Skip to content

SamoTech/PolicyForge

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

PolicyForge Banner

PolicyForge

The Ultimate Microsoft Group Policy Intelligence Platform
Stop guessing what policies do. Start engineering Windows environments with precision.

Stars Contributors MIT License 43 Policies Active MITRE Schema v1.0


πŸš€ What Is PolicyForge?

PolicyForge is an open-source intelligence platform for Microsoft Group Policy, ADMX, MDM CSP, and Intune. It bridges the gap between:

  • πŸ“„ Raw ADMX files that are unreadable at scale
  • πŸ–₯️ Group Policy Editor that provides zero context
  • ☁️ Intune with its completely different language (CSP)
  • πŸ”’ Security baselines that are rigid and undocumented

PolicyForge is not documentation. It is infrastructure for IT decision-making.


πŸ”₯ Features

Feature Status
43 policies indexed with context, impact & use cases βœ… Live
MITRE ATT&CK mapping for every security policy βœ… Live
50 GPO β†’ Intune OMA-URI translations βœ… Live
Registry ↔ PowerShell reference βœ… Live
ADMX auto-parser (batch-generates Markdown) βœ… Live
Policy Diff Tracker (Windows 10 vs 11 vs Server) βœ… Live
PowerShell translation engine (GPO β†’ Intune CSV) βœ… Live
Enterprise hardening template (CIS L2 / STIG) βœ… Live
Gaming optimization template βœ… Live
Kiosk / lockdown template βœ… Live
Red team evasion research (MITRE-mapped) βœ… Live
Microsoft Edge security policies (EDGE-001β†’005) βœ… Live
Microsoft Office macro security policies (OFFICE-001β†’005) βœ… Live
Web UI policy search dashboard πŸ”œ Phase 3
AI policy recommendation engine πŸ”œ Phase 4

πŸ—ΊοΈ Roadmap

βœ… Phase 1 β€” Foundation (Complete)
   β”œβ”€β”€ Repository structure
   β”œβ”€β”€ POLICY_SCHEMA.json (standardized schema)
   β”œβ”€β”€ 3 seed policies with full MITRE/CSP/Registry mapping
   └── ADMX parser engine (automation/admx-parser/)

βœ… Phase 2 β€” Scale (Complete)
   β”œβ”€β”€ 43 policies across Windows Security, Privacy, Defender, Edge, Office
   β”œβ”€β”€ 50 GPO β†’ Intune OMA-URI translation mappings
   β”œβ”€β”€ PowerShell translation engine (GPO β†’ Intune CSV export)
   β”œβ”€β”€ Policy Diff Tracker (automation/policy-diff/)
   β”œβ”€β”€ Registry ↔ PowerShell bulk reference
   β”œβ”€β”€ Templates: Enterprise Hardening, Gaming, Kiosk, Red Team
   └── Post-deployment verification scripts

πŸ”œ Phase 3 β€” Web UI (Q3 2026)
   β”œβ”€β”€ Next.js search dashboard
   β”œβ”€β”€ Filter by: OS version, risk level, use case, compliance
   β”œβ”€β”€ Policy conflict detector
   └── Live ADMX diff feed (auto-updates with Windows releases)

πŸ”œ Phase 4 β€” AI Layer (Q4 2026)
   β”œβ”€β”€ Natural language policy query: "Harden 50 SMB endpoints"
   β”œβ”€β”€ Auto-generate GPO pack from environment description
   β”œβ”€β”€ Policy simulator: "What happens if I enable this?"
   └── Conflict prediction engine

πŸ”œ Phase 5 β€” SaaS (2027)
   β”œβ”€β”€ PolicyForge Cloud: web dashboard + API
   β”œβ”€β”€ Tenant-aware policy recommendations
   β”œβ”€β”€ Compliance reporter (CIS, DISA STIG, NIST 800-53)
   └── MDE / Defender for Business integration

πŸ“ Repository Structure

PolicyForge/
β”‚
β”œβ”€β”€ πŸ“ policies/
β”‚   β”œβ”€β”€ windows/security/     # 19 hardening policies (WIN-SECURITY-001β†’019)
β”‚   β”œβ”€β”€ windows/privacy/      # Telemetry, Cortana, OneDrive
β”‚   β”œβ”€β”€ windows/network/      # WPAD and network isolation
β”‚   β”œβ”€β”€ defender/             # 10 Defender policies (DEF-001β†’DEF-010)
β”‚   β”œβ”€β”€ edge/                 # 5 Edge browser policies (EDGE-001β†’EDGE-005)
β”‚   β”œβ”€β”€ office/               # 5 Office macro policies (OFFICE-001β†’OFFICE-005)
β”‚   └── server/               # Windows Server policies (Phase 3)
β”‚
β”œβ”€β”€ πŸ“ templates/
β”‚   β”œβ”€β”€ security-baselines/   # Enterprise baseline (CIS L2 / STIG)
β”‚   β”œβ”€β”€ enterprise-hardening/ # 5-layer hardening + verify.ps1
β”‚   β”œβ”€β”€ gaming-optimization/  # Performance tuning for gaming PCs
β”‚   β”œβ”€β”€ kiosk-mode/           # Full lockdown + assigned access
β”‚   └── redteam-evasion/      # Offensive research (authorized use)
β”‚
β”œβ”€β”€ πŸ“ translations/
β”‚   β”œβ”€β”€ gpo-to-intune/        # 50 GPO β†’ OMA-URI mappings + PS engine
β”‚   └── registry-mapping/     # Registry ↔ PowerShell reference
β”‚
β”œβ”€β”€ πŸ“ automation/
β”‚   β”œβ”€β”€ admx-parser/          # ADMX β†’ Markdown generator
β”‚   └── policy-diff/          # Windows version diff tracker
β”‚
β”œβ”€β”€ πŸ“ dashboards/
β”‚   └── web-ui/               # Phase 3 β€” Next.js
β”‚
β”œβ”€β”€ README.md
β”œβ”€β”€ CONTRIBUTING.md
β”œβ”€β”€ CHANGELOG.md
β”œβ”€β”€ SECURITY.md
β”œβ”€β”€ POLICY_SCHEMA.json
└── LICENSE

πŸ—‚οΈ Policy Index

Category Count Directory
Windows Security 19 policies/windows/security/
Microsoft Defender 10 policies/defender/
Microsoft Office 5 policies/office/
Microsoft Edge 5 policies/edge/
Windows Privacy 3 policies/windows/privacy/
Windows Network 1 policies/windows/network/
Total 43

πŸ§ͺ Example Use Cases

Goal PolicyForge Resource
Harden endpoints against ransomware templates/enterprise-hardening/ + policies/defender/DEF-006
Block macro malware (Emotet/QakBot) policies/office/OFFICE-001 + policies/office/OFFICE-002
Migrate GPO to Intune translations/gpo-to-intune/windows-security.md
Block LLMNR poisoning attacks policies/windows/security/WIN-SECURITY-003
Enforce Edge SmartScreen for all users policies/edge/EDGE-003
Lock down a kiosk / POS terminal templates/kiosk-mode/
Find policies deprecated in Windows 11 automation/policy-diff/policy_diff.py
Optimize a gaming PC via GPO templates/gaming-optimization/
Validate hardening post-deployment templates/enterprise-hardening/verify.ps1

⚑ Quick Start

Explore a Policy

# Browse policies by category
ls policies/defender/
ls policies/windows/security/
ls policies/edge/
ls policies/office/

# Every policy file includes: registry path, PowerShell, Intune CSP, MITRE mapping
cat policies/office/OFFICE-002-block-macros-from-internet.md

Run the ADMX Parser

# Batch-generate Markdown from all ADMX files on your Windows machine
python automation/admx-parser/admx_parser.py \
  --admx-dir "C:\Windows\PolicyDefinitions" \
  --output-dir ./generated-policies

Migrate GPO to Intune

# Scan live registry and export Intune OMA-URI CSV
.\translations\gpo-to-intune\translation-engine.ps1 -OutputCsv .\intune-export.csv
# Then import CSV into: Intune > Devices > Configuration > Create > Custom

Verify Hardening Deployment

# Run as Administrator after applying enterprise hardening
.\templates\enterprise-hardening\verify.ps1
# Outputs PASS/FAIL/MISSING for 13 critical controls

🀝 Contributing

PolicyForge grows through community intelligence. Every contribution makes the platform more valuable for the global sysadmin community.

Ways to contribute:

  • πŸ“ Add a new policy explanation (copy policies/_TEMPLATE.md)
  • πŸ”„ Submit a GPO β†’ Intune mapping we're missing
  • πŸ§ͺ Share a real-world deployment config
  • πŸ”΄ Document an attack path and its defensive fix
  • 🌐 Translate policies for non-English documentation

See CONTRIBUTING.md for full guidelines, badge rewards, and the contributor leaderboard.


πŸ“œ License

MIT License β€” see LICENSE for details.


Made with ❀️ by the PolicyForge community
⭐ Star this repo if it helps you

About

πŸ”₯ The Ultimate Microsoft Group Policy Intelligence Platform β€” GPO, ADMX, Intune CSP, Registry mappings, PowerShell translations, and deployment templates for Windows environments.

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors