Authenticated Recon
Automation
o365Recon
Automate all of the below commands with o365Recon.

AzureBloodHound
Visualize recon.

Custom queries for Azure are helpful.
AADInternals
Subscriptions

SharePoint

Service Principals


Conditional Access Policies

Conditional Access Policies are stored and displayed as JSON.

MFASweep/Conditional Access Policies
Uses APIs to see if a user can authenticate or is blocked by Access Policies.

Unified Audit Log Settings
Important to know what traces your leaving behind for defense evasion.

Enumerate Users
Obtaining detailed information on a user can help identify their location for Conditional Access Policy bypasses.


Enumerating Administrators


Enumerating Sync Account

Detect
API calls are not logged within Azure, so AADInternals will not detected.
Azure Sign-Ins are logged but difficult to baseline.


Application header can be forged, so it is unreliable to baseline.
Below is a list of Application IDs and their name used for sign-ins.
Last updated