Tools

Useful cybersecurity tools for quick reference

Guide to CIS Controls v8.1 Implementation Groups #nLM

https://notebooklm.google.com/notebook/4088dace-7f69-4b57-af88-df1ad2952754

Try an Interactive CIS guide #nLM!

The provided texts offer comprehensive guidance on reasonable cybersecurity practices, primarily focusing on the Center for Internet Security (CIS) Controls and their application, especially within Microsoft 365 environments. The first source, a guide on reasonable cybersecurity, explains how the CIS Controls provide specific, actionable measures to help organizations meet legal and regulatory standards, reduce data breach litigation, and define what constitutes minimally adequate information security. It highlights the fragmented nature of current cybersecurity laws and positions CIS Controls as an emerging de-facto standard. The other two sources, dedicated to CIS Controls v8.1 and a CIS Microsoft 365 Foundations Benchmark, then provide detailed technical configurations and recommendations across various Microsoft 365 services (such as Admin Center, Defender, Purview, Intune, Entra, Exchange, SharePoint, Teams, and Fabric) to harden system security. These benchmarks outline audit and remediation procedures for specific settings, referencing their alignment with the broader CIS Controls to ensure robust cyber hygiene and protection against common cyberattacks.

Enterprise Application ID reference

Check those apps!

IR Tools - M365 extractor

Get those logs!

Security Alerts Index

NIST CSF 2.0 Reference Tool

Teriffic Product

Connectwise Security

Company specific security info for large vendors is good to track in your industry.

CISA Known Exploited Vulnerability Search

If you find it here, patch it Yesterday!

Draw.io

Great for data flow, network diagram creation. Local file storage support.
Use in risk analysis, register work
Use in risk analysis, register work

Threat Intelligence Platform

Investigative IP/domain lookup tool

IPStack

Source IPv4/v6 threat intelligence

DNS Dumpster

Investigative tool

CyberChef - GCHQ Cyber Swiss Army Knife

Excellent regex helper - courtesy of British Intelligence!

M356maps

Great visualization of what products are included across various Microsoft product levels

CIS Top 18 controls

Don't have any best practices? Start with some of the Top recommendations from the Center for Internet Security.

Last updated