instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
EDR product blocking common tooling: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Validate blue-team detection of suspicio... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Plan mock impact exercises that demonstrate poten... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Validate blue-team detection of suspicio... |
Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD tenant with conditional access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM site with many distribution points: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
Enterprise CA present with many templates: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Enterprise CA present with many templates | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate who has enrollment rights and whether those rights are excessive.
Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Web enrollment services available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Step 3: Validate who has enrollment rights and whether those rights are excessive.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Web enrollment services available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate who has enrollment rights and whether those rights are excessive.
Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Web enrollment services available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Step 3: Validate who has enrollment rights and whether those rights are excessive.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Web enrollment services available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Step 3: Validate who has enrollment rights and whether those rights are excessive.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Enterprise CA present with many templates: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Enterprise CA present with many templates | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Step 3: Validate who has enrollment rights and whether those rights are excessive.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Enterprise CA present with many templates: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Enterprise CA present with many templates | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate who has enrollment rights and whether those rights are excessive.
Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Web enrollment services available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Step 3: Validate who has enrollment rights and whether those rights are excessive.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Web enrollment services available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate who has enrollment rights and whether those rights are excessive.
Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Enterprise CA present with many templates: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Enterprise CA present with many templates | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate who has enrollment rights and whether those rights are excessive.
Step 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.
Defender detection notes:
- Unusual certificate issuance or renewal outside ... |
Large-scale LDAP brute force attempts detected in logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Anomalous certificate issuance logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Anomalous certificate issuance logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.