<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[A post about identifying key areas of Configuration Manager (SCCM) infrastructure that defenders can implement for deception solutions]]></title><description><![CDATA[<p>A post about identifying key areas of Configuration Manager (SCCM) infrastructure that defenders can implement for deception solutions</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://specterops.io/blog/2026/02/19/mapping-deception-solutions-with-bloodhound-opengraph-configuration-manager/" title="Mapping Deception Solutions With BloodHound OpenGraph  - Configuration Manager - SpecterOps">
<img src="https://specterops.io/wp-content/uploads/sites/3/2026/02/Screenshot-2026-02-09-at-11.46.45-AM-2.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://specterops.io/blog/2026/02/19/mapping-deception-solutions-with-bloodhound-opengraph-configuration-manager/">
Mapping Deception Solutions With BloodHound OpenGraph  - Configuration Manager - SpecterOps
</a>
</h5>
<p class="card-text line-clamp-3">Deception and canary development implemented in SCCM can be used to alert upon cyber attacks and intrusions. This blog provides step by step guidance to implement deception solutions and use BloodHound OpenGraph for planning.</p>
</div>
<a href="https://specterops.io/blog/2026/02/19/mapping-deception-solutions-with-bloodhound-opengraph-configuration-manager/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://specterops.io/wp-content/uploads/sites/3/2022/03/favicon-light.png?w=29" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />







<p class="d-inline-block text-truncate mb-0">SpecterOps <span class="text-secondary">(specterops.io)</span></p>
</a>
</div></p><p><a href="https://infosec.exchange/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/redteam" rel="tag">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" rel="tag">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/windows" rel="tag">#<span>windows</span></a> <a href="https://infosec.exchange/tags/dfir" rel="tag">#<span>dfir</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/92a5f80c-6f22-4e02-a51e-62e2584af278/a-post-about-identifying-key-areas-of-configuration-manager-sccm-infrastructure-that-defenders-can-implement-for-deception-solutions</link><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 16:25:41 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/92a5f80c-6f22-4e02-a51e-62e2584af278.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 01 Apr 2026 10:38:57 GMT</pubDate><ttl>60</ttl></channel></rss>