From 65a4228f00e0ac8e4320d49de7e958ceeb8ced1f Mon Sep 17 00:00:00 2001 From: pe3zx Date: Tue, 18 Dec 2018 10:45:50 +0700 Subject: [PATCH] [Tools][Digital Forensics] Detailed properties in the Office 365 audit log --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 8a8b429..e4faf77 100644 --- a/README.md +++ b/README.md @@ -108,6 +108,7 @@ My curated list of awesome links, resources and tools - [Automating large-scale memory forensics](https://medium.com/@henrikjohansen/automating-large-scale-memory-forensics-fdc302dc3383) - [Carving EVTX](https://rawsec.lu/blog/posts/2017/Jun/23/carving-evtx/) - [Certificate Chain Cloning and Cloned Root Trust Attacks](https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec) +- [Detailed properties in the Office 365 audit log](https://docs.microsoft.com/en-us/office365/securitycompliance/detailed-properties-in-the-office-365-audit-log) - [Detection and recovery of NSA’s covered up tracks](https://blog.fox-it.com/2017/12/08/detection-and-recovery-of-nsas-covered-up-tracks/) - [Detecting DDE in MS Office documents with YARA rules](https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/) - [Forensic Analysis of Systems that have Windows Subsystem for Linux Installed](http://blog.1234n6.com/2017/10/forensic-analysis-of-systems-with.html)