olafhartong / DefenderHarvester
Expose a lot of MDE telemetry that is not easily accessible in any searchable form
☆99Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for DefenderHarvester
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆112Updated this week
- ☆40Updated last year
- Hunting Queries for Defender ATP☆73Updated this week
- ☆48Updated last year
- Presentations from Conferences☆26Updated 2 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆79Updated 3 months ago
- A tiny tool to find and fix common misconfigurations in Active Directory-integrated DNS☆97Updated last month
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.☆75Updated 3 months ago
- A WDAC configuration repository with the sole intention of enriching MDE☆27Updated last year
- A tiny tool built to help AD Admins safely utilize the Protected Users group.☆27Updated last week
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆20Updated 2 months ago
- ☆70Updated last month
- Reportly is an AzureAD user activity report tool.☆89Updated last year
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆87Updated last month
- ASR Configurator, Essentials and Atomic Testing☆36Updated 3 weeks ago
- Notes on responding to security breaches relating to Azure AD☆96Updated 2 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 7 months ago
- Pushes Sysmon Configs☆89Updated 3 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆107Updated 3 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆91Updated 2 months ago
- ResearchDev - XDR & SIEM Detection☆62Updated this week
- Table of AD and Azure assets and whether they belong to Tier Zero☆190Updated this week
- MS Entra ID Protection Guidance☆20Updated 7 months ago
- Automation around Entra ID☆34Updated 4 months ago
- Repository that contains random short projects like write-ups, PowerShell scripts, and more.☆26Updated last week
- Repository with supporting materials for Invictus Academy/Training☆36Updated last month
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆11Updated 2 years ago
- ☆105Updated last year