Skip to content

PowerShell and VBScript tools for automating Active Directory workflows,securing system operations, and supporting forensic procedures. Designed for Windows Servers and workstations, these solutions improve accuracy, scalability, and compliance—enhancing performance, reliability, and cybersecurity posture across enterprise IT environments worldwide

License

Notifications You must be signed in to change notification settings

brazilianscriptguy/Windows-SysAdmin-ProSuite

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3,909 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

🚀 Complete PowerShell and VBScript Toolkit

ITSM Compliance for Windows 10/11 Workstations and Windows Server 2019/2022

Welcome to Windows-SysAdmin-ProSuite — a comprehensive and enterprise-grade collection of PowerShell and VBScript automation tools by @brazilianscriptguy, designed for secure, compliant, and scalable Windows infrastructure management.

✨ Most tools include intuitive graphical user interfaces (GUI), generate structured .log files for auditing, and many also export .csv reports to support compliance, forensics, and ITSM workflows.


🧭 Scope & Target Audience

This toolkit is purpose-built for:

  • 🏛️ Public-sector IT environments (courts, universities, government agencies)
  • 🏢 Enterprise Windows domains (on-premises and hybrid)
  • 🛡️ Blue Team / DFIR operations (event logs, artifacts, investigations)
  • 📋 ITSM-aligned provisioning of servers and workstations
  • 📑 Compliance-driven automation (auditability, repeatability, governance)

🛠️ Toolkit Overview

Organized by critical IT service domains:

Folder Description
BlueTeam Tools PowerShell forensic tooling for DFIR, including Event Log monitoring, incident response, and investigative workflows aligned with digital evidence handling.
Core ScriptLibrary Foundational scripting modules for reusability, helper functions, GUI backends, CI/CD integration, and NuGet packaging automation.
ITSM SVR Standardized Windows Server 2019/2022 baselines: DNS, AD CS, GPO, DHCP, IIS, WSUS, and institutional compliance automation.
ITSM WKS ITSM automation for Windows 10/11: BeforeJoinDomain, AfterJoinDomain, asset tagging, security hardening, and workstation standardization routines.
SysAdmin Tools Centralized PowerShell + VBScript GUIs for AD, GPO, WSUS, DNS, DHCP, CA, and infrastructure orchestration, organized into multiple operational categories.

💻 Core Features

  • 🧪 Forensic readiness: Artifact collection, Event Log parsing, timeline support, and breach detection
  • PowerShell-driven automation: Secure scripting patterns with modularity and CI/CD support
  • 🔐 Server & workstation hardening: Enforcement of institutional baselines (firewall, DNS, GPOs, services)
  • 👤 IAM & domain readiness: AD objects, logon behavior analysis, SID tracking, offline logon controls
  • 📋 Registry + GPO integration: Native use of .reg, .vbs, .hta, and PowerShell for policy enforcement

🌟 Key Highlights & Engineering Principles

  • 🖼️ GUI-driven interfaces: User-friendly tools with guided execution
  • 📝 Standardized logging model: Deterministic .log outputs in predefined directories
  • 📊 CSV audit reports: BIOS, SID, OS posture, update status, and software inventory exports
  • 🧩 Modular architecture: Reusable components, consistent naming, and parameterization
  • 🔁 Release automation: GitHub Actions for linting, SARIF analysis, packaging, and NuGet publishing
  • 🛡️ Native Windows tooling only: No bundled third-party binaries

🏛️ Governance, Quality & Security

This repository follows enterprise-grade governance standards:

  • Semantic versioning (vMAJOR.MINOR.PATCH)
  • Tag- and release-based distribution
  • CI pipelines with PowerShell and VBScript SARIF analysis
  • Documented Security Policy, Code of Conduct, and Contribution Guidelines
  • Responsible vulnerability disclosure process
  • MIT License (SPDX compatible)

⚙️ Requirements & Environment Setup

Requirement Minimum Version / Notes
PowerShell Windows PowerShell 5.1 or PowerShell 7.x (recommended)
Operating System Windows 10/11, Windows Server 2019/2022
Execution Policy Recommended: RemoteSigned
Administrator Rights Required for most automation tasks
.NET Framework 4.8 recommended (legacy GUI compatibility)
Optional Tools Git, Visual Studio Code, Task Scheduler

🚀 Quick Start

git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
cd Windows-SysAdmin-ProSuite
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
.\ITSM-Templates-WKS\BeforeJoinDomain\Initialize-WKSBaseline.ps1

⚠️ Always review scripts before running them in production environments.


▶️ How to Use

Run scripts

File Type Execution Method
.ps1 Right-click → Run with PowerShell or execute from an elevated terminal
.vbs Run via cscript.exe (recommended) or wscript.exe
.hta Double-click (run as administrator when required)

Logs and reports

Path Purpose
C:\ITSM-Logs-WKS\ Workstation automation execution logs
C:\ITSM-Logs-SVR\ Server-side automation and execution logs
C:\Scripts-LOGS\ GPO synchronization, agents, and security tooling logs
C:\Logs-TEMP\ General-purpose, transient, and legacy script outputs
%USERPROFILE%\Documents\ CSV and exported reports for compliance, forensics, and ITSM workflows

🌍 Openness, Visibility, and Academic Alignment

This repository is intentionally maintained as an open, transparent, and auditable body of work, designed to serve multiple audiences:

  • 🎓 Academic and research communities
  • 🧑‍💼 Recruiters and technical evaluators
  • 🏛️ Public-sector and enterprise IT teams
  • 🔐 Security, forensics, and governance professionals

All scripts, templates, workflows, and documentation emphasize:

  • 🔁 Reproducibility: Deterministic execution, structured logs, and traceable outputs
  • 📋 Auditability: Consistent logging, CSV exports, and evidence-oriented design
  • 📘 Pedagogical clarity: Readable code, descriptive naming, and documented intent
  • 🏗️ Operational realism: Solutions derived from real-world institutional environments

🎓 Academic & Research Perspective

This repository may be referenced, studied, or cited in contexts involving:

  • Windows systems administration and automation
  • Digital forensics and incident response (DFIR)
  • IT governance, ITSM, and compliance frameworks
  • Identity and Access Management (IAM)
  • Secure scripting and infrastructure-as-code practices

The project prioritizes clear structure, explainability, and engineering discipline, aligning with academic evaluation and peer review standards.


🧑‍💼 Recruiter & Technical Evaluation Note

For recruiters and technical reviewers:

  • This repository reflects production-grade automation patterns
  • Emphasis is placed on defensive coding, error handling, and operational safety
  • Tooling mirrors enterprise constraints, including legacy compatibility and governance

Each module corresponds to a functional domain, enabling targeted technical assessment.


🤝 Collaboration & Attribution

Contributions, forks, and academic references are welcome.

When reusing or referencing this work:

  • Preserve attribution to Luiz Hamilton Silva (@brazilianscriptguy)
  • Respect the repository license, security policy, and contribution guidelines
  • Cite the repository URL in academic or technical materials when applicable

🤝 Support & Contributions

Email Patreon Buy Me a Coffee Ko-fi GoFundMe


💼 Thank you for using Windows-SysAdmin-ProSuite — a professional toolkit for automating administrative tasks, enforcing security baselines, and sustaining ITSM excellence in enterprise and public-sector Windows environments.

© 2026 Luiz Hamilton Silva. All rights reserved.

About

PowerShell and VBScript tools for automating Active Directory workflows,securing system operations, and supporting forensic procedures. Designed for Windows Servers and workstations, these solutions improve accuracy, scalability, and compliance—enhancing performance, reliability, and cybersecurity posture across enterprise IT environments worldwide

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors 4

  •  
  •  
  •  
  •