Blumira / FlowmiraLinks
Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-actions.
☆18Updated 4 years ago
Alternatives and similar repositories for Flowmira
Users that are interested in Flowmira are comparing it to the libraries listed below
Sorting:
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆261Updated 4 years ago
- Real-time Response scripts and schema☆116Updated last year
- PowerShell for CrowdStrike's OAuth2 APIs☆428Updated this week
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆223Updated 6 months ago
- PerchLabs threat feed☆16Updated 4 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 4 years ago
- Repository of SentinelOne Deep Visibility queries.☆130Updated 4 years ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆61Updated 10 months ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 11 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆209Updated 5 years ago
- This repository contains Community and Field contributed content for LogScale☆258Updated last week
- Exchange Transport rules to detect and enable response to phishing☆416Updated 5 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆609Updated last year
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆684Updated last week
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆877Updated 5 months ago
- Timeline of Active Directory changes with replication metadata☆513Updated 5 months ago
- The CrowdStrike Falcon SDK for Python☆425Updated 2 weeks ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated 11 months ago
- EventList☆376Updated 4 years ago
- ☆86Updated 5 months ago
- LogRhythm PowerShell Toolkit☆50Updated last week
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆285Updated 2 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆485Updated 9 months ago
- MDATP☆460Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 10 months ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆115Updated 5 years ago
- Incident Response Hierarchy of Needs☆463Updated 2 years ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆235Updated 8 months ago
- Sysmon configuration file template with default high-quality event tracing☆505Updated 3 weeks ago