Attack chain playbooks for endpoint operations¶ Playbooks: Playbook: Endpoint compromise and identity pivot