Operational procedures for endpoint attacks¶ Runbooks: Runbook: Endpoint initial access Runbook: EDR bypass Runbook: Credential and token harvesting Runbook: Pivot from endpoint to cloud