
Episode 97: Current State of M365 Attacks: Enumeration
The Cyber Threat Perspective
00:00
Intro
This chapter delves into the enumeration techniques used in attacks on Microsoft 365, highlighting how attackers identify users and endpoints. It emphasizes the significance of these methods for IT administrators and discusses actionable measures to mitigate associated threats.
Transcript
Play full episode