An AWS data champion!
| https://twitter.com/disintegr8te/ | |
| Github | https://github.com/disintegr8te |
| [email protected] | |
| Twittodon | https://twittodon.com/share.php?t=disintegr8te&[email protected] |

| https://twitter.com/disintegr8te/ | |
| Github | https://github.com/disintegr8te |
| [email protected] | |
| Twittodon | https://twittodon.com/share.php?t=disintegr8te&[email protected] |
An AWS data champion!
I just wrote a post about the current state of growth in infosec.exchange at the one month mark post E-day here: https://blog.infosec.exchange/2022/11/27/an-update-on-growth-of-infosec-exchange/
Note: I installed a plugin that will allow you to follow blog posts there by following @[email protected]
I have made a command-line tool that can import Mastodon lists into a different instance. Hopefully this will be added into the actual app, but it was faster to make an external tool. If you are interested in using this and would like a web UI, please let me know.
https://github.com/fadookie/masto-list-importer
EDIT: The web UI has been released at https://www.eliotlash.com/masto-list-importer/
#MastoDev #MastoMeta #MastoMigration #MastodonMigration #CommandLine #OpenSource
Just found this nice list of useful event IDs for #AD monitoring:
https://github.com/TonyPhipps/SIEM/blob/master/Notable-Event-IDs.md
My next step is to figure out how to bring that list with low effort to a data collection rule for #Sentinel integration with the Azure Monitoring Agent.
Do you have good sources / lists with Event IDs for AD monitoring or are you ingesting just everything?