Skip to content

KyleC69/WindowsConfigurationAnalyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Windows Configuration Analyzer


Windows Configuration Analyzer is a forensics?grade Windows Operating System analyzer. It helps you inspect, understand, and retain evidence about system configuration, security posture, and behavioral signals without needing to script or manually traverse the registry, file system, or policy stores.

What It Does (Plain Language)

  • Collects configuration and security data (permissions, policies, traces, rules evaluations) using safe read operations.
  • Evaluates data against rules, baselines, and heuristics to highlight potential misconfigurations or anomalies.
  • Compares current state to known baselines to spot drift.
  • Surfaces Event Tracing for Windows (ETW) manifest information for deeper activity insight.
  • Uses AI?assisted and rules?based analysis (where enabled) to summarize findings.

Key Benefits

  • Fast visibility into permissions and configuration hotspots.
  • Read?only collection focus for safety (does not alter settings).
  • Extensible probes and rules so functionality grows over time.
  • Friendly UI built on WinUI 3 targeting .NET 9 for modern performance.

Typical Use Cases

  1. Review folder/file access control lists before a security review.
  2. Capture a point?in?time snapshot of configuration for audit or incident response.
  3. Detect drift from a security baseline after updates or software installs.
  4. Investigate unusual behavior by correlating ETW event manifest data.

Getting Started

  1. Download the latest release package (zip or installer) from the Releases page.
  2. Unblock the zip (right?click > Properties > Unblock if present) and extract.
  3. Run the application executable from the UserInterface distribution folder.
  4. Choose a probe (e.g., Permissions) and enter a path like C:\Windows.
  5. Review results; open the Analysis / Rules view for evaluated insights.

Interface Overview

  • Home / Dashboard: Launch common probes and view recent results.
  • Probes: Start targeted data collection tasks (ACLs, configuration sets, etc.).
  • Analysis: View rule engine evaluations, heuristic flags, and baseline comparisons.
  • Export / Share: Copy or save structured results for reporting.

Data Safety & Privacy

  • Primarily read?only: Operations are designed not to modify system state.
  • No automatic remote transmission of collected data.
  • You control exports; redact sensitive paths before sharing.

Tips

  • Run as Administrator for protected folders or registry hives.
  • Start with smaller scopes (specific folders) for quicker results.
  • Re?run probes after changes to confirm remediation success.

System Requirements

  • Windows 10 or 11 (recommended latest patch level).
  • .NET 9 runtime (if a self?contained build is not provided).
  • Sufficient privileges for protected resource inspection where required.

Limitations (Early Versions)

  • Some deep system areas may require elevated permissions.
  • AI analysis modules may be experimental and disabled by default.

Feedback & Support

  • Open issues for bugs, enhancement requests, or usability feedback.
  • Include steps, screenshots, and probe types when reporting problems.

Disclaimer

Use results as guidance; always validate critical security decisions with additional tools or professional review.


End?user overview. Subject to change as the project evolves.

About

A deep forensics tool for Windows.

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published