Advanced Threat Analytics Attack Simulation Playbook

This article will walk through the credential theft attack techniques by using readily available research tools on the Internet. At each point of the attack we will show how Microsoft’s Advanced Threat Analytics (ATA) helps IT organizations gain visibility into these post-infilt

ATA Playbook.pdf
4.4 Star
26,451 times
Add to favorites
E-mail Twitter Digg Facebook
Verified on the following platforms
Windows 10 No
Windows Server 2012 No
Windows Server 2012 R2 Yes
Windows Server 2008 R2 No
Windows Server 2008 No
Windows Server 2003 No
Windows Server 2016 No
Windows 8 No
Windows 7 No
Windows Vista No
Windows XP No
Windows 2000 No
This script is tested on these platforms by the author. It is likely to work on other platforms as well. If you try it and find that it works on another platform, please add a note to the script discussion to let others know.