Behavioral task
behavioral1
Sample
c00cb1d9cd13f4af9e7c7a3201a419283ec1ab5acdf9c1f7cc6fb5fbe336844f.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c00cb1d9cd13f4af9e7c7a3201a419283ec1ab5acdf9c1f7cc6fb5fbe336844f.pdf
Resource
win10v2004-20231215-en
General
-
Target
c00cb1d9cd13f4af9e7c7a3201a419283ec1ab5acdf9c1f7cc6fb5fbe336844f
-
Size
57.2MB
-
MD5
1cb6e868baa6103d96b177098863a4c5
-
SHA1
b4b8df83ad3b18ffa0aa1a6d9a84e7b99c1deccf
-
SHA256
c00cb1d9cd13f4af9e7c7a3201a419283ec1ab5acdf9c1f7cc6fb5fbe336844f
-
SHA512
12d23a74df6de6358e68f3d4b591e85d694db7007ce6da7c152f99416c2c9124ea516dcd177e2c94b3af92cd24d2ceb8426ab9cea03f131752cdad9f73f9afee
-
SSDEEP
1572864:Ipdyv+YNcv06YhR3SatXUm4ILrbEj998rAMT:Im+/vhovUmvbEpqTT
Malware Config
Signatures
Files
-
c00cb1d9cd13f4af9e7c7a3201a419283ec1ab5acdf9c1f7cc6fb5fbe336844f.pdf
-
https://go.microsoft.com/fwlink/p/?LinkID=698279&culture=en-US&country=US
-
https://azure.microsoft.com/en-us/free/
-
https://www.microsoft.com/en-us/microsoft-365/compare-microsoft-365-enterprise-plans
-
https://azure.microsoft.com/en-us/pricing/details/active-directory/
-
https://packt.link/jSZjR
-
http://www.packtpub.com/support/errata
-
http://authors.packtpub.com/
-
https://www.lifelock.com/
-
https://www.identityguard.com/
-
https://www.isc2.org/Research/Workforce-Study
-
https://gs.statcounter.com/
-
https://gs.statcounter.com/os-market-share/desktop/worldwide
-
https://gs.statcounter.com/os-version-market-share/windows/desktop/worldwide
-
https://gs.statcounter.com/platform-market-share/desktop-mobile-tablet/worldwide/#monthly-200901-202110
-
https://us-cert.cisa.gov/ics/content/cyber-threat-source-descriptions
-
https://enterprise.verizon.com/resources/reports/dbir/
-
https://www.verizon.com/business/resources/reports/dbir/2021/masters-guide/
-
https://www.ic3.gov/
-
https://csrc.nist.gov/glossary
-
https://www.ic3.gov/Media/News/2021/210831.pdf
-
https://www.cisa.gov/stopransomware
-
https://csrc.nist.gov/projects/ransomware-protection-and-response
-
https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C_.pdf
-
https://csrc.nist.gov/CSRC/media/Projects/ransomware-protection-and-response/documents/NIST_Tips_for_Preparing_for_Ransomware_Attacks.pdf
-
https://www.secureworks.com/services/incident-response/incident-management-retainer
-
https://advisory.kpmg.us/services/cyber-response-services.html
-
https://msrc.microsoft.com/update-guide/en-us
-
https://www.microsoft.com/en-us/msrc?rtc=1
-
https://patchtuesdaydashboard.com/
-
https://www.cve.org/About/Overview
-
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Windows
-
https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=Windows&search_type=all&isCpeNameSearch=false
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
https://owasp.org/
-
https://owasp.org/www-project-top-ten/
-
https://en.wikipedia.org/wiki/List_of_data_breaches
-
https://en.wikipedia.org/wiki/List_of_security_hacking_incidents
-
https://www.ibm.com/security/data-breach
-
https://haveibeenpwned.com/
-
https://www.darkreading.com/
-
https://cyware.com/cyber-security-news-articles
-
https://www.cybersecurity-insiders.com/
-
https://www.csoonline.com/
-
https://krebsonsecurity.com/
-
https://thehackernews.com/
-
https://darknetdiaries.com/
-
https://risky.biz/
-
https://www.microsoft.com/en-us/security/business/zero-trust
-
https://download.microsoft.com/download/f/9/2/f92129bc-0d6e-4b8e-a47b-288432bae68e/Zero_Trust_Vision_Paper_Final%2010.28.pdf
-
https://docs.microsoft.com/en-us/security/zero-trust/deploy/endpoints
-
https://www.nist.gov/publications/zero-trust-architecture
-
https://www.cisa.gov/publication/zero-trust-maturity-model
-
https://www.nintex.com/process-automation/process-mapping/
-
https://www.axelos.com/certifications/itil-service-management/what-is-itil
-
https://www.isaca.org/resources/cobit
-
https://www.iso.org/isoiec-27001-information-security.html
-
https://www.nist.gov/cyberframework
-
https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
-
https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final
-
https://hitrustalliance.net/hitrust-csf/
-
https://www.nist.gov/cyberframework/online-learning/five-functions
-
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
-
https://www.cisecurity.org/
-
https://www.cisecurity.org/about-us/
-
https://learn.cisecurity.org/ms-isac-subscription
-
https://www.cisecurity.org/cybersecurity-best-practices/
-
https://www.cisecurity.org/cis-benchmarks/
-
https://www.cisecurity.org/cis-hardened-images
-
https://portal.azure.com/
-
https://www.microsoft.com/en-us/download/details.aspx?id=55319
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-compliance-toolkit-10
-
https://endpoint.microsoft.com/
-
https://docs.microsoft.com/en-us/mem/intune/protect/security-baselines#available-security-baselines
-
https://www.us-cert.gov/ncas/alerts/TA18-004A
-
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/hyper-v-technology-overview
-
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-windows-guest-operating-systems-for-hyper-v-on-windows
-
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms
-
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/get-started/install-the-hyper-v-role-on-windows-server
-
https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/hyper-v-requirements
-
https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/quick-start/enable-hyper-v
-
https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/quick-start/quick-create-virtual-machine
-
https://docs.microsoft.com/en-us/lifecycle/products/
-
https://docs.microsoft.com/en-us/azure-stack/hci/overview
-
https://docs.microsoft.com/en-us/azure/virtual-machines/windows/overview
-
https://docs.microsoft.com/en-us/azure/virtual-desktop/overview
-
https://docs.microsoft.com/en-us/windows-365/
-
https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management
-
https://cwe.mitre.org/scoring/lists/2021_CWE_MIHW.html
-
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/plan/plan-hyper-v-security-in-windows-server
-
https://azure.microsoft.com/en-us/solutions/confidential-compute/
-
https://azure.microsoft.com/en-us/services/azure-attestation
-
https://docs.microsoft.com/en-us/windows-hardware/design/compatibility/
-
https://partner.microsoft.com/en-us/dashboard/hardware/search/cpl
-
https://www.windowsservercatalog.com/
-
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
-
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf
-
https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/manage-tpm-lockout
-
https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm
-
https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs
-
https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-considerations
-
https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-how-it-works
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity
-
https://trustedcomputinggroup.org/wp-content/uploads/DRTM-Specification-Overview_June2013.pdf
-
https://us-cert.cisa.gov/ncas/alerts
-
https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml
-
https://www.us-cert.gov/ncas/tips/ST18-001
-
https://www.us-cert.gov/ncas/tips/ST18-247
-
https://docs.microsoft.com/en-us/windows/win32/nativewifi/wpa2-enterprise-with-tls-profile-sample
-
https://www.us-cert.gov/ncas/tips/ST15-002
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2-upd1.pdf
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-bluetooth#servicesallowedlist-usage-guide
-
https://awesomeopensource.com/project/engn33r/awesome-bluetooth-security
-
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/vpn-device-tunnel-config
-
https://support.microsoft.com/en-us/windows/connect-to-a-vpn-in-windows-3d29aeb1-f497-f6b7-7633-115722c1009c#WindowsVersion=Windows_11
-
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/plan/plan-hyper-v-networking-in-windows-server
-
https://www.wireshark.org/
-
https://www.telerik.com/fiddler
-
https://security.microsoft.com/
-
https://security.microsoft.com/preferences2/custom_ti_indicators/files
-
https://docs.microsoft.com/en-US/troubleshoot/windows-client/group-policy/create-and-manage-central-store
-
https://docs.microsoft.com/en-us/azure/virtual-network/service-tags-overview
-
https://docs.microsoft.com/en-us/azure/web-application-firewall/overview
-
https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview
-
https://docs.microsoft.com/en-us/microsoft-identity-manager/microsoft-identity-manager-2016
-
https://docs.microsoft.com/en-us/azure/active-directory/app-provisioning/plan-cloud-hr-provision
-
https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
-
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
-
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization
-
https://docs.microsoft.com/en-us/azure/active-directory/b2b/what-is-b2b
-
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview
-
https://docs.microsoft.com/en-us/azure/active-directory/b2b/compare-with-b2c
-
https://admin.microsoft.com/
-
https://docs.microsoft.com/en-us/azure/role-based-access-control/
-
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
-
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-getting-started
-
https://docs.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-overview
-
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-premises-deploy
-
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-writeback
-
https://aka.ms/sspr
-
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows
-
https://docs.microsoft.com/en-us/azure/active-directory/devices/concept-primary-refresh-token
-
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
-
https://fidoalliance.org/
-
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification
-
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
-
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks
-
https://docs.microsoft.com/en-us/mem/configmgr/
-
https://docs.microsoft.com/en-us/configmgr/core/clients/manage/collections/introduction-to-collections
-
https://docs.microsoft.com/en-us/mem/configmgr/core/understand/fundamentals-of-role-based-administration
-
https://docs.microsoft.com/en-us/configmgr/core/clients/manage/manage-clients
-
https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/hierarchy/communications-between-endpoints
-
https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/network/cng-certificates-overview
-
https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/security/cryptographic-controls-technical-reference
-
https://docs.microsoft.com/en-us/configmgr/core/clients/deploy/plan/best-practices-for-client-deployment
-
https://docs.microsoft.com/en-us/configmgr/core/clients/deploy/deploy-clients-cmg-azure
-
https://docs.microsoft.com/en-us/configmgr/core/clients/deploy/plan/security-and-privacy-for-clients
-
https://docs.microsoft.com/en-us/mem/configmgr/core/servers/deploy/configure/azure-services-wizard
-
https://docs.microsoft.com/en-us/mem/configmgr/comanage/overview
-
https://docs.microsoft.com/en-us/mem/configmgr/core/servers/manage/cmpivot
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/bitlocker-csp
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/configuration-service-provider-reference
-
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip
-
https://docs.microsoft.com/en-us/mem/intune/enrollment/enrollment-method-capab
-
https://docs.microsoft.com/en-us/mem/intune/protect/security-baselines
-
https://docs.microsoft.com/en-us/intune/apps/intune-management-extension
-
https://docs.microsoft.com/en-us/mem/intune/apps/apps-win32-prepare
-
https://docs.microsoft.com/en-us/mem/intune/apps/apps-windows-10-app-deploy
-
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-overview
-
https://www.microsoft.com/en-us/windows/windows-11-specifications
-
https://support.microsoft.com/en-us/office/how-onedrive-safeguards-your-data-in-the-cloud-23c6ea94-3608-48d7-8bf0-80e142edd1e1?ui=en-us&rs=en-us&ad=us
-
https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install
-
https://docs.microsoft.com/en-us/mem/intune/enrollment/device-enrollment-manager-enroll
-
https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-packages
-
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit
-
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt
-
https://docs.microsoft.com/en-us/configmgr/mdt/index?redirectedfrom=MSDN
-
https://docs.microsoft.com/en-us/mem/configmgr/osd/deploy-use/deploy-task-sequence-over-internet
-
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager
-
https://docs.microsoft.com/en-us/mem/autopilot/software-requirements
-
https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo/3.5
-
https://docs.microsoft.com/en-us/mem/autopilot/registration-overview
-
https://docs.microsoft.com/en-us/mem/autopilot/enrollment-autopilot
-
https://docs.microsoft.com/en-us/mem/autopilot/enrollment-status
-
https://docs.microsoft.com/en-us/mem/autopilot/windows-autopilot
-
https://docs.microsoft.com/en-us/azure/virtual-machines/windows/image-builder-virtual-desktop
-
https://docs.microsoft.com/en-us/azure/virtual-desktop/
-
https://docs.microsoft.com/en-us/windows-365/enterprise/requirements
-
https://docs.microsoft.com/en-us/azure/virtual-machines/windows/capture-image-resource
-
https://windows365.microsoft.com/
-
https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/remote-desktop-clients
-
http://windows365.microsoft.com/
-
https://docs.microsoft.com/en-us/windows-365/enterprise/
-
https://docs.microsoft.com/en-us/lifecycle/policies/modern/
-
https://docs.microsoft.com/en-us/windows/deployment/windows-autopatch/
-
https://docs.microsoft.com/en-us/windows/deployment/update/waas-overview
-
https://docs.microsoft.com/en-us/mem/intune/protect/windows-update-rollout-options
-
https://docs.microsoft.com/en-us/mem/intune/protect/windows-update-for-business-configure
-
https://docs.microsoft.com/en-us/mem/intune/protect/windows-10-expedite-updates
-
https://docs.microsoft.com/en-us/mem/intune/configuration/delivery-optimization-settings
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/policies-in-policy-csp-supported-by-group-policy
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-restrictedgroups
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-localusersandgroups
-
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-basic-deployment
-
https://myaccount.microsoft.com/device-list
-
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/
-
https://docs.microsoft.com/en-us/mem/intune/protect/windows-hello
-
https://www.cisecurity.org/cis-securesuite/
-
https://www.cisecurity.org/blog/introducing-cis-cat-pro/
-
https://github.com/SamMRoberts/Convert-GPOtoCI
-
https://docs.microsoft.com/en-us/mem/intune/configuration/group-policy-analytics-migrate#review-and-migrate-your-gpos-to-a-settings-catalog-policy
-
https://gs.statcounter.com/browser-market-share
-
https://techcommunity.microsoft.com/t5/windows-it-pro-blog/proven-tools-to-accelerate-your-move-to-microsoft-edge/ba-p/2504818
-
https://www.microsoft.com/en-us/edge/business/download
-
https://microsoftedge.microsoft.com/addons/detail/office/gggmmkjegpiggikcnhidnjjhmicpibll
-
https://cloud.google.com/chrome-enterprise/browser/download
-
https://chrome.google.com/webstore/category/extensions?hl=en-US
-
https://clients2.google.com/service/update2/crx
-
https://www.statista.com/
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/win32-and-centennial-app-policy-configuration
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/understanding-admx-backed-policies
-
https://www.cvedetails.com/
-
https://www.cvedetails.com/product/320/Microsoft-Office.html?vendor_id=26
-
https://docs.microsoft.com/en-us/deployoffice/plan-microsoft-365-apps
-
https://www.microsoft.com/en-us/download/details.aspx?id=49030
-
https://config.office.com/
-
https://docs.microsoft.com/en-us/deployoffice/admincenter/overview-office-cloud-policy-service
-
https://portal.atp.azure.com/
-
https://portal.cloudappsecurity.com/
-
https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/0
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection?view=o365-worldwide
-
https://docs.microsoft.com/en-us/mem/intune/apps/store-apps-company-portal-app
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/controlled-folders?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exploit-protection-reference?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/evaluate-exploit-protection?view=o365-worldwide
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/windowsdefenderapplicationguard-csp
-
http://edge//application-guard-internals
-
https://chrome.google.com/webstore/detail/application-guard-extensi/mfjnknhkkiafjajicegabkbimfhplplj?hl=en-US
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension
-
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/install-app-guard?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/safe-docs?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/data-storage-privacy?view=o365-worldwide
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/device-control-removable-storage-access-control?view=o365-worldwide
-
https://github.com/SpiderLabs/Responder
-
https://github.com/byt3bl33d3r/CrackMapExec
-
https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py
-
https://docs.microsoft.com/en-us/archive/blogs/josebda/the-basics-of-smb-signing-covering-both-smb1-and-smb2
-
https://techcommunity.microsoft.com/t5/sql-server-blog/step-by-step-guide-to-setup-ldaps-on-windows-server/ba-p/385362
-
https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV190023
-
https://6lab.cisco.com/index.php
-
https://github.com/dirkjanm/mitm6
-
https://www.ettercap-project.org/
-
https://attack.mitre.org/tactics/TA0007/
-
https://github.com/CiscoCXSecurity/enum4linux
-
https://www.adamcouch.co.uk/disable-domain-user-enumeration/
-
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-defaults
-
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions
-
https://github.com/SecureAuthCorp/impacket
-
https://github.com/gentilkiwi/mimikatz
-
https://attack.mitre.org/techniques/T1003/
-
https://attack.mitre.org/mitigations/M1024/
-
https://docs.microsoft.com/en-us/mem/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn
-
https://azure.microsoft.com/en-us/overview/what-are-private-public-hybrid-clouds/
-
https://azure.microsoft.com/en-us/overview/what-is-iaas/
-
https://azure.microsoft.com/en-us/overview/what-is-paas/
-
https://azure.microsoft.com/en-us/overview/what-is-saas/
-
https://docs.microsoft.com/en-us/security/compass/privileged-access-strategy
-
https://docs.microsoft.com/en-us/security/compass/security-rapid-modernization-plan
-
https://delinea.com/products/secret-server
-
https://docs.microsoft.com/en-us/security/compass/privileged-access-deployment
-
https://docs.microsoft.com/en-us/windows-server/administration/server-manager/run-best-practices-analyzer-scans-and-manage-scan-results
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide
-
https://aka.ms/WindowsAdminCenter
-
https://docs.microsoft.com/en-us/windows-server/storage/storage-migration-service/migrate-data
-
https://docs.microsoft.com/en-us/windows-server/manage/windows-admin-center/plan/installation-options
-
https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-overview
-
https://azuremarketplace.microsoft.com/en-us/marketplace/
-
https://docs.microsoft.com/en-us/azure/azure-resource-manager/templates/
-
https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/overview
-
https://docs.microsoft.com/en-us/azure/role-based-access-control/role-definitions
-
https://docs.microsoft.com/en-us/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows
-
https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
-
https://www.w3schools.com/whatis/whatis_json.asp
-
https://docs.microsoft.com/bs-latn-ba/azure/backup/backup-overview
-
https://docs.microsoft.com/en-us/azure/backup/multi-user-authorization
-
https://docs.microsoft.com/en-us/azure/site-recovery/site-recovery-overview
-
https://docs.microsoft.com/en-us/azure/site-recovery/migrate-tutorial-on-premises-azure
-
https://docs.microsoft.com/en-us/azure/automation/update-management/enable-from-portal
-
https://docs.microsoft.com/en-us/azure/automation/update-management/overview
-
https://docs.microsoft.com/en-us/azure/azure-arc/
-
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/manage/azure-server-management/
-
https://docs.microsoft.com/en-us/azure/automanage/automanage-virtual-machines#prerequisites
-
https://docs.microsoft.com/en-us/azure/automanage/automanage-windows-server#participating-services
-
https://docs.microsoft.com/en-us/azure/automanage/virtual-machines-custom-profile
-
https://azure.microsoft.com/en-us/services/
-
https://docs.microsoft.com/en-us/windows-server/remote/remote-server-administration-tools
-
https://docs.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage
-
https://docs.microsoft.com/en-us/windows-server/get-started/windows-server-release-info
-
https://docs.microsoft.com/en-us/lifecycle/products/?products=windows
-
https://www.windowsservercatalog.com/noresults.aspx?1&bCatID=1333&cpID=0&avc=10&ava=0&avt=0&avq=140&OR=1&PGS=25#/catalog?FeatureSupported=securedCoreServer
-
https://docs.microsoft.com/en-us/windows-server/storage/file-server/smb-over-quic
-
https://docs.microsoft.com/en-us/windows-server/get-started/whats-new-in-windows-server-2022
-
https://docs.microsoft.com/en-us/windows-server/get-started/editions-comparison-windows-server-2022
-
https://docs.microsoft.com/en-us/windows-server/administration/server-core/server-core-roles-and-services
-
https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus#25-secure-wsus-with-the-secure-sockets-layer-protocol
-
https://docs.microsoft.com/en-us/azure/automation/automation-network-configuration
-
https://docs.microsoft.com/en-us/azure/automation/troubleshoot/update-management
-
https://docs.microsoft.com/en-us/azure/automation/update-management/configure-wuagent
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/why-use-microsoft-defender-antivirus?view=o365-worldwide
-
https://azure.microsoft.com/en-us/pricing/details/defender-for-cloud/
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-server-endpoints?view=o365-worldwide#windows-server-2012-r2-and-windows-server-2016
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-server-endpoints?view=o365-worldwide
-
https://www.cisecurity.org/cis-securesuite/cis-securesuite-build-kit-content/build-kits-faq
-
https://docs.microsoft.com/en-us/azure/automation/automation-dsc-overview
-
https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings
-
https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/how-to-configure-protected-accounts
-
https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/how-to-configure-protected-accounts#BKMK_CreateAuthNPolicies
-
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd560653(v=ws.10)
-
http://docs.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
-
https://support.microsoft.com/en-us/topic/2020-ldap-channel-binding-and-ldap-signing-requirements-for-windows-kb4520412-ef185fb8-00f7-167d-744c-f299a66fc00a
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design
-
https://docs.microsoft.com/en-us/azure/virtual-machines/windows/disk-encryption-faq
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy
-
https://webapp-wdac-wizard.azurewebsites.net/
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-file-rule-levels
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control
-
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_language_modes?view=powershell-7.2
-
https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/prerequisites?view=powershell-7.2
-
https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/overview?view=powershell-7.2
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/threat-analytics?view=o365-worldwide.
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-dashboard-insights?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machines-view-overview?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machine-reports?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-software-inventory?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/advanced-features?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-list?view=o365-worldwide
-
https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.pdf
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/onboard-configure?view=o365-worldwide
-
https://docs.microsoft.com/en-us/azure/azure-monitor/agents/azure-monitor-agent-migration
-
https://docs.microsoft.com/en-us/azure/azure-monitor/agents/agent-windows
-
https://docs.microsoft.com/en-us/azure/azure-arc/servers/agent-overview#installation-and-configuration
-
https://docs.microsoft.com/en-us/azure/azure-monitor/agents/azure-monitor-agent-overview?tabs=PowerShellWindows
-
https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-get-started#update-compliance-prerequisites
-
https://docs.microsoft.com/en-us/azure/automation/change-tracking
-
https://docs.microsoft.com/en-us/azure/azure-monitor/insights/service-map
-
https://docs.microsoft.com/en-us/azure/azure-monitor/roles-permissions-security
-
https://docs.microsoft.com/en-us/azure/azure-monitor/essentials/activity-log-schema
-
https://docs.microsoft.com/en-us/azure/azure-monitor/visualize/workbooks-overview
-
https://downdetector.com/status/windows-azure/
-
https://status.azure.com/en-us/status
-
https://docs.microsoft.com/en-us/azure/defender-for-cloud/os-coverage
-
https://docs.microsoft.com/en-us/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers?tabs=features-windows
-
https://docs.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference
-
https://docs.microsoft.com/en-us/mem/analytics/enroll-intune
-
https://docs.microsoft.com/en-us/mem/intune/remote-actions/collect-diagnostics
-
https://support.microsoft.com/en-us/topic/windows-11-update-history-a19cd327-b57f-44b9-84e0-26ced7109ba9
-
https://docs.microsoft.com/en-us/mem/configmgr/core/servers/manage/introduction-to-reporting
-
https://docs.microsoft.com/en-us/mem/configmgr/core/servers/manage/list-of-reports
-
https://docs.microsoft.com/en-us/deployoffice/admincenter/servicing-profile
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender/portals?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machine-groups?view=o365-worldwide
-
https://docs.microsoft.com/en-us/microsoft-365/security/defender/manage-incidents?view=o365-worldwide
-
https://azure.microsoft.com/en-us/pricing/details/microsoft-sentinel/
-
https://docs.microsoft.com/en-us/azure/sentinel/
-
https://docs.microsoft.com/en-us/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps
-
https://docs.microsoft.com/en-us/defender-cloud-apps/proxy-intro-aad
-
http://portal.cloudappsecurity.com/
-
https://docs.microsoft.com/en-us/defender-cloud-apps/proxy-deployment-aad
-
https://docs.microsoft.com/en-us/defender-cloud-apps/set-up-cloud-discovery
-
https://docs.microsoft.com/en-us/defender-cloud-apps/security-config
-
https://docs.microsoft.com/en-us/defender-cloud-apps/governance-actions
-
https://docs.microsoft.com/en-us/defender-for-identity/architecture
-
https://docs.microsoft.com/en-us/defender-for-identity/prerequisites
-
https://docs.microsoft.com/en-us/defender-for-identity/capacity-planning
-
https://docs.microsoft.com/en-us/defender-for-identity/install-step1
-
https://docs.microsoft.com/en-us/defender-for-identity/working-with-suspicious-activities
-
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
-
https://compliance.microsoft.com/homepage
-
https://docs.microsoft.com/en-us/windows/client-management/mdm/enterprisedataprotection-csp
-
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure
-
https://csrc.nist.gov/publications/detail/sp/800-34/rev-1/final
-
https://www.aicpa.org/soc
-
https://sharedassessments.org/sig/
-
https://cloudsecurityalliance.org/research/cloud-controls-matrix/
-
https://securityscorecard.com/product/security-ratings
-
https://www.bitsight.com/third-party-risk-management
-
https://servicetrust.microsoft.com/
-
https://serviceshub.microsoft.com/
-
https://docs.microsoft.com/en-us/services-hub/health/
-
https://learn.cisecurity.org/cis-cat-lite
-
https://www.nist.gov/cyberframework/assessment-auditing-resources
-
https://www.qualys.com/
-
https://www.tenable.com/
-
https://www.openvas.org/
-
https://cirt.net/nikto2
-
https://docs.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-vm
-
https://docs.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference
-
https://www.secureworks.com/services/adversarial-security-testing/penetration-testing
-
https://www.mandiant.com/services/technical-assurance/penetration-testing
-
https://www.rapid7.com/services/security-consulting/penetration-testing-services/
-
https://www.metasploit.com/
-
https://nmap.org/
-
https://www.microsoft.com/en-us/msrc/pentest-rules-of-engagement
-
https://csrc.nist.gov/publications/detail/sp/800-115/final
-
https://www.knowbe4.com/
-
https://www.proofpoint.com/us/products/security-awareness-training
-
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide
-
https://www.cisa.gov/cisa-tabletop-exercises-packages
-
https://www.microsoft.com/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/
-
https://docs.microsoft.com/en-us/security/zero-trust/
-
https://azure.microsoft.com/en-us/services/windows-iot/
-
https://www.conosco.com/blog/iot-security-breaches-4-real-world-examples/
-
https://www.msspalert.com/cybersecurity-research/managed-security-services-market-forecast/
-
https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
-
http://packt.com/
-
http://www.packt.com/
-
https://www.packt.com/product/security/b17375-cybersecurity-career-master-plan/
-
https://www.packt.com/product/security/b17428-mobile-app-reverse-engineering/
- Show all
-