- Home
- Security Operations
- Threat Hunting
- Detecting the Elusive - Active Directory Threat Hunting
Detecting the Elusive - Active Directory Threat Hunting
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

Detecting the Elusive - Active Directory Threat Hunting
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
Detecting the Elusive - Active Directory Threat Hunting Description
Detecting the Elusive Active Directory Threat Hunting is a comprehensive resource presented by Sean Metcalf (@Pyrotek3) that provides guidance on threat hunting in Active Directory environments. The resource covers various topics including tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity. Additionally, it discusses the importance of logging the correct type of data and correlating Event IDs to anomalous activity. The resource also introduces Microsoft Sysinternals System Monitor (Sysmon) as a tool for monitoring process activity, image loads, and network connections. Furthermore, it highlights interesting Microsoft binaries to monitor for potential security threats. The resource is an in-depth guide for security professionals and researchers to identify and mitigate Active Directory threats.
Detecting the Elusive - Active Directory Threat Hunting FAQ
Common questions about Detecting the Elusive - Active Directory Threat Hunting including features, pricing, alternatives, and user reviews.
Detecting the Elusive - Active Directory Threat Hunting is A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.. It is a Security Operations solution designed to help security teams with Threat Hunting, Sysmon, Audit.
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure