mandiant / Mandiant-Azure-AD-InvestigatorLinks
☆647Updated 2 years ago
Alternatives and similar repositories for Mandiant-Azure-AD-Investigator
Users that are interested in Mandiant-Azure-AD-Investigator are comparing it to the libraries listed below
Sorting:
- Contact: CRT@crowdstrike.com☆747Updated 2 years ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆283Updated 3 years ago
- Understand adversary tradecraft and improve detection strategies☆714Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Updated 3 years ago
- Building environments to replicate small networks and deploy applications☆329Updated last week
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆580Updated 11 months ago
- MDATP☆456Updated last year
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆618Updated 9 months ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆268Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆487Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆915Updated 10 months ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆451Updated 2 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,432Updated 3 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆428Updated last year
- Microsoft Sentinel SOC Operations☆266Updated last year
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Updated last year
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆905Updated last year
- All sysmon event types and their fields explained☆564Updated 4 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆238Updated 5 years ago
- Hunting queries and detections☆874Updated 2 months ago
- Atomic Purple Team Framework and Lifecycle☆300Updated 4 years ago
- EventList☆378Updated 4 years ago
- Windows OS Hardening with PowerShell DSC☆288Updated 2 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆290Updated 4 years ago
- Timeline of Active Directory changes with replication metadata☆521Updated 9 months ago
- PowerShell framework to assess Azure security☆1,251Updated 3 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆860Updated 4 years ago
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆645Updated 9 months ago
- ☆615Updated 2 years ago
- KQL queries for Advanced Hunting☆176Updated 6 years ago