Microsoft Intune Monitoring (TryHackMe)
Introduction Microsoft Intune is one of the most widely used Mobile Device Management (MDM) platforms in the enterprise. It is a powerful tool in the hands of IT and security teams, but it can also be

Search for a command to run...
Articles tagged with #soc
Introduction Microsoft Intune is one of the most widely used Mobile Device Management (MDM) platforms in the enterprise. It is a powerful tool in the hands of IT and security teams, but it can also be

Active Directory post-exploitation is where an attacker's real objectives come into focus. After achieving domain compromise, threat actors move into their endgame — whether that's establishing long-t

Introduction SharePoint Online is one of the most targeted M365 services, as it often stores sensitive files and can be used to propagate the attack. This room will explore the most common attack scen

Phishing analysis goes beyond reading email headers manually. In this room, Phishing Emails 2 on TryHackMe, the focus shifts to tooling: automating the extraction of artifacts from suspicious emails a

When people think about Active Directory attacks, they often jump straight to lateral movement and privilege escalation. But before any of that happens, an attacker needs a foothold and in most enterp

Identity is now the primary attack surface in cloud environments. With Entra ID authentication endpoints exposed to the internet by design, attackers don't need to breach a network perimeter they just
