Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Mandiant-Azure-AD-Investigator Alternatives
Similar projects and alternatives to Mandiant-Azure-AD-Investigator
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
NOTE:
The number of mentions on this list indicates mentions on common posts plus user suggested alternatives.
Hence, a higher number means a better Mandiant-Azure-AD-Investigator alternative or higher similarity.
Mandiant-Azure-AD-Investigator reviews and mentions
Posts with mentions or reviews of Mandiant-Azure-AD-Investigator.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-03-08.
-
IT Pro Tuesday #191 - Zoom Alternative, Security Tools, GCP Monitor & More
Mandiant Azure AD Investigator is a PowerShell module designed to detect "high-fidelity" and "dual-use" artifacts that can indicate UNC2452 and other threat activity. Provides a foundation for analysis and verification that can determine if there is a compromise under way. Our thanks for the suggestion go to PhilipG.
-
FireEye announces technical details of SolarWinds hacker and provides free detection tools
As for mitigation measures, FireEye extensively recommends reviewing all system administrator accounts, especially to see if there are any "accounts that have been configured or added to a specific service principal" and delete them, then search for suspicious application credentials and delete them. The company has also released a free detection tool called "Azure AD Investigator" on GitHub ( https://github.com/fireeye/Mandiant-Azure-AD-Investigator ), which can detect whether the corporate network is affected by SolarWinds Orion's backdoor software invaded.
- Mandiant Azure AD Investigator - A PowerShell module for detecting artifacts that may be indicators of UNC2452 and other threat actor activity
- Mandiant Azure AD Investigator
-
A note from our sponsor - InfluxDB
www.influxdata.com | 15 May 2024
Stats
Basic Mandiant-Azure-AD-Investigator repo stats
4
601
3.1
11 months ago
mandiant/Mandiant-Azure-AD-Investigator is an open source project licensed under Apache License 2.0 which is an OSI approved license.
The primary programming language of Mandiant-Azure-AD-Investigator is PowerShell.
Popular Comparisons
Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com