JSCU-NL / logging-essentials
A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.
☆276Updated 3 years ago
Alternatives and similar repositories for logging-essentials:
Users that are interested in logging-essentials are comparing it to the libraries listed below
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆247Updated 3 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆259Updated 2 years ago
- PowerShell module for Office 365 and Azure log collection☆253Updated 2 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆288Updated 3 months ago
- Building environments to replicate small networks and deploy applications☆317Updated last year
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 3 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆113Updated 3 months ago
- A list of my personal projects☆173Updated 2 years ago
- EventList☆371Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆466Updated 11 months ago
- Repository of SentinelOne Deep Visibility queries.☆120Updated 3 years ago
- Atomic Purple Team Framework and Lifecycle☆284Updated 3 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆237Updated last month
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆195Updated 4 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆464Updated last month
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆516Updated 3 weeks ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆214Updated 2 years ago
- MDATP☆456Updated 5 months ago
- Public Repo for Atomic Test Harness☆258Updated 6 months ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆427Updated last year
- Timeline of Active Directory changes with replication metadata☆484Updated last week
- Detection Ideas & Rules repository.☆178Updated 3 years ago
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆123Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆110Updated last year
- Build a attack range in your local machine☆130Updated last year
- ATT&CK Remote Threat Hunting Incident Response☆198Updated last month
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆78Updated 4 years ago
- Powershell module for VMWare vSphere forensics☆146Updated 2 months ago
- A python script developed to process Windows memory images based on triage type.☆260Updated last year