olafhartong / WDACmeLinks
A WDAC configuration repository with the sole intention of enriching MDE
☆29Updated 2 months ago
Alternatives and similar repositories for WDACme
Users that are interested in WDACme are comparing it to the libraries listed below
Sorting:
- ☆42Updated last year
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆20Updated last year
- ☆73Updated 10 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆110Updated 8 months ago
- ☆43Updated 4 years ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆37Updated this week
- ☆42Updated 2 years ago
- Velociraptor Server hosted in Azure App Service☆56Updated 2 months ago
- ☆61Updated 2 years ago
- MDE relies on some of the Audit settings to be enabled☆98Updated 3 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- ☆31Updated last year
- Advanced Hunting Queries for Microsoft Security Products☆108Updated 2 years ago
- Automation around Entra ID☆37Updated last month
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Updated 9 months ago
- Defender Resource Hub☆28Updated last month
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆93Updated last week
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆74Updated 5 months ago
- Hunting Queries for Defender ATP☆82Updated 4 months ago
- ☆30Updated 3 months ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- ☆22Updated last year
- GitHub action for validating Microsoft Sentinel detection rules☆13Updated 2 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Updated last year
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- Microsoft Sentinel related content☆37Updated 7 months ago
- ☆50Updated last year
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆55Updated 2 years ago