Blumira / LogmiraLinks
Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.
☆62Updated last year
Alternatives and similar repositories for Logmira
Users that are interested in Logmira are comparing it to the libraries listed below
Sorting:
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆265Updated last year
- Security-Focused O365 Management and Log Scripts☆62Updated 3 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆116Updated 5 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆227Updated 10 months ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆200Updated 8 years ago
- ☆51Updated 5 years ago
- Little PowerShell module to extract PowerShell scripts that no longer exists on disk but were run and are still in Event Logs.☆39Updated 4 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 5 years ago
- Azure Sentinel Template parser☆16Updated 5 years ago
- PowerShell Module to interact with VirusTotal☆122Updated 5 years ago
- A series of scripts☆101Updated 4 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Updated 2 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- ☆43Updated 2 years ago
- Collect / retrieve Office365, AzureAD and DLP audit logs and output to PRTG, Azure Log Analytics Workspace, SQL, Graylog, Fluentd, and/or…☆117Updated last year
- Sysmon configuration file templates with advanced event tracing and blocking☆40Updated 3 months ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆290Updated 4 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 6 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆99Updated 5 years ago
- PowerShell Module for managing Microsoft Defender Advanced Threat Protection☆74Updated 3 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆29Updated 6 months ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Updated 2 years ago
- ☆88Updated 9 months ago
- Advanced Hunting Queries for Microsoft Security Products☆108Updated 2 years ago
- M365 MDATP Live Response sample scripts☆82Updated last year
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- ☆74Updated last year
- Tools to create a Native Windows Audit Collection Platform. Active Directory example provided☆78Updated 6 years ago
- Various tools used to monitor and troubleshoot Azure Sentinel data☆31Updated last year