ATA Attack Simulation playbook

%3CLINGO-SUB%20id%3D%22lingo-sub-46532%22%20slang%3D%22en-US%22%3EATA%20Attack%20Simulation%20playbook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-46532%22%20slang%3D%22en-US%22%3E%3CP%3EATA%20Attack%20Simulation%20playbook%20is%20now%20available%20to%20download%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fataplaybook%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-46532%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdvanced%20Threat%20Analytics%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-48391%22%20slang%3D%22en-US%22%3ERe%3A%20ATA%20Attack%20Simulation%20playbook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-48391%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20Playbook%20indeed%2C%20thanks%20for%20sharing%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F38157%22%20target%3D%22_blank%22%3E%40Ophir%20Polotsky%3C%2FA%3E!%20According%20to%20the%20ATA%20team%20they%60ve%20written%26nbsp%3Bthis%26nbsp%3Bplaybook%20so%20it%20contains%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EA%20step-by-step%20guide%20to%20simulating%20different%20techniques%20used%20in%20real-world%20advanced%20attack%20scenarios.%3C%2FLI%3E%0A%3CLI%3EWalk-through%20of%20a%20full%20attack%20campaign%20%E2%80%93%20From%20initial%20reconnaissance%20all%20the%20way%20to%20Domain%20Dominance.%3C%2FLI%3E%0A%3CLI%3EWalk-through%20of%20ATA%E2%80%99s%20detection%20of%20suspicious%20activities.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EMore%20info%20on%26nbsp%3B%20Microsoft%20Advanced%20Threat%20Analytics%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fenterprisemobility%2F2017%2F02%2F23%2Fadvanced-threat-analytics-attack-simulation-playbook%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CFONT%20color%3D%22%230066cc%22%3Eblog%3C%2FFONT%3E%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-47024%22%20slang%3D%22en-US%22%3ERe%3A%20ATA%20Attack%20Simulation%20playbook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-47024%22%20slang%3D%22en-US%22%3EThanks%20for%20share!%20%3A)%3C%2Fimg%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-46615%22%20slang%3D%22en-US%22%3ERe%3A%20ATA%20Attack%20Simulation%20playbook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-46615%22%20slang%3D%22en-US%22%3EThanks%20for%20sharing!%3C%2FLINGO-BODY%3E
Microsoft

ATA Attack Simulation playbook is now available to download here.

 

 

3 Replies
Highlighted
Thanks for sharing!
Highlighted
Thanks for share! :)
Highlighted

Great Playbook indeed, thanks for sharing @Ophir Polotsky! According to the ATA team they`ve written this playbook so it contains:

 

  1. A step-by-step guide to simulating different techniques used in real-world advanced attack scenarios.
  2. Walk-through of a full attack campaign – From initial reconnaissance all the way to Domain Dominance.
  3. Walk-through of ATA’s detection of suspicious activities.

More info on  Microsoft Advanced Threat Analytics blog