instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Work with defenders to unders...
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Assess which telemetry sources a...
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Work with defenders to unders...
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Work with defenders to unders...
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Work with defenders to unders...
Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Assess which telemetry sources a...
EDR product blocking common tooling: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
EDR product blocking common tooling
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Work with defenders to unders...
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Work with defenders to unders...
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Plan mock impact exercises that demonstrate poten...
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Simulate staging of data within an isolated...
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Plan mock impact exercises that demonstrate poten...
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Validate blue-team detection of suspicio...
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Plan mock impact exercises that demonstrate poten...
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 4: Validate blue-team detection of suspicio...
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Simulate staging of data within an isolated...
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Plan mock impact exercises that demonstrate poten...
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Validate blue-team detection of suspicio...
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Plan mock impact exercises that demonstrate poten...
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Simulate staging of data within an isolated...
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 4: Plan mock impact exercises that demonstrate poten...
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 4: Validate blue-team detection of suspicio...
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Plan mock impact exercises that demonstrate poten...
Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Validate blue-team detection of suspicio...
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Plan mock impact exercises that demonstrate poten...
Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Validate blue-team detection of suspicio...
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Simulate staging of data within an isolated...
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Need to simulate ransomware-style impact
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Simulate staging of data within an isolated...
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry. Step 4: Validate blue-team detection of suspicio...
Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Limited egress bandwidth environment
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 4: Simulate staging of data within an isolated...
Large sensitive dataset present on fileshare: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large sensitive dataset present on fileshare
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions. Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns. Step 4: Simulate staging of data within an isolated...
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD tenant with conditional access
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
Azure AD tenant with conditional access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Azure AD tenant with conditional access
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD tenant with conditional access
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD tenant with conditional access
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Azure AD tenant with conditional access
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Validate multi-factor and conditional access coverage for high-risk accounts. Defende...
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
M365 tenant with many apps and OAuth consents
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate multi-factor and conditional access coverage for high-risk accounts. Step 3: Enumerate identity and application configuration in a read-only manner. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Azure AD tenant with conditional access
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate identity and application configuration in a read-only manner. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections. Defende...
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Azure AD Connect server present
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections. Step 3: Validate multi-factor and conditional access coverage for high-risk accounts. Step 4: Enumerate identity and application configuration in a read-only manner. Defende...
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
SCCM site with many distribution points
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls. Defender detection notes: - Unexpe...
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
SCCM admin console reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls. Defender detection notes: - Unexpe...
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
SCCM site with many distribution points
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls. Defender detection notes: - Unexpe...
SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
SCCM admin console reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls. Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Defender detection notes: - Unexpe...
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
SCCM site with many distribution points
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls. Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Defender detection notes: - Unexpe...
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
SCCM admin console reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls. Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Defender detection notes: - Unexpe...
SCCM admin console reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
SCCM admin console reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls. Defender detection notes: - Unexpe...
SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
SCCM admin console reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls. Defender detection notes: - Unexpe...
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
SCCM admin console reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls. Defender detection notes: - Unexpe...
SCCM site with many distribution points: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
SCCM site with many distribution points
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls. Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities. Defender detection notes: - Unexpe...
Enterprise CA present with many templates: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Enterprise CA present with many templates
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate who has enrollment rights and whether those rights are excessive. Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Web enrollment services available
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Step 3: Validate who has enrollment rights and whether those rights are excessive. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Web enrollment services available
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate who has enrollment rights and whether those rights are excessive. Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Web enrollment services available
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Step 3: Validate who has enrollment rights and whether those rights are excessive. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Web enrollment services available
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Step 3: Validate who has enrollment rights and whether those rights are excessive. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Enterprise CA present with many templates: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Enterprise CA present with many templates
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Step 3: Validate who has enrollment rights and whether those rights are excessive. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Enterprise CA present with many templates: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Enterprise CA present with many templates
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate who has enrollment rights and whether those rights are excessive. Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Web enrollment services available
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Step 3: Validate who has enrollment rights and whether those rights are excessive. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Web enrollment services available
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate who has enrollment rights and whether those rights are excessive. Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Enterprise CA present with many templates: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Enterprise CA present with many templates
Step 1: Confirm authorization and scope before proceeding. Step 2: Validate who has enrollment rights and whether those rights are excessive. Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment. Defender detection notes: - Unusual certificate issuance or renewal outside ...
Large-scale LDAP brute force attempts detected in logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Anomalous certificate issuance logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Tune detection rules with labeled data from lab reproductions...
Anomalous certificate issuance logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Tune detection rules with labeled data from lab reproductions...