https://github.com/LETHAL-FORENSICS/Microsoft-Analyzer-Suite
A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID
https://github.com/LETHAL-FORENSICS/Microsoft-Analyzer-Suite
azure-active-directory incident-response microsoft-365 microsoft-entra microsoft-graph powershell
Last synced: 2 months ago
JSON representation
A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID
- Host: GitHub
- URL: https://github.com/LETHAL-FORENSICS/Microsoft-Analyzer-Suite
- Owner: LETHAL-FORENSICS
- License: gpl-3.0
- Created: 2024-02-21T08:18:35.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2025-03-25T06:11:51.000Z (3 months ago)
- Last Synced: 2025-04-10T05:42:27.485Z (2 months ago)
- Topics: azure-active-directory, incident-response, microsoft-365, microsoft-entra, microsoft-graph, powershell
- Language: PowerShell
- Homepage: https://lethal-forensics.com
- Size: 16.3 MB
- Stars: 453
- Watchers: 17
- Forks: 51
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
- awesome-lists - \[O365\
README
# Microsoft-Analyzer-Suite (Community Edition)
A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID.## TL;DR
Automated Processing of Microsoft 365 Logs and Microsoft Entra ID Logs extracted by [Microsoft-Extractor-Suite](https://github.com/invictus-ir/Microsoft-Extractor-Suite).## The following Microsoft data sources are supported yet:
> Output Files of Microsoft-Extractor-Suite v1.3.5 by Invictus-IR
* [Get-ADSignInLogsGraph](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/AzureSignInLogsGraph.html) → [ADSignInLogsGraph-Analyzer v0.1](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/ADSignInLogsGraph%E2%80%90Analyzer)
* [Get-MFA](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/GetUserInfo.html#retrieves-mfa-status) → [MFA-Analyzer v0.2](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/MFA%E2%80%90Analyzer)
* [Get-OAuthPermissions](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/OAuthPermissions.html) → [OAuthPermissions-Analyzer v0.2](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/OAuthPermissions%E2%80%90Analyzer)
* [Get-RiskyDetections](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/GetUserInfo.html#retrieves-the-risky-detections) → [RiskyDetections-Analyzer v0.2](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/RiskyDetections%E2%80%90Analyzer)
* [Get-RiskyUsers](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/GetUserInfo.html#retrieves-the-risky-users) → [RiskyUsers-Analyzer v0.2](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/RiskyUsers%E2%80%90Analyzer)
* [Get-UALAll](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/UnifiedAuditLog.html) → [UAL-Analyzer v0.3](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/UAL%E2%80%90Analyzer)
* [Get-Users](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/GetUserInfo.html) → [Users-Analyzer v0.1](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/Users%E2%80%90Analyzer)
* [Get-TransportRules](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/functionality/TransportRules.html) → [TransportRules-Analyzer v0.1](https://github.com/evild3ad/Microsoft-Analyzer-Suite/wiki/TransportRules%E2%80%90Analyzer)

**Fig 1:** RiskyDetections-Analyzer
**Fig 2:** Risky Detections (1)
**Fig 3:** Risky Detections (2)
**Fig 4:** Risky Detections (Line Chart)
**Fig 5:** MITRE ATT&CK Techniques (Stats)
**Fig 6:** RiskEventType (Stats)
**Fig 7:** RiskLevel (Stats)
**Fig 8:** Source (Stats)
**Fig 9:** RiskyUsers-Analyzer
**Fig 10:** Risky Users
**Fig 11:** You can specify a file path or launch the File Browser Dialog to select your log file## Links
[Microsoft-Extractor-Suite by Invictus-IR](https://github.com/invictus-ir/Microsoft-Extractor-Suite)
[Microsoft-Extractor-Suite Documentation](https://microsoft-365-extractor-suite.readthedocs.io/en/latest/)
[Microsoft 365 Artifact Reference Guide by the Microsoft Incident Response Team](https://go.microsoft.com/fwlink/?linkid=2257423)
[Awesome BEC - Repository of attack and defensive information for Business Email Compromise investigations](https://github.com/randomaccess3/Awesome-BEC)
[M365_Oauth_Apps - Repository of suspicious Enterprise Applications (BEC)](https://github.com/randomaccess3/detections/blob/main/M365_Oauth_Apps/MaliciousOauthAppDetections.json)