office365
hawk
office365 | hawk | |
---|---|---|
4 | 14 | |
9 | 652 | |
- | - | |
0.0 | 3.9 | |
about 2 years ago | 4 months ago | |
PowerShell | PowerShell | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
office365
-
Microsoft's rich notifications for Windows 10 and 11 present new, native-looking browser popups to more readily fool users into getting phished or downloading malware
r/sysadmin thread on disabling desktop notifications for Chrome via GPO (bonus: PowerShell script to do this
-
Get-Partner and Do something...
I am currently working on my 365 script and trying to make it more user friendly and do some more if checks before running commands (FYI this is a revision behind, found an error after uploading to my public git).
-
DKIM
Hey mate; Looks like you might have this sorted but I have two scripts that punch out the formatting for the DKIM records https://github.com/argetlam59/office365 You should be able to copy them out of the console into your DNS hosting and move from there.
-
Does anyone have a cheat sheet for hardening up spam and phishing policies in o365?
Script I use for all 365. it is a version behind at the moment as it is a pain to keep a public version of this for other people. https://github.com/argetlam59/office365/blob/main/365-Security-Basics.ps1
hawk
- Hawk Repo
-
Message Trace O365
I recommend checking this out btw https://github.com/T0pCyber/hawk
-
Office 365 Outlook rules automatically generating
run HAWK against the mailbox and it should surface something useful.
- Useful Email Compromise resource
- Compromised Email HOW?
-
Crazy Email Hacking
Use https://github.com/T0pCyber/hawk on the mailbox, it will show you everything you need to know. it knows what to look for, and produces a report on all the suss activities. Ive learnt best from letting it do its job then seeing what it found.
-
What do you use for your office 365 security routines and what routines do you perform?
HAWK is a great tool to investigate for suspicious activity. Its no silver bullet, but it does even dump a list of suspect accounts when you run the Tenant Investigation command. Probably with a little bit of work you could script HAWK to run automatically in bulk.
- User got phished. I asked her to think back and try to remember if she'd got an attachment that required login.
- Track down how account was compromised.
-
Office 365 audit log for compromised account
Have you ran the Powershell HAWK Tool ? https://github.com/T0pCyber/hawk
What are some alternatives?
EWS-Office365-Contact-Sync - Uses Exchange Web Services to synchronize a Global Address List in Office 365 to a user's mailbox
Business-Email-Compromise-Guide - The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
O365Essentials - A module that helps to manage some tasks on Office 365/Azure via undocumented API
PowerShell - PowerShell functions and scripts (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...)
orca - The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA)
o365recon - retrieve information via O365 and AzureAD with a valid cred
twitter-crystal - A library to access the Twitter API using Crystal
monkey365 - Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews.
aws-credentials - Get AWS credentials in various ways.
CrpUsernameStuffing - PS Script to stuff usernames into NPS Connection Request Policies
Microsoft365DSC - Manages, configures, extracts and monitors Microsoft 365 tenant configurations
Export-RecipientPermissions - Document, filter and compare Exchange permissions: Mailbox access rights, mailbox folder permissions, public folder permissions, send as, send on behalf, managed by, moderated by, linked master accounts, forwarders, sender restrictions, resource delegates, group members, management role group members