Baseline Features
The building blocks of a hardened operating system. Each feature represents a security capability found across our tools, services, and guides.
AD hardening
1 packageStrengthens Active Directory against modern attack techniques like Kerberoasting, DCSync, and Golden Ticket.
AMI/image verification
1 packageValidates cloud VM images against published checksums and signatures before launching instances.
APT/DNF repository pinning
1 packageLocks package sources to specific repositories and versions, preventing supply chain confusion attacks.
Access control configuration
1 packageRestricts who can access cloud Mac instances and what actions they can perform.
Ansible integration
1 packagePlugs directly into Ansible playbooks for infrastructure-as-code driven compliance enforcement at scale.
App deployment
1 packagePushes approved applications to devices silently, ensuring the right software is installed from day one.
AppLocker/WDAC policies
1 packageConfigures application control to allow only approved software to execute on servers.
Apple Silicon native
1 packageLearn how Apple Silicon native strengthens your OS security baseline.
Application whitelisting
1 packageOnly permits approved executables to run, blocking unknown or malicious binaries at launch.
Artifact signing setup
1 packageConfigures automated signing of build artifacts with securely managed code signing identities.
Artifact verification
1 packageValidates build outputs against expected hashes and signatures before they leave the build pipeline.
Audit mode for testing
1 packageLogs what would be blocked without actually enforcing, letting you test policies before going live.
Authenticode verification
1 packageChecks Windows Authenticode digital signatures to confirm software publisher identity and integrity.
Auto-recovery configuration
1 packageAutomatically restores the device to its approved state if settings are tampered with or corrupted.
Automated compliance
1 packageContinuously evaluates and remediates security settings without manual intervention.
Automated patch management
1 packageKeeps systems current by automatically downloading, testing, and applying security patches.
Automated remediation
1 packageApplies fixes to failing checks automatically, turning audit findings into corrective action without manual steps.
Automated remediation scripts
1 packageShell scripts that fix non-compliant settings automatically after a baseline assessment.
Automated security audits
1 packageScheduled, repeatable scans that check your system against known security benchmarks without manual intervention.
Azure AD/Entra integration
1 packageIntegrates identity and access management through Microsoft Entra for cloud-first authentication.
Azure DPS attestation
1 packageUses Trusted Platform Module attestation during Azure Device Provisioning to verify device identity.
Azure IoT Edge security
1 packageHardens the Azure IoT Edge runtime and its module deployment pipeline against supply chain threats.
Azure Policy integration
1 packageEnforces security configurations through Azure Policy for automated compliance across cloud resources.
Baseline GPO templates
1 packageReady-to-import group policy objects that implement security baselines with a single deployment step.
Baseline compliance reporting
1 packageGenerates reports showing how each machine in your fleet measures against your security baseline.
Baseline documentation
1 packageRecords every hardening decision so your security posture is auditable and reproducible.
Binary allowlisting/denylisting
1 packageControls which executables can run based on certificate, hash, or path rules at the kernel level.
Binary hash verification
1 packageCompares binary file hashes against published checksums to detect tampering or corruption.
BitLocker configuration
1 packageEnables full-disk encryption with TPM-backed key management to protect data at rest.
BitLocker device encryption
1 packageEncrypts the full device storage with TPM-backed keys to protect data if the hardware is stolen.
Boot chain integrity
1 packageVerifies every link in the boot process from first instruction to userspace, catching early-stage attacks.
Build artifact signing
1 packageDigitally signs every artifact produced by the build process to prove its provenance downstream.
Build isolation
1 packageRuns each build in a clean, ephemeral environment to prevent state leakage between jobs.
Build secrets management
1 packageSecurely injects credentials into build processes without persisting them in images or scripts.
Build server hardening
1 packageSecures CI/CD build machines with minimal services, restricted access, and monitored file integrity.
CI runner isolation
1 packageRuns each CI job in an isolated environment to prevent cross-contamination between builds.
CIS Level 1 & 2 variants
1 packageChoose between Level 1 (broad compatibility) and Level 2 (maximum security) hardening profiles.
CIS Level 2 compliance
1 packageMeets the stricter CIS Level 2 benchmark profile designed for security-sensitive environments.
CIS benchmark testing
1 packageValidates system configurations against the Center for Internet Security hardening standards used by enterprises worldwide.
CIS-compliant golden images
1 packageMachine images built and verified against CIS benchmarks, serving as your fleet's trusted starting point.
CIS/NIST/STIG baselines
1 packagePre-built configuration profiles aligned to CIS, NIST 800-171, and DISA STIG standards for macOS.
CIS/STIG GPO deployment
1 packageDeploys CIS or DISA STIG benchmark settings via Group Policy across your Windows domain.
CIS/STIG compliance
1 packageMeets both CIS and DISA STIG benchmarks, covering the two most widely adopted hardening frameworks.
CVE checking integration
1 packageScans every package in your build against known vulnerability databases before the image ships.
Centralized logging setup
1 packageRoutes all system logs to a central collector for correlation, alerting, and long-term retention.
Certificate chain validation
1 packageAudits and cleans the certificate trust store to remove unnecessary or suspicious root CAs.
Certificate-based rules
1 packageTrusts or blocks software based on its code signing certificate rather than individual file hashes.
Cloud Mac hardening
1 packageApplies security baselines to macOS cloud instances used for CI/CD and development workloads.
Cloud marketplace safety
1 packageEvaluates marketplace offerings for security risks before deploying them in your cloud environment.
Cloud-native baseline deployment
1 packageApplies security baselines using cloud-native tools rather than traditional on-premises methods.
Code signing configuration
1 packageSets up and protects code signing identities so build artifacts carry trusted digital signatures.
Code signing protection
1 packageSafeguards code signing keys and certificates from extraction, misuse, or unauthorized access.
Compliance documentation
1 packageShips with documentation mapping each hardening setting to its compliance framework control.
Compliance monitoring
1 packageContinuously checks device configurations against your security policies and flags non-compliance.
Compliance reporting
1 packageProduces evidence-grade documentation showing which controls pass, fail, or require manual review.
Container base image scanning
1 packageScans container base images for vulnerabilities before they enter your build pipeline.
Credential Guard enablement
1 packageIsolates credential storage in a virtualization-based security container, blocking pass-the-hash attacks.
Cryptographic file verification
1 packageUses strong hash algorithms to prove files have not been altered since their last verified state.
Custom Linux image building
1 packageAssembles minimal, purpose-built Linux distributions with only the components your IoT device needs.
Custom audit profiles
1 packageTailor security scans to your environment with configurable rule sets that match your compliance requirements.
Custom boot experience
1 packageReplaces the default Windows boot screens with branded visuals for a polished kiosk or signage experience.
Custom profile generation
1 packageCreates tailored configuration profiles that match your organization's specific compliance requirements.
Custom rule engine
1 packageWrite detection rules in a flexible YAML syntax tailored to your application's expected behavior.
Custom rule sets
1 packageDefines which files, directories, and attributes to monitor, focusing attention where it matters most.
DEP/ABM enrollment security
1 packageSecures the Automated Device Enrollment pipeline to prevent unauthorized devices from joining your fleet.
Dependency pinning
1 packageLocks dependency versions to exact releases, preventing unexpected or malicious version upgrades.
Dependency tree auditing
1 packageMaps the full dependency graph of installed software to identify hidden or transitive risk.
Detailed change reports
1 packageShows exactly what changed (content, permissions, ownership, timestamps) in a human-readable format.
Device Guard policies
1 packageCombines code integrity policies and credential isolation to create a hardware-backed trust boundary.
Device blueprints
1 packagePre-configured device profiles that define every setting for consistent, repeatable Apple device deployments.
Domain controller hardening
1 packageSpecialized security settings for domain controllers, the most security-sensitive servers in any Windows environment.
Drift detection
2 packagesContinuously compares current system state against the approved baseline, flagging any deviations.
Driver block list management
1 packageDeploys and maintains Microsoft's recommended list of known-vulnerable drivers to block.
Driver signing verification
1 packageConfirms kernel-mode drivers carry valid Microsoft-approved signatures before allowing them to load.
Entra ID federation security
1 packageProtects identity federation endpoints and monitors for unauthorized configuration changes.
Event log forwarding
1 packageRoutes Windows event logs to a central collector for correlation, alerting, and long-term retention.
Event logging
1 packageRecords every execution decision (allow/deny) with full context for audit trails and incident response.
Event streaming
1 packageStreams endpoint events to your SIEM or data lake for centralized analysis and threat hunting.
Extension whitelisting
1 packageRestricts which VM extensions can be installed to prevent malicious or unnecessary code execution.
Fast VM cloning
1 packageLearn how Fast VM cloning strengthens your OS security baseline.
File hash verification
1 packageComputes and compares cryptographic hashes of system files to detect tampering or corruption.
File integrity monitoring
1 packageDetects unauthorized changes to critical system files by comparing current state against a known-good baseline.
Firmware password management
1 packageSets and manages firmware-level passwords that prevent unauthorized boot modifications.
Firmware verification
1 packageChecks firmware images against vendor-published hashes before flashing to detect supply chain tampering.
Fleet inventory management
1 packageMaintains a real-time inventory of every device, its configuration state, and installed software.
Framework-aligned hardening
1 packageApplies security controls mapped directly to your chosen compliance framework's control objectives.
GPG signature verification
1 packageVerifies package authenticity by checking GNU Privacy Guard signatures against trusted publisher keys.
GPO integrity verification
1 packageMonitors Group Policy Objects for unauthorized changes that could weaken your security posture.
GPO templates
1 packagePre-built Group Policy Objects ready to import into Active Directory for immediate baseline deployment.
Gatekeeper configuration
1 packageEnforces macOS Gatekeeper policies to ensure only signed and notarized software can execute.
GitHub Actions integration
1 packageLearn how GitHub Actions integration strengthens your OS security baseline.
Golden image creation
1 packageBuilds a verified, hardened base image that serves as the starting point for every new deployment.
HTML/XML reporting
1 packageGenerates structured compliance reports in standard formats suitable for auditors and management review.
Hardware authenticity checks
1 packageVerifies Apple device serial numbers and identifiers against Apple's records to detect counterfeits.
Hardware component validation
1 packageConfirms physical components match expected specifications to detect counterfeit or substituted parts.
Headless operation
1 packageLearn how Headless operation strengthens your OS security baseline.
Homebrew tap verification
1 packageConfirms the authenticity of Homebrew taps and formulas before installing packages on servers.
Hybrid AD security
1 packageSecures the trust boundary between on-premises Active Directory and cloud identity services.
IMDSv2 enforcement
1 packageRequires the more secure Instance Metadata Service v2 to block SSRF-based credential theft on AWS.
Image pipeline automation
2 packagesAutomates the build, harden, scan, and publish cycle for golden VM images using CI/CD pipelines.
Image signing with Azure
1 packageSigns golden VM images using Azure-managed keys to verify integrity during deployment.
Instance metadata protection
1 packageLocks down cloud instance metadata endpoints to prevent credential theft via SSRF attacks.
Instance provisioning security
1 packageHardens the provisioning pipeline so new instances start from a verified, trusted configuration.
Integrity monitoring deployment
1 packageDeploys file integrity monitoring agents across your fleet with consistent policy enforcement.
Intelligent Security Graph integration
1 packageLeverages Microsoft's cloud intelligence to automatically trust known-good software.
Just-in-time VM access
1 packageGrants temporary, audited access to VM management ports only when needed, reducing exposure.
Kernel hardening
1 packageTunes kernel parameters, disables unnecessary modules, and enforces memory protections at the OS core.
Kernel hardening checks
1 packageInspects kernel parameters, modules, and sysctls to ensure the OS core is locked down against privilege escalation.
Kernel-level enforcement
1 packageBlocks unauthorized code at the kernel level before it can execute, not just after detection.
Keyboard Filter rules
1 packageBlocks specific key combinations that could allow users to escape a locked-down kiosk environment.
Kiosk mode hardening
1 packageLocks down Windows kiosk configurations beyond the default settings to prevent escape and tampering.
Kubernetes integration
1 packageDeploys as a DaemonSet with container-aware rules that understand pod, namespace, and image context.
LAPS configuration
1 packageDeploys Local Administrator Password Solution to rotate and secure local admin passwords across servers.
LGPO bulk management
1 packageApplies local group policy settings in bulk across machines that are not domain-joined.
Layer integrity verification
1 packageValidates each Yocto layer's authenticity and version to prevent compromised build components.
License compliance scanning
1 packageAudits open-source license obligations across your embedded software stack to prevent legal exposure.
Lockdown mode
1 packageSwitches to a deny-by-default execution policy where only explicitly approved binaries can run.
MDM integration
1 packageDeploys security profiles through mobile device management for zero-touch fleet hardening.
MDM policy deployment
1 packagePushes hardening configurations to managed devices automatically through your MDM platform.
Machine Configuration extension
1 packageLearn how Machine Configuration extension strengthens your OS security baseline.
Managed installer rules
1 packageTrusts software deployed through approved management tools like SCCM or Intune.
Marketplace image verification
1 packageValidates cloud marketplace VM images against publisher checksums before deployment.
Mass enrollment
1 packageProvisions hundreds of devices simultaneously through Apple Business Manager and DEP integration.
Member server configs
1 packageBaseline security configurations for domain-joined servers that balance security with workload compatibility.
Microsoft baseline deployment
1 packageApplies Microsoft's official security baselines to your Windows Server fleet via Group Policy.
Minimal attack surface
1 packageStrips the OS to essential components only, eliminating unnecessary services, libraries, and tools.
Monitoring and logging
1 packageCaptures system events, access logs, and performance metrics for security analysis and compliance.
Multi-cloud availability
1 packageAvailable across AWS, Azure, and GCP marketplaces for consistent security regardless of cloud provider.
Multi-cloud support
1 packageWorks across AWS, Azure, and GCP with consistent tooling and policies regardless of provider.
NIST/CIS/STIG scanning
1 packageEvaluates system state against NIST, CIS, and DISA STIG frameworks in a single automated scan pass.
Network restrictions
1 packageLimits network connectivity to approved endpoints and protocols, reducing exposure to external threats.
Notarization enforcement
2 packagesRequires Apple notarization for all executables, blocking software that has not passed Apple's malware checks.
OCI image support
1 packageLearn how OCI image support strengthens your OS security baseline.
OEM image verification
1 packageValidates Windows IoT images against Microsoft's published checksums before deployment.
OTA update security
1 packageProtects the entire over-the-air update pipeline from package signing through secure delivery and rollback.
Peripheral lockdown
1 packageDisables USB, Bluetooth, AirDrop, and other interfaces to prevent data exfiltration and unauthorized access.
Permission change detection
1 packageAlerts when file or directory permissions shift from their baseline, catching privilege creep early.
Physical security settings
1 packageConfigures firmware passwords, activation lock, and erase-on-failed-unlock policies for deployed devices.
Physical tamper detection
1 packageMonitors for signs of physical device tampering using hardware sensors and software integrity checks.
Policy-based monitoring
1 packageApplies monitoring rules based on file criticality, reducing noise from expected changes.
PolicyAnalyzer comparison
1 packageCompares your current group policies against Microsoft's recommended baselines to find configuration drift.
PowerShell script signing
1 packageEnforces code signing requirements for PowerShell scripts to prevent unauthorized script execution.
Pre-hardened VM images
1 packageVirtual machine images that ship with security baselines already applied, ready to deploy.
Profile management
1 packageCreates, deploys, and updates configuration profiles that enforce security and feature settings.
Read-only root filesystem
1 packageMounts the root partition read-only so attackers cannot persist changes to the operating system.
Real-time alerting
1 packageSends immediate notifications through Slack, PagerDuty, or webhooks when suspicious activity is detected.
Real-time alerts
1 packageFires notifications the moment a monitored file changes, shrinking the detection window to seconds.
Regular updates
1 packageImages are refreshed frequently with the latest patches and benchmark revisions.
Remediation tasks
1 packageAutomated workflows that fix non-compliant resources when drift is detected.
Report generation
1 packageSummarizes detected changes with timestamps, file paths, and diff details for investigation.
Repository mirroring
1 packageRuns private package mirrors so you control exactly which versions reach your cloud instances.
Reproducible build verification
1 packageConfirms that software can be rebuilt from source to produce identical binaries, proving no tampering occurred.
Reproducible builds
1 packageEnsures identical source inputs produce identical binary outputs, making supply chain injection detectable.
Role-specific baselines
1 packageSecurity configurations tuned for each Windows Server role (DC, member server, DNS, DHCP, etc.).
Runtime attestation
1 packageContinuously proves the device is running authorized firmware by checking against a trusted reference.
Runtime monitoring setup
1 packageDeploys and configures runtime security agents that watch for post-deployment compromise indicators.
SBOM for embedded systems
1 packageGenerates Software Bills of Materials for firmware images, documenting every component in the build.
SBOM generation with Syft
1 packageCreates Software Bills of Materials using Syft, cataloging every component in your software supply chain.
SCAP content evaluation
1 packageProcesses Security Content Automation Protocol data to assess compliance against federal and industry standards.
SELinux/AppArmor configuration
1 packageConfigures mandatory access control policies that confine processes to their minimum required privileges.
Santa policy management
1 packageManages Santa binary authorization rules from a central server for fleet-wide application control.
Scheduled integrity checks
1 packageRuns file verification on a timer so changes between scans are caught before they cause damage.
Scheduled scans
1 packagePeriodic full-system sweeps that catch modifications missed between real-time monitoring intervals.
Secure Boot for IoT
1 packageEnables UEFI Secure Boot on IoT hardware to verify firmware and OS integrity at every power-on.
Secure boot enforcement
1 packageEnsures all servers boot with UEFI Secure Boot enabled to prevent firmware-level attacks.
Secure boot setup
1 packageConfigures the boot chain to cryptographically verify each stage, blocking unauthorized firmware.
Secure provisioning
1 packageProvisions cloud Mac instances from verified images with hardened configurations applied at launch.
Secure update channels
1 packageConfigures encrypted, authenticated update delivery paths that resist man-in-the-middle interference.
Security baseline packages
1 packageMicrosoft-curated GPO templates that implement recommended security settings for each Windows version.
Security comparison tools
1 packageUtilities that diff your current settings against recommended baselines to identify gaps.
Service minimization
1 packageRemoves or disables every non-essential service to shrink the attack surface to what is strictly needed.
Shell Launcher configuration
1 packageReplaces the default Windows shell with a custom application for single-purpose device deployments.
Signed OTA updates
1 packageRequires cryptographic signatures on over-the-air updates, rejecting any package that fails verification.
Signed policy deployment
1 packageDigitally signs application control policies so they cannot be tampered with or bypassed.
Single-app kiosk mode
1 packageLocks the device to a single application, preventing users from accessing any other functionality.
Supervised mode configuration
1 packageEnables maximum management control over Apple devices, including restricting features and locking profiles.
Sync server integration
1 packageConnects to a central management server for coordinated policy updates across your Mac fleet.
Syscall analysis
1 packageMonitors system calls in real time to detect anomalous process behavior indicative of compromise.
T2/M-series security features
1 packageLeverages Apple silicon security capabilities including Secure Enclave, secure boot, and encrypted storage.
UWF configuration
1 packageConfigures the Unified Write Filter to protect specific volumes while allowing controlled write-through exceptions.
Unified Write Filter
1 packageRedirects disk writes to an overlay, making the OS partition effectively immutable against persistent attacks.
Update management
1 packageOrchestrates patch deployment across cloud VM fleets with scheduling, testing, and rollback capabilities.
Update ring management
1 packageStages updates through testing rings before broad deployment, catching issues before they reach production.
VM image hardening
1 packageStrips and secures virtual machine images before they enter the cloud deployment pipeline.
WDAC for IoT
1 packageTailors Windows Defender Application Control policies for the limited application set on IoT devices.
WDAC policy creation
1 packageCreates Windows Defender Application Control policies tailored to your application inventory.
WDAC policy walkthrough
1 packageStep-by-step guidance for creating and deploying Windows Defender Application Control policies.
WSUS security configuration
1 packageSecures Windows Server Update Services with SSL enforcement and signature verification.
Windows Update integrity checks
1 packageVerifies that Windows Update communications are authentic and update packages are properly signed.
Xcode security settings
1 packageConfigures Xcode build settings for security including hardened runtime, library validation, and sandboxing.
eBPF-based monitoring
1 packageUses extended Berkeley Packet Filter for high-performance kernel-level observability without kernel modules.
osquery integration
1 packageLeverages osquery's SQL-based endpoint visibility for powerful ad-hoc investigation and monitoring.
Looking for comprehensive cybersecurity services?
PC Drama offers full-spectrum cybersecurity solutions including penetration testing, incident response, and compliance consulting.