{"id":282,"date":"2019-01-31T09:48:13","date_gmt":"2019-01-31T09:48:13","guid":{"rendered":"http:\/\/www.johntimney.com\/?p=282"},"modified":"2019-01-31T09:48:15","modified_gmt":"2019-01-31T09:48:15","slug":"pen-testing-microsoft-services","status":"publish","type":"post","link":"https:\/\/www.johntimney.com\/?p=282","title":{"rendered":"Pen Testing Microsoft Services"},"content":{"rendered":"\n<p>Two critical links to get you started in understanding the penetration testing opportunity for Microsoft services.<\/p>\n\n\n\n<p>The first describes the unified rules (\u201cRules of Engagement\u201d) for  customers wishing to perform penetration tests against their Microsoft  Cloud (defined below) components. What you can do, and how to start.<\/p>\n\n\n\n<p> https:\/\/www.microsoft.com\/en-us\/msrc\/pentest-rules-of-engagement?fbclid=IwAR3P33Gf76GAhD6cdGsJjZHptLvdLIybAVak-INkPZFXPdY6J2NSb2cm4Zs <\/p>\n\n\n\n<p>The second link is part of Office 365 Threat Intelligence services and describes the Attack Simulator which can be used to run realistic attack scenarios in your  organization. This can help you identify and find vulnerable users  before a real attack impacts your bottom line. <\/p>\n\n\n\n<p> https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/attack-simulator?fbclid=IwAR3l8A-M8pWNnKvu-OmQhiUC8K_3VIJ5HOUUuhlGP4bxpmzgMXbfwkwi3<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two critical links to get you started in understanding the penetration testing opportunity for Microsoft services. The first describes the unified rules (\u201cRules of Engagement\u201d) for customers wishing to perform penetration tests against their Microsoft Cloud (defined below) components. What you can do, and how to start. https:\/\/www.microsoft.com\/en-us\/msrc\/pentest-rules-of-engagement?fbclid=IwAR3P33Gf76GAhD6cdGsJjZHptLvdLIybAVak-INkPZFXPdY6J2NSb2cm4Zs The second link is part of Office [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[6,7,8],"_links":{"self":[{"href":"https:\/\/www.johntimney.com\/index.php?rest_route=\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/www.johntimney.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.johntimney.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.johntimney.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.johntimney.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=282"}],"version-history":[{"count":1,"href":"https:\/\/www.johntimney.com\/index.php?rest_route=\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":283,"href":"https:\/\/www.johntimney.com\/index.php?rest_route=\/wp\/v2\/posts\/282\/revisions\/283"}],"wp:attachment":[{"href":"https:\/\/www.johntimney.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.johntimney.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.johntimney.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}