This project exists to bring STIG compliance auditing to the hands of anyone. This project is built upon the Pester test framework, and allows unit-test style auditing of the DISA STIGs for Windows 10 Enterprise images. Some of this work may be applicable to Windows 11 - but validating that is currently beyond the scope of this project. Should Windows 11 deviate greatly from prior methods, a new repo will be opened.
You must have the Pester framework installed. A simple command via administrator console can be executed: Install-Module -Name Pester -Force
To utilize this script simply run Invoke-Pester stigfind.ps1
.
Please open an issue in the GitHub repo (or fix it yourself and open a PR).
Please refer to Current Completed STIGs.md
for current list of work left to do, or notations regarding additional testing that may be needed. If you're a documentation wizard, I'd love help organizing these better.