Recently, I encountered two distinct variants of a payload delivered through Google Drive, both containing a […]
How to Guard Against Token Theft for Microsoft 365 Session hijacking occurs when an attacker steals […]
We've developed a C# Function App designed to balance devices from a main group into various Wave groups. This app can run on a recurring schedule, rebalancing devices as needed when there are changes in the number of devices due to growth or shrinkage.
This improved Sentinel Analytics Rule can be used to detect malicious Inbox Rules used by threat actors to hide invoice fraud activity. I've used the Inbox rule currently available as a template within Sentinel, and modified it to alert on Outlook rules I encountered in the wild.
A checklist to follow for Microsoft 365 accounts that are compromised
How do you ensure each endpoint is properly synced and redirected? What if important data is […]
Microsoft 365 is often considered safe, as it's always up to date and maintained by Microsoft.
Unfortunately, this is not true! Well, at least some parts aren't. There are quite some options and products/features that should be configured to limit risk and exposure.
In this post, I’m outlining the most important security settings and products, everyone should implement.
Use this PowerShell script and Azure logic app to get the Entra ID Group membership of […]
What happens with data that exists only locally on a Device? When users manually create a […]
Follow the steps in this blog to seamlessly rename your Intune devices, appending the primary assigned […]