📘
DFIR
Ctrl
k
Copy
Enterprise Architecture
The Cloud
Azure
Securing Azure
Disable Legacy Authentication:
Legacy authentication: The curious case of BAV2ROPC
Red Canary
Why You Should Block Microsoft Legacy Authentication
softwarekeep.com
Token Tactics:
Token tactics: How to prevent, detect, and respond to cloud token theft | Microsoft Security Blog
Microsoft Security Blog
Addressing data exfiltration: Token theft talk | Microsoft Community Hub
TECHCOMMUNITY.MICROSOFT.COM
Case Studies:
Microsoft Breach — How Can I See This In BloodHound? - SpecterOps
SpecterOps
Midnight Blizzard breach: analysis and best practices | Wiz Blog
wiz.io
Previous
Admin
Next
CA Policies
Last updated
1 year ago
Disable Legacy Authentication:
Token Tactics:
Case Studies: