cloudimized
Google Cloud Platform (GCP) configuration scanning tool (by egnyte)
cloudimized | Mandiant-Azure-AD-Investigator | |
---|---|---|
2 | 4 | |
17 | 601 | |
- | 1.5% | |
5.6 | 3.1 | |
3 months ago | 11 months ago | |
Python | PowerShell | |
MIT License | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cloudimized
Posts with mentions or reviews of cloudimized.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-03-08.
-
IT Pro Tuesday #191 - Zoom Alternative, Security Tools, GCP Monitor & More
Cloudimized is a Google Cloud Platform (GCP) configuration scanning tool that allows you to monitor changes to selected resources. Essentially a cloud version of Oxidized, it executes periodic scans of GCP resources via API calls and dumps them into yaml files, so you can track information on every configuration change. Author FINpacket explains, "As [our] company started using GCP, we as a Network team needed to have visibility on changes that happen on network-related configurations.”
-
Cloudimized - Oxidized for Google Cloud Platform
Cloudimized on GitHub
Mandiant-Azure-AD-Investigator
Posts with mentions or reviews of Mandiant-Azure-AD-Investigator.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-03-08.
-
IT Pro Tuesday #191 - Zoom Alternative, Security Tools, GCP Monitor & More
Mandiant Azure AD Investigator is a PowerShell module designed to detect "high-fidelity" and "dual-use" artifacts that can indicate UNC2452 and other threat activity. Provides a foundation for analysis and verification that can determine if there is a compromise under way. Our thanks for the suggestion go to PhilipG.
-
FireEye announces technical details of SolarWinds hacker and provides free detection tools
As for mitigation measures, FireEye extensively recommends reviewing all system administrator accounts, especially to see if there are any "accounts that have been configured or added to a specific service principal" and delete them, then search for suspicious application credentials and delete them. The company has also released a free detection tool called "Azure AD Investigator" on GitHub ( https://github.com/fireeye/Mandiant-Azure-AD-Investigator ), which can detect whether the corporate network is affected by SolarWinds Orion's backdoor software invaded.
- Mandiant Azure AD Investigator - A PowerShell module for detecting artifacts that may be indicators of UNC2452 and other threat actor activity
- Mandiant Azure AD Investigator
What are some alternatives?
When comparing cloudimized and Mandiant-Azure-AD-Investigator you can also consider the following projects:
iris3 - An upgraded and improved version of the Iris automatic GCP-labeling project
tpu-starter - Everything you want to know about Google Cloud TPU