Blueprint: Build the Best in Cyber Defense cover image

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Blueprint: Build the Best in Cyber Defense

00:00

The Connitial Access One Is Really Important

Oar aware is kind of the central engine where you can say, in order this user or group gets access to these resources, and they have to meet certain conditions. The second one was one that chrisa actually missed, and she actually worked on, i at thelonga, which is the identityof protection stuff. I think it might worth a going at least a little bit further on ap consent grant attacks. If you're not from tere with open id, cannact and o of im, it's a little confusing at first, but went you cand of understand the whole dance and the flows and how those tokens work.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app