• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Type
      • Investigation
      • Response
    • Use Case
      • Endpoint
      • Enrichment
      • Phishing
    • D3fend Technique Category
      • Credential Eviction
      • File Analysis
      • File Eviction
      • Identifier Analysis
      • Message Analysis
      • Network Isolation
      • Restore Access
      • Restore Object
    • Soar App
      • AD LDAP
      • AWS IAM
      • Azure AD Graph
      • Carbon Black Response
      • Cisco Umbrella
      • CrowdStrike OAuth API
      • Cylance
      • Falcon Host API
      • G Suite for GMail
      • Jira
      • LDAP
      • MS Graph for Office 365
      • Palo Alto Networks Firewall
      • Panorama
      • Phantom
      • PhishTank
      • Reversing Labs
      • SMTP
      • SSH
      • ServiceNow
      • Splunk
      • Splunk Attack Analyzer Connector for Splunk SOAR
      • Threat Grid
      • TruSTAR
      • VirusTotal
      • VirusTotal v3
      • WildFire
      • Windows Defender ATP
      • Windows Remote Management
      • Zscaler
      • urlscan.io

    Restore Access

    Name SOAR App D3FEND Use Case
    AWS IAM Account Unlocking AWS IAM Restore User Account Access  
    Azure AD Account Unlocking Azure AD Graph Restore User Account Access  
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.