Cyber security

Microsoft Defender For Endpoint Curated List Of Resources For DFIR – Microsoft Defender For Endpoint Guide

Hey, thank you stopping by! Well, being here means that you are either familiar with the discipline of Digital Forensics and Incident Reponse (DFIR) or you are interested in beginning to explore DFIR tools and techniques.

The common denominator, no matter what your sense is around DFIR, is that you are using Microsoft Defender for Endpoint (MDE) and the wider Microsoft Azure and Microsoft 365 Defender environments.

I hope you will enjoy the following resources which come from my notes and relevant research and testing I have done.

Do you have any other resources that fit here? Drop me a line at any of my mediums here or pull the repo and push your request to review it.

If you find this repo useful, don’t forget to it!

Table Of Contents

  • Mitigate threats using Microsoft Defender for Endpoint
  • Remote collection of Windows Forensic Artifacts using KAPE and MDE
  • @BertJanCyber Incident Response guide
  • THOR-Cloud forensic scanning through MDE
  • HUNTERS Human-Friendly Guide for Incident Response & Threat Hunting
  • Microsoft Defender For Endpoint Live Response Script Sources
  • Ginsu: A tool for repackaging large collections to traverse Windows Defender Live Response

Mitigate Threats Using Microsoft Defender For Endpoint

What better way to begin the resource list other than Microsoft Learn itself? MDE supports a lot of functionalities including artifact collection, containment, live response, advanced hunting and others which help analysts and investigators unfold alerts and incidents.

Remote Collection Of Windows Forensic Artifacts Using KAPE And MDE

KAPE (Kroll Artifact Parser and Extractor) is a powerful DFIR tool by Eric Zimmerman that primarily collects and processes collected files. 

@DFIRanjith and Krzysztof Miodoński have built and published guides on how to deploy KAPE through MDE live response and collect forensic artefacts.

@BertJanCyber Incident Response Guide

Bert-Jan (@BertJanCyber), a fellow community contributor has prepared a detailed and comprehensive guide on how to accommodate Microsoft technologies available including KQL queries and Live Response in order to practice the DFIR discipline.

THOR-Cloud Forensic Scanning Through MDE

THOR-Cloud allows live compromise assessment scans for YARA, Sigma and IOCs on endpoints through MDE. THOR-Cloud Lite comes with a free plan as well.

HUNTERS Human-Friendly Guide For Incident Response And Threat Hunting

HUNTERS, an advanced platform that leverages SIEM to help SOC teams, provides highly technical blogs around Microsoft Security.

They started unfolding a series of blogs about IR and Threat hunting that really go deep into platform, differentiating sources, user’s permissions etc.

Microsoft Defender For Endpoint Live Response Script Sources

Repositories hosting Powershell script samples for “Live Response” that can be leveraged in your Microsoft Defender For Endpoint Environment.

Ginsu A Tool For Repackaging Large Collections To Traverse Windows Defender Live Response

This script uses 7zip (7za.exe) to compress a specified folder and then splits the resulting archive into sections of 3GB or less.

It will work (and was designed for) files larger than 3GB. Windows Defender Live Response currently only supports pulling back files of 3GB or less via the console.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Starship : Revolutionizing Terminal Experiences Across Shells

Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…

1 day ago

Lemmy : A Decentralized Link Aggregator And Forum For The Fediverse

Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…

1 day ago

Massive UX Improvements, Custom Disassemblers, And MSVC Support In ImHex v1.37.0

The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…

1 day ago

Ghauri : A Powerful SQL Injection Detection And Exploitation Tool

Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…

1 day ago

Writing Tools : Revolutionizing The Art Of Writing

Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…

1 day ago

PatchWerk : A Tool For Cleaning NTDLL Syscall Stubs

PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…

2 days ago