Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments. It gathers additional telemetry from Microsoft Defender for Endpoint (MDE) and Defender for Internet of Things (D4IoT). This tool assists incident response teams by exporting cloud artifacts after an incident for environments that aren't ingesting logs into a Security Information and Events Management (SIEM) or other long term solution for logs.
Common questions about Untitled Goose Tool including features, pricing, alternatives, and user reviews.
Untitled Goose Tool is A robust and flexible hunt and incident response tool for investigating AzureAD, Azure, and M365 environments. It is a Security Operations solution designed to help security teams with Azure, Microsoft 365.
Untitled Goose Tool is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/cisagov/untitledgoosetool/ for download and installation instructions.
Popular alternatives to Untitled Goose Tool include:
Compare all Untitled Goose Tool alternatives at https://cybersectools.com/alternatives/untitled-goose-tool
Untitled Goose Tool is for security teams and organizations that need Azure, Microsoft 365. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
Decrypts S/MIME & OpenPGP emails from PST/OST/EDB for forensic analysis.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
A forensics toolkit for collecting digital evidence from Google Cloud Platform, Microsoft Azure, and Amazon Web Services during incident response investigations.
A portable Rust-based tool for acquiring volatile memory from Linux systems without requiring prior knowledge of the target OS distribution or kernel.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.