Source of Logs in Azure(P2 :- Tenant/Subscription Logs) : A Comprehensive Guide for Incident Response
A New Era of Global Stability
Source of Logs in Azure(P1 :-Tenant Logs) : A Comprehensive Guide for Incident Response
Azure Compute: Understanding VM Types and Azure Network Security for Incident Response
"Azure Resource Groups and Role-Based Access Control: A Comprehensive Guide for Incident Response and Forensics in the Cloud"
"Step-by-Step Guide to Uncovering Threats with Volatility: A Beginner’s Memory Forensics Walkthrough"
MemProcFS/MemProcFS Analyzer: Comprehensive Analysis Guide
Memory Forensics Using Strings and Bstrings: A Comprehensive Guide
Fileless Malware || LOLBAS || LOLBAS Hunting Using Prefetch, Event Logs, and Sysmon
Leveraging Automation in AWS for Digital Forensics and Incident Response
Optimizing AWS Cloud Incident Response with Flow Logs, Traffic Mirroring, and Automated Forensics
AWS Security Incident Response Guide: A Dive into CloudWatch, GuardDuty, and Amazon Detective
Power of AWS: EC2, AMIs, and Secure Cloud Storage Solutions
AWS: Understanding Accounts, Roles,Secure Access and AWS Instance Metadata Service (IMDS) and the Capital One Breach
Cloud Services: Understanding Data Exfiltration and Investigation Techniques
Microsoft 365 Security: Understanding Built-in Detection Mechanisms and Investigating Log Events
Streamlining Cloud Log Analysis with Free Tools: Microsoft-Extractor-Suite and Microsoft-Analyzer-Suite
Streamlining Office/Microsoft 365 Log Acquisition: Tools, Scripts, and Best Practices
M365 Logging: A Guide for Incident Responders
Microsoft Cloud Services: Focus on Microsoft 365 and Azure