Skip to content
View NassimIOS's full-sized avatar

Block or report NassimIOS

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
NassimIOS/README.md

My plaground repo

Implementation of Web-Based Microsoft 365 Apps via Intune: Configured and deployed web-based versions of Microsoft 365 applications using Microsoft Intune, resulting in a cost-effective solution by reducing licensing expenses and simplifying application management. This project involved creating policies within Intune, configuring the forced installation of web apps, and utilizing JSON configurations to facilitate direct access to essential Microsoft 365 applications. This approach provided efficient and secure access to productivity tools without the need for local software installations. Platforms and Technologies Used: Microsoft Intune, Microsoft Edge, JSON

OpenVPN Server and Client Deployment: Configured and deployed OpenVPN on Kali Linux, creating a secure VPN environment. This project involved certificate generation, server and client configuration, and network routing, demonstrating practical skills in secure network communication. Platforms and Technology Used: Kali Linux, OpenVPN, EasyRSA.

Threat Detection and Response Framework Developed a home lab using Security Onion IDS and Elastic Cloud SIEM to monitor network traffic and create custom detection rules. Platforms and Technology Used: Splunk, Microsoft Sentinel, Wireshark, Tanium, Azure VMs, KQL

MS Sentinel Setup and Device Log Ingestion Configured Microsoft Sentinel in Azure, integrating device logs from multiple sources for centralized monitoring and alerting. Platforms and Technology Used: Microsoft Sentinel, Azure, KQL

Threat Intelligence and Hunting with Microsoft Sentinel Set up an AWS account, configured EC2, S3, IAM, and SNS services, and executed controlled attacker commands (e.g., GetAuthorizationDetails, ListUsers) to analyze CloudTrail logs. Performed threat hunting in Microsoft Sentinel using gathered intelligence, emphasizing ethical testing in a sandbox environment. Platforms and Technology Used: AWS (EC2, S3, IAM, SNS, CloudTrail), Microsoft Sentinel, KQL

Popular repositories Loading

  1. NassimIOS NassimIOS Public

    Config files for my GitHub profile.

  2. On-Prem On-Prem Public

    On-Prem tweaks