General

  • Target

    sc-200.7z

  • Size

    33.0MB

  • MD5

    73ad7cc18ef7c2d93f3fa49567879287

  • SHA1

    0322fccd041f2a1a282532ec6e9c926209194fac

  • SHA256

    344ff451f4ab6618049ab6538a010a8d5a56125eaf16f29f302ce512da36f0fd

  • SHA512

    d5794914f8808ca55c43d7e29d492a6a5f53d28158b82d9e9891315a9fc03ba51b6210733b1f1d82cb690fac00854591fd22972de82c56edd022727d9554321d

  • SSDEEP

    786432:ig2Doxfx2lYlE2KFCqAV8UGLDVjrR/MW4qBjO3GSDV05G2W:jfxD65nAVADhR/8qYrVaG2W

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 6 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • sc-200.7z
    .7z
  • sc-200/365_defender.zip
    .zip
  • 02/integrating-microsoft-365-defender-components-slides.pdf
    .pdf
  • 03/detecting-and-responding-to-endpoint-threats-slides.pdf
    .pdf
    • https://docs.microsoft.com/en-us/learn/paths/sc-200-mitigate-threats-using-microsoft-defender-for-endpoint/

    • https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide

    • https://app.pluralsight.com/library/courses/msft-365-security-threat-protection-implementation-management

    • https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/threat-protection-integration?view=o365-worldwide

  • 04/investigating-and-mitigating-identity-threats-slides.pdf
    .pdf
    • https://docs.microsoft.com/en-us/cloud-app-security/tutorial-shadow-it

    • https://docs.microsoft.com/en-us/learn/paths/sc-200-mitigate-threats-using-microsoft-365-defender/

    • https://docs.microsoft.com/en-us/cloud-app-security/

    • https://app.pluralsight.com/library/courses/msft-365-security-threat-protection-implementation-management

    • https://docs.microsoft.com/en-us/defender-for-identity/suspicious-activity-guide?tabs=external

  • 05/detecting-and-responding-to-threats-on-the-productivity-environment-slides.pdf
    .pdf
    • https://docs.microsoft.com/en-us/learn/paths/sc-200-mitigate-threats-using-microsoft-365-defender/

    • https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide

    • https://app.pluralsight.com/library/courses/msft-365-security-threat-protection-implementation-management

    • https://docs.microsoft.com/en-us/microsoft-365/compliance/?view=o365-worldwide

  • 06/managing-cross-domain-investigations-in-microsoft-365-defender-portal-slides.pdf
    .pdf
    • https://www.microsoft.com/security/blog/2020/07/29/inside-microsoft-threat-protection-solving-cross-domain-security-incidents-through-the-power-of-correlation-analytics/

  • Pluralsight Study Guide - SC-200.docx
    .docx office2007
  • sc-200/Azure AD Cross-tenant attacks via multi-tenant implants (servicePrincipals) – SecureCloudBlog.url
    .url
  • sc-200/Azure-Sentinel-Technical-Playbook-for-MSSPs.pdf
    .pdf
    • https://docs.microsoft.com/en-us/microsoft-365/enterprise/subscriptions-licenses-accounts-and-tenants-for-microsoft-cloud-offerings?view=o365-worldwide

    • http://download.microsoft.com/download/2/3/8/238228E6-9017-4F6C-BD3C-5559E6708F82/MSFT_cloud_architecture_identity.pdf

    • https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-identity?view=o365-worldwide

    • https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-create-new-tenant

    • https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/security/security-top-10

    • https://docs.microsoft.com/en-us/azure/availability-zones/az-overview

    • https://docs.microsoft.com/en-us/azure/architecture/framework/resiliency/overview

    • https://azure.microsoft.com/en-us/global-infrastructure/services/?products=all

    • https://docs.microsoft.com/en-us/azure/governance/management-groups/overview

    • Show all
  • sc-200/Configuring Security Services and Policies in Microsoft Azure - Pluralsight.url
    .url
  • sc-200/How to pass SC-200 exam.url
    .url
  • sc-200/Microsoft Security Operations Analyst (SC-200) Path - Pluralsight.url
    .url
  • sc-200/Microsoft Security Operations Analyst (SC-200).url
    .url
  • sc-200/Microsoft Sentinel Blog - Microsoft Tech Community.url
    .url
  • sc-200/SC-200 Exam - Free Questions and Answers - ITExams.com.url
    .url
  • sc-200/SC-200- Mitigate threats using Microsoft Defender for Endpoint - Learn - Microsoft Docs.url
    .url
  • sc-200/SC-200_StudyGuide_v200_7.1.pdf
    .pdf
    • https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4PsHx

    • https://docs.microsoft.com/learn/certifications/renew-your-microsoft-certification

    • https://docs.microsoft.com/learn/certifications/exams/sc-200

    • https://docs.microsoft.com/learn/certifications/security-operations-analyst/

    • https://docs.microsoft.com/learn/certifications/exam-scoring-reports

    • https://aka.ms/examdemo

    • https://docs.microsoft.com/en-us/learn/certifications/request-accommodations

    • https://www.mindhub.com/p/MU-SC-200

    • https://docs.microsoft.com/learn/paths/sc-200-mitigate-threats-using-microsoft-defender-for-endpoint/?wt.mc_id=examreadiness_sg_content_wwl

    • Show all
  • sc-200/Stocks!.url
    .url
  • sc-200/Welcome - AA-001_Sandbox.url
    .url
  • sc-200/WindowsHardeningRoomCheatsheet.pdf
    .pdf
  • sc-200/kql_cheat_sheet_dark.pdf
    .pdf
  • sc-200/kusto-query-language-kql-from-scratch.zip
    .zip
  • sc-200/mitigate-threats-microsoft-365-defender.zip
    .zip
  • sc-200/sentinel-cert.zip
    .zip
  • sc-200/using_defender.zip
    .zip