bars
📘
DFIR
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
Enterprise Architecture
chevron-right
The Cloud
chevron-right
Azure
Securing Azure
hashtag
Disable Legacy Authentication:
Legacy authentication: The curious case of BAV2ROPC
Red Canary
chevron-right
Why You Should Block Microsoft Legacy Authentication
softwarekeep.com
chevron-right
hashtag
Token Tactics:
Token tactics: How to prevent, detect, and respond to cloud token theft | Microsoft Security Blog
Microsoft Security Blog
chevron-right
Addressing data exfiltration: Token theft talk | Microsoft Community Hub
TECHCOMMUNITY.MICROSOFT.COM
chevron-right
hashtag
Case Studies:
Microsoft Breach — How Can I See This In BloodHound? - SpecterOps
SpecterOps
chevron-right
Midnight Blizzard breach: analysis and best practices | Wiz Blog
wiz.io
chevron-right
Previous
Admin
chevron-left
Next
CA Policies
chevron-right
Last updated
1 year ago
Disable Legacy Authentication:
Token Tactics:
Case Studies: