microsoft / microsoft-defender-for-endpoint-manageabilityView external linksLinks
Microsoft Defender ATP Manageability and Maintenance scripts
☆29Jun 12, 2023Updated 2 years ago
Alternatives and similar repositories for microsoft-defender-for-endpoint-manageability
Users that are interested in microsoft-defender-for-endpoint-manageability are comparing it to the libraries listed below
Sorting:
- PowerShell Module for managing Microsoft Defender Advanced Threat Protection☆75Nov 10, 2022Updated 3 years ago
- Microsoft Defender Advanced Threat Protection☆48Jan 28, 2026Updated 2 weeks ago
- A modern approach to password rotation for the local administrator account on Windows 10 workstations utilizing Microsoft Endpoint Config…☆11May 5, 2020Updated 5 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago
- ☆14Feb 22, 2021Updated 4 years ago
- ASC PowerShell Module☆22Sep 6, 2018Updated 7 years ago
- A collection of scripts to facilitate management of Microsoft Defender XDR products + Sentinel.☆31Nov 11, 2025Updated 3 months ago
- Simplify PAW and SPA for the masses, unify the MS Internal, and public PAW specs, and expedite deployment to ~5min or less.☆60Aug 30, 2022Updated 3 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- Windows Defender ATP - Advanced Hunting Queries☆22Apr 12, 2018Updated 7 years ago
- Defender for Endpoint☆28Jul 12, 2024Updated last year
- Additional resources to improve customer experience with Microsoft Defender for Identity☆120Sep 12, 2025Updated 5 months ago
- Scripts written in BASH, PowerShell, Python, and other languages.☆10Aug 5, 2023Updated 2 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- This repo contains sample code that demonstrates programmatic access to Azure AD Access Reviews. Sample code includes reading and managin…☆49Jul 8, 2021Updated 4 years ago
- Intune managed Secured workstation☆258Aug 13, 2024Updated last year
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- AWS KMS Encryption & Decyption using CLI & Lambda☆11Apr 12, 2021Updated 4 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆14Dec 3, 2022Updated 3 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Send security notifications to your users when something important happened on their accounts (such as new MFA methods, atypical travels,…☆10Apr 13, 2023Updated 2 years ago
- Microsoft Purview - Bulk assign glossary terms, classification and asset description☆11Aug 2, 2023Updated 2 years ago
- Code samples for SQL Server Discovery using the Microsoft Assessment and Planning (MAP) toolkit☆11Dec 9, 2020Updated 5 years ago
- Code samples for Query relational data in Azure☆16Jun 10, 2020Updated 5 years ago
- ☆11Jun 24, 2024Updated last year
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A windows 11 compatibility checker.☆13Jun 27, 2021Updated 4 years ago
- A bridge between the Orange LoRa® network and the OMA NGSIv1 protocol used by the Orion Context Broker as well as by other components of …☆10May 26, 2023Updated 2 years ago
- A python script to automatically scan and tag AWS Resources 🎓☆10Apr 17, 2018Updated 7 years ago
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 9 years ago
- A lightning fast tool to automatically deploy Purview in a super fast at the click of a button. Clone the repo, execute the scripts, wait…☆11Oct 22, 2021Updated 4 years ago
- Wrapper script to automate common system administration tasks.☆14Feb 27, 2012Updated 13 years ago
- Script to gather Auditpol data forest wide as well as various other Audit Metadata from DC's, Servers and Workstations.☆12Jul 6, 2017Updated 8 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago