Baseline Features

The building blocks of a hardened operating system. Each feature represents a security capability found across our tools, services, and guides.

AD hardening

1 package

Strengthens Active Directory against modern attack techniques like Kerberoasting, DCSync, and Golden Ticket.

AMI/image verification

1 package

Validates cloud VM images against published checksums and signatures before launching instances.

APT/DNF repository pinning

1 package

Locks package sources to specific repositories and versions, preventing supply chain confusion attacks.

Access control configuration

1 package

Restricts who can access cloud Mac instances and what actions they can perform.

Ansible integration

1 package

Plugs directly into Ansible playbooks for infrastructure-as-code driven compliance enforcement at scale.

App deployment

1 package

Pushes approved applications to devices silently, ensuring the right software is installed from day one.

AppLocker/WDAC policies

1 package

Configures application control to allow only approved software to execute on servers.

Apple Silicon native

1 package

Learn how Apple Silicon native strengthens your OS security baseline.

Application whitelisting

1 package

Only permits approved executables to run, blocking unknown or malicious binaries at launch.

Artifact signing setup

1 package

Configures automated signing of build artifacts with securely managed code signing identities.

Artifact verification

1 package

Validates build outputs against expected hashes and signatures before they leave the build pipeline.

Audit mode for testing

1 package

Logs what would be blocked without actually enforcing, letting you test policies before going live.

Authenticode verification

1 package

Checks Windows Authenticode digital signatures to confirm software publisher identity and integrity.

Auto-recovery configuration

1 package

Automatically restores the device to its approved state if settings are tampered with or corrupted.

Automated compliance

1 package

Continuously evaluates and remediates security settings without manual intervention.

Automated patch management

1 package

Keeps systems current by automatically downloading, testing, and applying security patches.

Automated remediation

1 package

Applies fixes to failing checks automatically, turning audit findings into corrective action without manual steps.

Automated remediation scripts

1 package

Shell scripts that fix non-compliant settings automatically after a baseline assessment.

Automated security audits

1 package

Scheduled, repeatable scans that check your system against known security benchmarks without manual intervention.

Azure AD/Entra integration

1 package

Integrates identity and access management through Microsoft Entra for cloud-first authentication.

Azure DPS attestation

1 package

Uses Trusted Platform Module attestation during Azure Device Provisioning to verify device identity.

Azure IoT Edge security

1 package

Hardens the Azure IoT Edge runtime and its module deployment pipeline against supply chain threats.

Azure Policy integration

1 package

Enforces security configurations through Azure Policy for automated compliance across cloud resources.

Baseline GPO templates

1 package

Ready-to-import group policy objects that implement security baselines with a single deployment step.

Baseline compliance reporting

1 package

Generates reports showing how each machine in your fleet measures against your security baseline.

Baseline documentation

1 package

Records every hardening decision so your security posture is auditable and reproducible.

Binary allowlisting/denylisting

1 package

Controls which executables can run based on certificate, hash, or path rules at the kernel level.

Binary hash verification

1 package

Compares binary file hashes against published checksums to detect tampering or corruption.

BitLocker configuration

1 package

Enables full-disk encryption with TPM-backed key management to protect data at rest.

BitLocker device encryption

1 package

Encrypts the full device storage with TPM-backed keys to protect data if the hardware is stolen.

Boot chain integrity

1 package

Verifies every link in the boot process from first instruction to userspace, catching early-stage attacks.

Build artifact signing

1 package

Digitally signs every artifact produced by the build process to prove its provenance downstream.

Build isolation

1 package

Runs each build in a clean, ephemeral environment to prevent state leakage between jobs.

Build secrets management

1 package

Securely injects credentials into build processes without persisting them in images or scripts.

Build server hardening

1 package

Secures CI/CD build machines with minimal services, restricted access, and monitored file integrity.

CI runner isolation

1 package

Runs each CI job in an isolated environment to prevent cross-contamination between builds.

CIS Level 1 & 2 variants

1 package

Choose between Level 1 (broad compatibility) and Level 2 (maximum security) hardening profiles.

CIS Level 2 compliance

1 package

Meets the stricter CIS Level 2 benchmark profile designed for security-sensitive environments.

CIS benchmark testing

1 package

Validates system configurations against the Center for Internet Security hardening standards used by enterprises worldwide.

CIS-compliant golden images

1 package

Machine images built and verified against CIS benchmarks, serving as your fleet's trusted starting point.

CIS/NIST/STIG baselines

1 package

Pre-built configuration profiles aligned to CIS, NIST 800-171, and DISA STIG standards for macOS.

CIS/STIG GPO deployment

1 package

Deploys CIS or DISA STIG benchmark settings via Group Policy across your Windows domain.

CIS/STIG compliance

1 package

Meets both CIS and DISA STIG benchmarks, covering the two most widely adopted hardening frameworks.

CVE checking integration

1 package

Scans every package in your build against known vulnerability databases before the image ships.

Centralized logging setup

1 package

Routes all system logs to a central collector for correlation, alerting, and long-term retention.

Certificate chain validation

1 package

Audits and cleans the certificate trust store to remove unnecessary or suspicious root CAs.

Certificate-based rules

1 package

Trusts or blocks software based on its code signing certificate rather than individual file hashes.

Cloud Mac hardening

1 package

Applies security baselines to macOS cloud instances used for CI/CD and development workloads.

Cloud marketplace safety

1 package

Evaluates marketplace offerings for security risks before deploying them in your cloud environment.

Cloud-native baseline deployment

1 package

Applies security baselines using cloud-native tools rather than traditional on-premises methods.

Code signing configuration

1 package

Sets up and protects code signing identities so build artifacts carry trusted digital signatures.

Code signing protection

1 package

Safeguards code signing keys and certificates from extraction, misuse, or unauthorized access.

Compliance documentation

1 package

Ships with documentation mapping each hardening setting to its compliance framework control.

Compliance monitoring

1 package

Continuously checks device configurations against your security policies and flags non-compliance.

Compliance reporting

1 package

Produces evidence-grade documentation showing which controls pass, fail, or require manual review.

Container base image scanning

1 package

Scans container base images for vulnerabilities before they enter your build pipeline.

Credential Guard enablement

1 package

Isolates credential storage in a virtualization-based security container, blocking pass-the-hash attacks.

Cryptographic file verification

1 package

Uses strong hash algorithms to prove files have not been altered since their last verified state.

Custom Linux image building

1 package

Assembles minimal, purpose-built Linux distributions with only the components your IoT device needs.

Custom audit profiles

1 package

Tailor security scans to your environment with configurable rule sets that match your compliance requirements.

Custom boot experience

1 package

Replaces the default Windows boot screens with branded visuals for a polished kiosk or signage experience.

Custom profile generation

1 package

Creates tailored configuration profiles that match your organization's specific compliance requirements.

Custom rule engine

1 package

Write detection rules in a flexible YAML syntax tailored to your application's expected behavior.

Custom rule sets

1 package

Defines which files, directories, and attributes to monitor, focusing attention where it matters most.

DEP/ABM enrollment security

1 package

Secures the Automated Device Enrollment pipeline to prevent unauthorized devices from joining your fleet.

Dependency pinning

1 package

Locks dependency versions to exact releases, preventing unexpected or malicious version upgrades.

Dependency tree auditing

1 package

Maps the full dependency graph of installed software to identify hidden or transitive risk.

Detailed change reports

1 package

Shows exactly what changed (content, permissions, ownership, timestamps) in a human-readable format.

Device Guard policies

1 package

Combines code integrity policies and credential isolation to create a hardware-backed trust boundary.

Device blueprints

1 package

Pre-configured device profiles that define every setting for consistent, repeatable Apple device deployments.

Domain controller hardening

1 package

Specialized security settings for domain controllers, the most security-sensitive servers in any Windows environment.

Drift detection

2 packages

Continuously compares current system state against the approved baseline, flagging any deviations.

Driver block list management

1 package

Deploys and maintains Microsoft's recommended list of known-vulnerable drivers to block.

Driver signing verification

1 package

Confirms kernel-mode drivers carry valid Microsoft-approved signatures before allowing them to load.

Entra ID federation security

1 package

Protects identity federation endpoints and monitors for unauthorized configuration changes.

Event log forwarding

1 package

Routes Windows event logs to a central collector for correlation, alerting, and long-term retention.

Event logging

1 package

Records every execution decision (allow/deny) with full context for audit trails and incident response.

Event streaming

1 package

Streams endpoint events to your SIEM or data lake for centralized analysis and threat hunting.

Extension whitelisting

1 package

Restricts which VM extensions can be installed to prevent malicious or unnecessary code execution.

Fast VM cloning

1 package

Learn how Fast VM cloning strengthens your OS security baseline.

File hash verification

1 package

Computes and compares cryptographic hashes of system files to detect tampering or corruption.

File integrity monitoring

1 package

Detects unauthorized changes to critical system files by comparing current state against a known-good baseline.

Firmware password management

1 package

Sets and manages firmware-level passwords that prevent unauthorized boot modifications.

Firmware verification

1 package

Checks firmware images against vendor-published hashes before flashing to detect supply chain tampering.

Fleet inventory management

1 package

Maintains a real-time inventory of every device, its configuration state, and installed software.

Framework-aligned hardening

1 package

Applies security controls mapped directly to your chosen compliance framework's control objectives.

GPG signature verification

1 package

Verifies package authenticity by checking GNU Privacy Guard signatures against trusted publisher keys.

GPO integrity verification

1 package

Monitors Group Policy Objects for unauthorized changes that could weaken your security posture.

GPO templates

1 package

Pre-built Group Policy Objects ready to import into Active Directory for immediate baseline deployment.

Gatekeeper configuration

1 package

Enforces macOS Gatekeeper policies to ensure only signed and notarized software can execute.

GitHub Actions integration

1 package

Learn how GitHub Actions integration strengthens your OS security baseline.

Golden image creation

1 package

Builds a verified, hardened base image that serves as the starting point for every new deployment.

HTML/XML reporting

1 package

Generates structured compliance reports in standard formats suitable for auditors and management review.

Hardware authenticity checks

1 package

Verifies Apple device serial numbers and identifiers against Apple's records to detect counterfeits.

Hardware component validation

1 package

Confirms physical components match expected specifications to detect counterfeit or substituted parts.

Headless operation

1 package

Learn how Headless operation strengthens your OS security baseline.

Homebrew tap verification

1 package

Confirms the authenticity of Homebrew taps and formulas before installing packages on servers.

Hybrid AD security

1 package

Secures the trust boundary between on-premises Active Directory and cloud identity services.

IMDSv2 enforcement

1 package

Requires the more secure Instance Metadata Service v2 to block SSRF-based credential theft on AWS.

Image pipeline automation

2 packages

Automates the build, harden, scan, and publish cycle for golden VM images using CI/CD pipelines.

Image signing with Azure

1 package

Signs golden VM images using Azure-managed keys to verify integrity during deployment.

Instance metadata protection

1 package

Locks down cloud instance metadata endpoints to prevent credential theft via SSRF attacks.

Instance provisioning security

1 package

Hardens the provisioning pipeline so new instances start from a verified, trusted configuration.

Integrity monitoring deployment

1 package

Deploys file integrity monitoring agents across your fleet with consistent policy enforcement.

Intelligent Security Graph integration

1 package

Leverages Microsoft's cloud intelligence to automatically trust known-good software.

Just-in-time VM access

1 package

Grants temporary, audited access to VM management ports only when needed, reducing exposure.

Kernel hardening

1 package

Tunes kernel parameters, disables unnecessary modules, and enforces memory protections at the OS core.

Kernel hardening checks

1 package

Inspects kernel parameters, modules, and sysctls to ensure the OS core is locked down against privilege escalation.

Kernel-level enforcement

1 package

Blocks unauthorized code at the kernel level before it can execute, not just after detection.

Keyboard Filter rules

1 package

Blocks specific key combinations that could allow users to escape a locked-down kiosk environment.

Kiosk mode hardening

1 package

Locks down Windows kiosk configurations beyond the default settings to prevent escape and tampering.

Kubernetes integration

1 package

Deploys as a DaemonSet with container-aware rules that understand pod, namespace, and image context.

LAPS configuration

1 package

Deploys Local Administrator Password Solution to rotate and secure local admin passwords across servers.

LGPO bulk management

1 package

Applies local group policy settings in bulk across machines that are not domain-joined.

Layer integrity verification

1 package

Validates each Yocto layer's authenticity and version to prevent compromised build components.

License compliance scanning

1 package

Audits open-source license obligations across your embedded software stack to prevent legal exposure.

Lockdown mode

1 package

Switches to a deny-by-default execution policy where only explicitly approved binaries can run.

MDM integration

1 package

Deploys security profiles through mobile device management for zero-touch fleet hardening.

MDM policy deployment

1 package

Pushes hardening configurations to managed devices automatically through your MDM platform.

Machine Configuration extension

1 package

Learn how Machine Configuration extension strengthens your OS security baseline.

Managed installer rules

1 package

Trusts software deployed through approved management tools like SCCM or Intune.

Marketplace image verification

1 package

Validates cloud marketplace VM images against publisher checksums before deployment.

Mass enrollment

1 package

Provisions hundreds of devices simultaneously through Apple Business Manager and DEP integration.

Member server configs

1 package

Baseline security configurations for domain-joined servers that balance security with workload compatibility.

Microsoft baseline deployment

1 package

Applies Microsoft's official security baselines to your Windows Server fleet via Group Policy.

Minimal attack surface

1 package

Strips the OS to essential components only, eliminating unnecessary services, libraries, and tools.

Monitoring and logging

1 package

Captures system events, access logs, and performance metrics for security analysis and compliance.

Multi-cloud availability

1 package

Available across AWS, Azure, and GCP marketplaces for consistent security regardless of cloud provider.

Multi-cloud support

1 package

Works across AWS, Azure, and GCP with consistent tooling and policies regardless of provider.

NIST/CIS/STIG scanning

1 package

Evaluates system state against NIST, CIS, and DISA STIG frameworks in a single automated scan pass.

Network restrictions

1 package

Limits network connectivity to approved endpoints and protocols, reducing exposure to external threats.

Notarization enforcement

2 packages

Requires Apple notarization for all executables, blocking software that has not passed Apple's malware checks.

OCI image support

1 package

Learn how OCI image support strengthens your OS security baseline.

OEM image verification

1 package

Validates Windows IoT images against Microsoft's published checksums before deployment.

OTA update security

1 package

Protects the entire over-the-air update pipeline from package signing through secure delivery and rollback.

Peripheral lockdown

1 package

Disables USB, Bluetooth, AirDrop, and other interfaces to prevent data exfiltration and unauthorized access.

Permission change detection

1 package

Alerts when file or directory permissions shift from their baseline, catching privilege creep early.

Physical security settings

1 package

Configures firmware passwords, activation lock, and erase-on-failed-unlock policies for deployed devices.

Physical tamper detection

1 package

Monitors for signs of physical device tampering using hardware sensors and software integrity checks.

Policy-based monitoring

1 package

Applies monitoring rules based on file criticality, reducing noise from expected changes.

PolicyAnalyzer comparison

1 package

Compares your current group policies against Microsoft's recommended baselines to find configuration drift.

PowerShell script signing

1 package

Enforces code signing requirements for PowerShell scripts to prevent unauthorized script execution.

Pre-hardened VM images

1 package

Virtual machine images that ship with security baselines already applied, ready to deploy.

Profile management

1 package

Creates, deploys, and updates configuration profiles that enforce security and feature settings.

Read-only root filesystem

1 package

Mounts the root partition read-only so attackers cannot persist changes to the operating system.

Real-time alerting

1 package

Sends immediate notifications through Slack, PagerDuty, or webhooks when suspicious activity is detected.

Real-time alerts

1 package

Fires notifications the moment a monitored file changes, shrinking the detection window to seconds.

Regular updates

1 package

Images are refreshed frequently with the latest patches and benchmark revisions.

Remediation tasks

1 package

Automated workflows that fix non-compliant resources when drift is detected.

Report generation

1 package

Summarizes detected changes with timestamps, file paths, and diff details for investigation.

Repository mirroring

1 package

Runs private package mirrors so you control exactly which versions reach your cloud instances.

Reproducible build verification

1 package

Confirms that software can be rebuilt from source to produce identical binaries, proving no tampering occurred.

Reproducible builds

1 package

Ensures identical source inputs produce identical binary outputs, making supply chain injection detectable.

Role-specific baselines

1 package

Security configurations tuned for each Windows Server role (DC, member server, DNS, DHCP, etc.).

Runtime attestation

1 package

Continuously proves the device is running authorized firmware by checking against a trusted reference.

Runtime monitoring setup

1 package

Deploys and configures runtime security agents that watch for post-deployment compromise indicators.

SBOM for embedded systems

1 package

Generates Software Bills of Materials for firmware images, documenting every component in the build.

SBOM generation with Syft

1 package

Creates Software Bills of Materials using Syft, cataloging every component in your software supply chain.

SCAP content evaluation

1 package

Processes Security Content Automation Protocol data to assess compliance against federal and industry standards.

SELinux/AppArmor configuration

1 package

Configures mandatory access control policies that confine processes to their minimum required privileges.

Santa policy management

1 package

Manages Santa binary authorization rules from a central server for fleet-wide application control.

Scheduled integrity checks

1 package

Runs file verification on a timer so changes between scans are caught before they cause damage.

Scheduled scans

1 package

Periodic full-system sweeps that catch modifications missed between real-time monitoring intervals.

Secure Boot for IoT

1 package

Enables UEFI Secure Boot on IoT hardware to verify firmware and OS integrity at every power-on.

Secure boot enforcement

1 package

Ensures all servers boot with UEFI Secure Boot enabled to prevent firmware-level attacks.

Secure boot setup

1 package

Configures the boot chain to cryptographically verify each stage, blocking unauthorized firmware.

Secure provisioning

1 package

Provisions cloud Mac instances from verified images with hardened configurations applied at launch.

Secure update channels

1 package

Configures encrypted, authenticated update delivery paths that resist man-in-the-middle interference.

Security baseline packages

1 package

Microsoft-curated GPO templates that implement recommended security settings for each Windows version.

Security comparison tools

1 package

Utilities that diff your current settings against recommended baselines to identify gaps.

Service minimization

1 package

Removes or disables every non-essential service to shrink the attack surface to what is strictly needed.

Shell Launcher configuration

1 package

Replaces the default Windows shell with a custom application for single-purpose device deployments.

Signed OTA updates

1 package

Requires cryptographic signatures on over-the-air updates, rejecting any package that fails verification.

Signed policy deployment

1 package

Digitally signs application control policies so they cannot be tampered with or bypassed.

Single-app kiosk mode

1 package

Locks the device to a single application, preventing users from accessing any other functionality.

Supervised mode configuration

1 package

Enables maximum management control over Apple devices, including restricting features and locking profiles.

Sync server integration

1 package

Connects to a central management server for coordinated policy updates across your Mac fleet.

Syscall analysis

1 package

Monitors system calls in real time to detect anomalous process behavior indicative of compromise.

T2/M-series security features

1 package

Leverages Apple silicon security capabilities including Secure Enclave, secure boot, and encrypted storage.

UWF configuration

1 package

Configures the Unified Write Filter to protect specific volumes while allowing controlled write-through exceptions.

Unified Write Filter

1 package

Redirects disk writes to an overlay, making the OS partition effectively immutable against persistent attacks.

Update management

1 package

Orchestrates patch deployment across cloud VM fleets with scheduling, testing, and rollback capabilities.

Update ring management

1 package

Stages updates through testing rings before broad deployment, catching issues before they reach production.

VM image hardening

1 package

Strips and secures virtual machine images before they enter the cloud deployment pipeline.

WDAC for IoT

1 package

Tailors Windows Defender Application Control policies for the limited application set on IoT devices.

WDAC policy creation

1 package

Creates Windows Defender Application Control policies tailored to your application inventory.

WDAC policy walkthrough

1 package

Step-by-step guidance for creating and deploying Windows Defender Application Control policies.

WSUS security configuration

1 package

Secures Windows Server Update Services with SSL enforcement and signature verification.

Windows Update integrity checks

1 package

Verifies that Windows Update communications are authentic and update packages are properly signed.

Xcode security settings

1 package

Configures Xcode build settings for security including hardened runtime, library validation, and sandboxing.

eBPF-based monitoring

1 package

Uses extended Berkeley Packet Filter for high-performance kernel-level observability without kernel modules.

osquery integration

1 package

Leverages osquery's SQL-based endpoint visibility for powerful ad-hoc investigation and monitoring.

Looking for comprehensive cybersecurity services?

PC Drama offers full-spectrum cybersecurity solutions including penetration testing, incident response, and compliance consulting.

Explore PC Drama