instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Assess which telemetry sources a... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Assess which telemetry sources a... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Assess which telemetry sources a... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
EDR product blocking common tooling: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Validate blue-team detection of suspicio... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Plan mock impact exercises that demonstrate poten... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Plan mock impact exercises that demonstrate poten... |
Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Validate blue-team detection of suspicio... |
Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Need to simulate ransomware-style impact | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.
Step 4: Validate blue-team detection of suspicio... |
Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Limited egress bandwidth environment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 4: Simulate staging of data within an isolated... |
Large sensitive dataset present on fileshare: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large sensitive dataset present on fileshare | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.
Step 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.
Step 4: Simulate staging of data within an isolated... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD tenant with conditional access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Validate multi-factor and conditional access coverage for high-risk accounts.
Defende... |
M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | M365 tenant with many apps and OAuth consents | Step 1: Confirm authorization and scope before proceeding.
Step 2: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 3: Enumerate identity and application configuration in a read-only manner.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Azure AD tenant with conditional access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate identity and application configuration in a read-only manner.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Defende... |
Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Azure AD Connect server present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.
Step 3: Validate multi-factor and conditional access coverage for high-risk accounts.
Step 4: Enumerate identity and application configuration in a read-only manner.
Defende... |
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | SCCM admin console reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Step 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Defender detection notes:
- Unexpe... |
SCCM site with many distribution points: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | SCCM site with many distribution points | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.
Step 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.
Defender detection notes:
- Unexpe... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.