Simple methodology to monitor Active Directory risk scores and receive notifications via webhook.
You can find a walkthrough for this small project here: https://www.tommacdonald.co.uk/continuous-active-directory-monitoring-via-pingcastle/
- Read Blogpost
- Clone Repo
- Place files in C:\Scripts
- Create any Webhook URls required (Slack / Teams)
- Create Scheduled Task to run PingCastle, and one to upload your HTML reports to OpenAI or your LLM of choice.
- Create OpenAI Assistant within OpenAI Platform
- Generate Threaed ID
- Go!