in progress: please contribute by sending your suggestions. You may
 | 
				
			|||||||
- [nixCraft - 40 Linux Server Hardening Security Tips (2019 edition)](https://www.cyberciti.biz/tips/linux-security.html)
 | 
					- [nixCraft - 40 Linux Server Hardening Security Tips (2019 edition)](https://www.cyberciti.biz/tips/linux-security.html)
 | 
				
			||||||
- [nixCraft - Tips To Protect Linux Servers Physical Console Access](https://www.cyberciti.biz/tips/tips-to-protect-linux-servers-physical-console-access.html)
 | 
					- [nixCraft - Tips To Protect Linux Servers Physical Console Access](https://www.cyberciti.biz/tips/tips-to-protect-linux-servers-physical-console-access.html)
 | 
				
			||||||
- [TecMint - 4 Ways to Disable Root Account in Linux](https://www.tecmint.com/disable-root-login-in-linux/)
 | 
					- [TecMint - 4 Ways to Disable Root Account in Linux](https://www.tecmint.com/disable-root-login-in-linux/)
 | 
				
			||||||
 | 
					- [ERNW - IPv6 Hardening  Guide  for  Linux Servers](https://www.ernw.de/download/ERNW_Guide_to_Securely_Configure_Linux_Servers_For_IPv6_v1_0.pdf)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Red Hat Enterprise Linux - RHEL
 | 
					### Red Hat Enterprise Linux - RHEL
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -107,11 +108,14 @@ This is work in progress: please contribute by sending your suggestions. You may
 | 
				
			|||||||
- [Awesome Windows Domain Hardening](https://github.com/PaulSec/awesome-windows-domain-hardening)
 | 
					- [Awesome Windows Domain Hardening](https://github.com/PaulSec/awesome-windows-domain-hardening)
 | 
				
			||||||
- [Microsoft - How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server](https://support.microsoft.com/en-gb/help/2696547/detect-enable-disable-smbv1-smbv2-smbv3-in-windows-and-windows-server)
 | 
					- [Microsoft - How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server](https://support.microsoft.com/en-gb/help/2696547/detect-enable-disable-smbv1-smbv2-smbv3-in-windows-and-windows-server)
 | 
				
			||||||
- [Microsoft recommended block rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules) - List of applications or files that can be used by an attacker to circumvent application whitelisting policies
 | 
					- [Microsoft recommended block rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules) - List of applications or files that can be used by an attacker to circumvent application whitelisting policies
 | 
				
			||||||
 | 
					- [ERNW - IPv6 Hardening Guide for Windows Servers](https://www.ernw.de/download/ERNW_Guide_to_Configure_Securely_Windows_Servers_For_IPv6_v1_0.pdf)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
See also [Active Directory](#active-directory) and [ADFS](#adfs) below.
 | 
					See also [Active Directory](#active-directory) and [ADFS](#adfs) below.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## macOS
 | 
					## macOS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- [ERNW - IPv6 Hardening Guide for OS-X](https://www.ernw.de/download/ERNW_Hardening_IPv6_MacOS-X_v1_0.pdf)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Network Devices
 | 
					## Network Devices
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- [NSA - Harden Network Devices](https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/harden-network-devices.cfm) - very short but good summary
 | 
					- [NSA - Harden Network Devices](https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/harden-network-devices.cfm) - very short but good summary
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user