Welcome to Windows-SysAdmin-ProSuite — a comprehensive and enterprise-grade collection of PowerShell and VBScript automation tools by @brazilianscriptguy, designed for secure, compliant, and scalable Windows infrastructure management.
✨ Most tools include intuitive graphical user interfaces (GUI), generate structured
.logfiles for auditing, and many also export.csvreports to support compliance, forensics, and ITSM workflows.
This toolkit is purpose-built for:
- 🏛️ Public-sector IT environments (courts, universities, government agencies)
- 🏢 Enterprise Windows domains (on-premises and hybrid)
- 🛡️ Blue Team / DFIR operations (event logs, artifacts, investigations)
- 📋 ITSM-aligned provisioning of servers and workstations
- 📑 Compliance-driven automation (auditability, repeatability, governance)
Organized by critical IT service domains:
- 🧪 Forensic readiness: Artifact collection, Event Log parsing, timeline support, and breach detection
- ⚡ PowerShell-driven automation: Secure scripting patterns with modularity and CI/CD support
- 🔐 Server & workstation hardening: Enforcement of institutional baselines (firewall, DNS, GPOs, services)
- 👤 IAM & domain readiness: AD objects, logon behavior analysis, SID tracking, offline logon controls
- 📋 Registry + GPO integration: Native use of
.reg,.vbs,.hta, and PowerShell for policy enforcement
- 🖼️ GUI-driven interfaces: User-friendly tools with guided execution
- 📝 Standardized logging model: Deterministic
.logoutputs in predefined directories - 📊 CSV audit reports: BIOS, SID, OS posture, update status, and software inventory exports
- 🧩 Modular architecture: Reusable components, consistent naming, and parameterization
- 🔁 Release automation: GitHub Actions for linting, SARIF analysis, packaging, and NuGet publishing
- 🛡️ Native Windows tooling only: No bundled third-party binaries
This repository follows enterprise-grade governance standards:
- Semantic versioning (
vMAJOR.MINOR.PATCH) - Tag- and release-based distribution
- CI pipelines with PowerShell and VBScript SARIF analysis
- Documented Security Policy, Code of Conduct, and Contribution Guidelines
- Responsible vulnerability disclosure process
- MIT License (SPDX compatible)
| Requirement | Minimum Version / Notes |
|---|---|
| PowerShell | Windows PowerShell 5.1 or PowerShell 7.x (recommended) |
| Operating System | Windows 10/11, Windows Server 2019/2022 |
| Execution Policy | Recommended: RemoteSigned |
| Administrator Rights | Required for most automation tasks |
| .NET Framework | 4.8 recommended (legacy GUI compatibility) |
| Optional Tools | Git, Visual Studio Code, Task Scheduler |
git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
cd Windows-SysAdmin-ProSuite
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
.\ITSM-Templates-WKS\BeforeJoinDomain\Initialize-WKSBaseline.ps1
⚠️ Always review scripts before running them in production environments.
| File Type | Execution Method |
|---|---|
.ps1 |
Right-click → Run with PowerShell or execute from an elevated terminal |
.vbs |
Run via cscript.exe (recommended) or wscript.exe |
.hta |
Double-click (run as administrator when required) |
| Path | Purpose |
|---|---|
C:\ITSM-Logs-WKS\ |
Workstation automation execution logs |
C:\ITSM-Logs-SVR\ |
Server-side automation and execution logs |
C:\Scripts-LOGS\ |
GPO synchronization, agents, and security tooling logs |
C:\Logs-TEMP\ |
General-purpose, transient, and legacy script outputs |
%USERPROFILE%\Documents\ |
CSV and exported reports for compliance, forensics, and ITSM workflows |
This repository is intentionally maintained as an open, transparent, and auditable body of work, designed to serve multiple audiences:
- 🎓 Academic and research communities
- 🧑💼 Recruiters and technical evaluators
- 🏛️ Public-sector and enterprise IT teams
- 🔐 Security, forensics, and governance professionals
All scripts, templates, workflows, and documentation emphasize:
- 🔁 Reproducibility: Deterministic execution, structured logs, and traceable outputs
- 📋 Auditability: Consistent logging, CSV exports, and evidence-oriented design
- 📘 Pedagogical clarity: Readable code, descriptive naming, and documented intent
- 🏗️ Operational realism: Solutions derived from real-world institutional environments
This repository may be referenced, studied, or cited in contexts involving:
- Windows systems administration and automation
- Digital forensics and incident response (DFIR)
- IT governance, ITSM, and compliance frameworks
- Identity and Access Management (IAM)
- Secure scripting and infrastructure-as-code practices
The project prioritizes clear structure, explainability, and engineering discipline, aligning with academic evaluation and peer review standards.
For recruiters and technical reviewers:
- This repository reflects production-grade automation patterns
- Emphasis is placed on defensive coding, error handling, and operational safety
- Tooling mirrors enterprise constraints, including legacy compatibility and governance
Each module corresponds to a functional domain, enabling targeted technical assessment.
Contributions, forks, and academic references are welcome.
When reusing or referencing this work:
- Preserve attribution to Luiz Hamilton Silva (@brazilianscriptguy)
- Respect the repository license, security policy, and contribution guidelines
- Cite the repository URL in academic or technical materials when applicable
💼 Thank you for using Windows-SysAdmin-ProSuite — a professional toolkit for automating administrative tasks, enforcing security baselines, and sustaining ITSM excellence in enterprise and public-sector Windows environments.
© 2026 Luiz Hamilton Silva. All rights reserved.