Skip to content

SamoTech/PolicyForge

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

83 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

PolicyForge Banner

PolicyForge

The Ultimate Microsoft Group Policy Intelligence Platform
Stop guessing what policies do. Start engineering Windows environments with precision.

Stars Contributors MIT License 80+ Policies Active MITRE Schema v1.0 Web UI Live


πŸš€ What Is PolicyForge?

PolicyForge is an open-source intelligence platform for Microsoft Group Policy, ADMX, MDM CSP, and Intune. It bridges the gap between:

  • πŸ“„ Raw ADMX files that are unreadable at scale
  • πŸ–₯️ Group Policy Editor that provides zero context
  • ☁️ Intune with its completely different language (CSP)
  • πŸ”’ Security baselines that are rigid and undocumented

PolicyForge is not documentation. It is infrastructure for IT decision-making.

🌐 Live Web UI: ms-gpo.vercel.app β€” Search policies, filter by risk level & category, view MITRE ATT&CK mappings, registry paths, PowerShell commands, and Intune OMA-URIs in one place.


πŸ”₯ Features

Feature Status
80+ policies indexed with context, impact & use cases βœ… Live
MITRE ATT&CK mapping for every security policy βœ… Live
GPO β†’ Intune OMA-URI translations βœ… Live
Registry ↔ PowerShell reference βœ… Live
ADMX auto-parser (batch-generates Markdown) βœ… Live
Policy Diff Tracker (Windows 10 vs 11 vs Server) βœ… Live
PowerShell translation engine (GPO β†’ Intune CSV) βœ… Live
Enterprise hardening template (CIS L2 / STIG) βœ… Live
Gaming optimization template βœ… Live
Kiosk / lockdown template βœ… Live
Red team evasion research (MITRE-mapped) βœ… Live
Microsoft Edge security policies (EDGE-001β†’013) βœ… Live
Microsoft Office macro security policies (OFFICE-001β†’005) βœ… Live
Web UI policy search dashboard βœ… Live β€” ms-gpo.vercel.app
AI policy recommendation engine πŸ”œ Phase 4

πŸ—ΊοΈ Roadmap

βœ… Phase 1 β€” Foundation (Complete)
   β”œβ”€β”€ Repository structure
   β”œβ”€β”€ POLICY_SCHEMA.json (standardized schema)
   β”œβ”€β”€ 3 seed policies with full MITRE/CSP/Registry mapping
   └── ADMX parser engine (automation/admx-parser/)

βœ… Phase 2 β€” Scale (Complete)
   β”œβ”€β”€ 80+ policies across Windows Security, Privacy, Defender, Edge, Office, Account Policies
   β”œβ”€β”€ GPO β†’ Intune OMA-URI translation mappings
   β”œβ”€β”€ PowerShell translation engine (GPO β†’ Intune CSV export)
   β”œβ”€β”€ Policy Diff Tracker (automation/policy-diff/)
   β”œβ”€β”€ Registry ↔ PowerShell bulk reference
   β”œβ”€β”€ Templates: Enterprise Hardening, Gaming, Kiosk, Red Team
   └── Post-deployment verification scripts

βœ… Phase 3 β€” Web UI (Complete)
   β”œβ”€β”€ Next.js search dashboard β†’ https://ms-gpo.vercel.app
   β”œβ”€β”€ Filter by: category (Defender, Edge, Office, Network, Privacy, Security)
   β”œβ”€β”€ Filter by: risk level (Critical, High, Medium, Low)
   β”œβ”€β”€ Real-time search across policies, registry, MITRE, OMA-URI
   └── Policy cards with MITRE ATT&CK tags, risk badges, category labels

πŸ”œ Phase 4 β€” AI Layer (Q4 2026)
   β”œβ”€β”€ Natural language policy query: "Harden 50 SMB endpoints"
   β”œβ”€β”€ Auto-generate GPO pack from environment description
   β”œβ”€β”€ Policy simulator: "What happens if I enable this?"
   └── Conflict prediction engine

πŸ”œ Phase 5 β€” SaaS (2027)
   β”œβ”€β”€ PolicyForge Cloud: web dashboard + API
   β”œβ”€β”€ Tenant-aware policy recommendations
   β”œβ”€β”€ Compliance reporter (CIS, DISA STIG, NIST 800-53)
   └── MDE / Defender for Business integration

πŸ“ Repository Structure

PolicyForge/
β”‚
β”œβ”€β”€ πŸ“ policies/
β”‚   β”œβ”€β”€ windows/security/         # 19 hardening policies (WIN-SECURITY-001β†’019)
β”‚   β”œβ”€β”€ windows/privacy/          # 3 privacy policies (WIN-PRIVACY-001β†’003)
β”‚   β”œβ”€β”€ windows/network/          # Network isolation policies
β”‚   β”œβ”€β”€ windows/account-policies/ # 13 account policies (ACC-001β†’013)
β”‚   β”œβ”€β”€ windows/applocker/        # AppLocker policies
β”‚   β”œβ”€β”€ windows/audit/            # Audit policies
β”‚   β”œβ”€β”€ windows/bitlocker/        # BitLocker policies
β”‚   β”œβ”€β”€ windows/credentials/      # Credential protection policies
β”‚   β”œβ”€β”€ windows/firewall/         # Windows Firewall policies
β”‚   β”œβ”€β”€ windows/smb/              # SMB hardening policies
β”‚   β”œβ”€β”€ windows/update/           # Windows Update policies
β”‚   β”œβ”€β”€ windows/user-rights/      # User Rights Assignment policies
β”‚   β”œβ”€β”€ windows/wdac/             # Windows Defender App Control policies
β”‚   β”œβ”€β”€ defender/                 # 10 Defender policies (DEF-001β†’DEF-010)
β”‚   β”œβ”€β”€ edge/                     # 13 Edge browser policies (EDGE-001β†’EDGE-013)
β”‚   β”œβ”€β”€ office/                   # 5 Office macro policies (OFFICE-001β†’OFFICE-005)
β”‚   └── server/                   # Windows Server policies (Phase 3)
β”‚
β”œβ”€β”€ πŸ“ templates/
β”‚   β”œβ”€β”€ security-baselines/   # Enterprise baseline (CIS L2 / STIG)
β”‚   β”œβ”€β”€ enterprise-hardening/ # 5-layer hardening + verify.ps1
β”‚   β”œβ”€β”€ gaming-optimization/  # Performance tuning for gaming PCs
β”‚   β”œβ”€β”€ kiosk-mode/           # Full lockdown + assigned access
β”‚   └── redteam-evasion/      # Offensive research (authorized use)
β”‚
β”œβ”€β”€ πŸ“ translations/
β”‚   β”œβ”€β”€ gpo-to-intune/        # GPO β†’ OMA-URI mappings + PS engine
β”‚   └── registry-mapping/     # Registry ↔ PowerShell reference
β”‚
β”œβ”€β”€ πŸ“ automation/
β”‚   β”œβ”€β”€ admx-parser/          # ADMX β†’ Markdown generator
β”‚   └── policy-diff/          # Windows version diff tracker
β”‚
β”œβ”€β”€ πŸ“ dashboards/
β”‚   └── web-ui/               # Phase 3 β€” Next.js (Live: ms-gpo.vercel.app)
β”‚
β”œβ”€β”€ README.md
β”œβ”€β”€ CONTRIBUTING.md
β”œβ”€β”€ CHANGELOG.md
β”œβ”€β”€ SECURITY.md
β”œβ”€β”€ POLICY_SCHEMA.json
└── LICENSE

πŸ—‚οΈ Policy Index

Category Count Directory
Windows Security 19 policies/windows/security/
Windows Account Policies 13 policies/windows/account-policies/
Microsoft Edge 13 policies/edge/
Microsoft Defender 10 policies/defender/
Microsoft Office 5 policies/office/
Windows Privacy 3 policies/windows/privacy/
Windows Firewall, SMB, AppLocker, BitLocker, Audit, Update, User Rights, WDAC, Network, Credentials 10+ policies/windows/*/
Total 80+

πŸ§ͺ Example Use Cases

Goal PolicyForge Resource
Harden endpoints against ransomware templates/enterprise-hardening/ + policies/defender/DEF-006
Block macro malware (Emotet/QakBot) policies/office/OFFICE-001 + policies/office/OFFICE-002
Migrate GPO to Intune translations/gpo-to-intune/windows-security.md
Block LLMNR poisoning attacks policies/windows/security/WIN-SECURITY-003
Enforce Edge SmartScreen for all users policies/edge/EDGE-003
Lock down a kiosk / POS terminal templates/kiosk-mode/
Find policies deprecated in Windows 11 automation/policy-diff/policy_diff.py
Optimize a gaming PC via GPO templates/gaming-optimization/
Validate hardening post-deployment templates/enterprise-hardening/verify.ps1
Search & explore all policies visually ms-gpo.vercel.app

⚑ Quick Start

Explore Policies via Web UI

Visit ms-gpo.vercel.app to search all policies by name, registry path, MITRE technique, or OMA-URI. Filter by category and risk level instantly β€” no setup required.

Explore a Policy (CLI)

# Browse policies by category
ls policies/defender/
ls policies/windows/security/
ls policies/edge/
ls policies/office/

# Every policy file includes: registry path, PowerShell, Intune CSP, MITRE mapping
cat policies/office/OFFICE-002-block-macros-from-internet.md

Run the ADMX Parser

# Batch-generate Markdown from all ADMX files on your Windows machine
python automation/admx-parser/admx_parser.py \
  --admx-dir "C:\Windows\PolicyDefinitions" \
  --output-dir ./generated-policies

Migrate GPO to Intune

# Scan live registry and export Intune OMA-URI CSV
.\translations\gpo-to-intune\translation-engine.ps1 -OutputCsv .\intune-export.csv
# Then import CSV into: Intune > Devices > Configuration > Create > Custom

Verify Hardening Deployment

# Run as Administrator after applying enterprise hardening
.\templates\enterprise-hardening\verify.ps1
# Outputs PASS/FAIL/MISSING for 13 critical controls

🀝 Contributing

PolicyForge grows through community intelligence. Every contribution makes the platform more valuable for the global sysadmin community.

Ways to contribute:

  • πŸ“ Add a new policy explanation (copy policies/_TEMPLATE.md)
  • πŸ”„ Submit a GPO β†’ Intune mapping we're missing
  • πŸ§ͺ Share a real-world deployment config
  • πŸ”΄ Document an attack path and its defensive fix
  • 🌐 Translate policies for non-English documentation

See CONTRIBUTING.md for full guidelines, badge rewards, and the contributor leaderboard.


πŸ“œ License

MIT License β€” see LICENSE for details.


Made with ❀️ by the PolicyForge community
🌐 Try the Live Web UI  ·  ⭐ Star this repo if it helps you

About

πŸ”₯ The Ultimate Microsoft Group Policy Intelligence Platform β€” GPO, ADMX, Intune CSP, Registry mappings, PowerShell translations, and deployment templates for Windows environments.

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

 
 
 

Contributors