PowerShell scripts to help automate DISA STIG compliance remediations for Windows systems.
📌 Important Note: This repository was created during an internship project as part of a learning and practical exercise.
It is not a large-scale professional open-source project like 7-Zip or other enterprise-grade tools.
Instead, it is a pack of useful scripts that may assist administrators or learners working with STIG compliance.
- Windows PowerShell 5+
- Administrative privileges
- Tested on Windows 10 22H2
- Access to relevant DISA STIG benchmark files for reference
-
Clone this repository
git clone https://github.com/shoganaich/stig-powershell-remediations cd stig-powershell-remediations
-
Review the scripts
Each script targets a specific STIG rule or set of rules. Review them before running in production. -
Run a remediation
.\remediation-STIG-(XXXXXXXXXXXXXXXXXXX).ps1
- Always test in a non-production environment before applying changes to production systems.
- Some STIG rules may require manual validation or additional tools.
- Refer to the official DISA STIG site for the latest guidance.
This project is licensed under the MIT License. See the LICENSE file for details.
This repository is provided as-is, without any warranty. These scripts were created during an internship as a learning and demonstration project. They are not guaranteed to cover all STIG rules or be fully production-ready. Use them as a reference or baseline, and customize/validate for your specific environment.