Blueprint: Build the Best in Cyber Defense cover image

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Blueprint: Build the Best in Cyber Defense

00:00

How to Find High Privilege Consent Grants

M d se makes a thing called the office three 65 attack tool kit, which will help attackers create these malicious applications. It's worth trying to sat lighly, hey, where is there a user that has an application that no one else has ever said ok to in this organization before? That's kind of the key to finding those correcd that's correct. And we have some as part of the sacops guide and points to tha instant response play books talked about last time.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app