๐Ÿ”’ Blocking Device Code Flow in M365, full mini-toolkit now on GitHub:

1๏ธโƒฃ Audit script => verify zero legitimate usage before blocking (all 4 Entra sign-in log types)
2๏ธโƒฃ CA policy JSON => ready to import, just replace your break-glass group ID

๐Ÿ”— https://github.com/Bluewal/m365-intune-scripts/tree/main/entra/device-code-flow

#infosec #Microsoft365 #EntraID #ConditionalAccess #BlueTeam #PowerShell

m365-intune-scripts/entra/device-code-flow at main ยท Bluewal/m365-intune-scripts

PowerShell scripts, Intune configurations and security hardening resources for Microsoft 365 environments - Bluewal/m365-intune-scripts

GitHub

๐Ÿšจ EvilTokens / AiTM attacks are actively abusing Device Code Flow to bypass MFA in M365 tenants.

Before blocking it via Conditional Access โ€” verify it's actually unused in your environment.

Script queries all 4 Entra sign-in log types via Microsoft Graph:
โœ… No results โ†’ safe to block immediately
โš ๏ธ Results found โ†’ review before deploying

๐Ÿ”— https://github.com/Bluewal/m365-intune-scripts/blob/main/entra/device-code-flow/Invoke-DeviceCodeFlowAudit.ps1

#infosec #Microsoft365 #EntraID #ConditionalAccess #BlueTeam #PowerShell

m365-intune-scripts/entra/device-code-flow/Invoke-DeviceCodeFlowAudit.ps1 at main ยท Bluewal/m365-intune-scripts

PowerShell scripts, Intune configurations and security hardening resources for Microsoft 365 environments - Bluewal/m365-intune-scripts

GitHub

Identity attacks rise; use conditional access, behavioral analytics. Infosec K2K boosts security with adaptive controls, real-time detection.

#CyberSecurity #IdentitySecurity #ConditionalAccess #BehavioralAnalytics #ZeroTrust #IAM #CyberResilience #InfosecK2K

๐Ÿšจ Entra ID External MFA (old name was External Authentication Methods) is now Generally Available.

Custom Controls is being deprecated on 30 Sept 2026.

Here's how to check your usage.

https://thedxt.ca/2026/03/microsoft-entra-id-external-mfa/

#Entra #MFA #M365 #Microsoft #Microsoft365 #ConditionalAccess

Microsoft Entra ID External MFA

Microsoft recently announced that External Authentication Methods has been renamed to External MFA and is Generally Available. Microsoft also announced that Custom Controls is being deprecated, with its deprecation currently planned for September 30th, 2026. Microsoft Entra ID External MFA (formerly External Authentication Methods) replaces Custom Controls. Here is a brief timeline of Custom... Read More Read More

theDXT

๐‡๐จ๐ฐ ๐‚๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐š๐ฅ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐€๐ซ๐ž ๐„๐ฏ๐š๐ฅ๐ฎ๐š๐ญ๐ž๐ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ

Understanding how Conditional Access policies are evaluated in Microsoft Entra ID is absolutely essential if you are involved in their creation or management.

I often encounter fundamental misunderstandings regarding how the evaluation of Conditional Access policies takes place. Many administrators are accustomed to systems like firewalls, where there is an order or priority for evaluating created rules. However, it does not work this way with Conditional Access policies in Microsoft Entra ID. Applying the same principle to Conditional Access policies will very likely lead to significant security risks.

Read my blog post bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://www.cswrld.com/2026/02/how-conditional-access-policies-are-evaluated-in-microsoft-entra-id/

#cswrld #entraid #securitytips #conditionalaccess

Microsoft is rolling out two Entra ID changes this spring that take effect automatically.

Passkey profiles move to GA in March. Tenants that do not opt in will be auto-migrated starting in April (through late May for Worldwide, late June for GCC/GCC High/DoD). If attestation is disabled, synced passkeys become allowed by default, meaning credentials can sync via iCloud Keychain and Google Password Manager without an explicit decision to allow synced passkeys.

Conditional Access is closing an enforcement gap starting March 27. Policies targeting "All resources" with resource exclusions will now enforce on sign-ins where apps request only OIDC or limited directory scopes. These flows were previously not being evaluated..

I published a breakdown covering:

โ€ข Auto-migration logic and default configuration behavior
โ€ข PowerShell scripts to audit your tenant
โ€ข A three-profile passkey architecture for role-based separation
โ€ข How to identify affected Conditional Access policies
โ€ข Key gotchas (silent campaign shifts, retroactive AAGUID removal, destructive preview opt-out)

The post includes links to MC1221452, the Microsoft Tech Community announcement, and the relevant Microsoft Learn documentation.

https://nineliveszerotrust.com/blog/entra-march-2026-passkeys-ca/

#EntraID #Identity #ZeroTrust #Passkeys #ConditionalAccess #CloudSecurity #MFA

@_dirkjan and my joint talk at #TROOPERS25 is now available on YouTube.

"Finding Entra ID CA Bypasses - the structured way" @WEareTROOPERS

https://youtu.be/yYQBeDFEkps

#Entra #ConditionalAccess

TROOPERS25: Finding Entra ID CA Bypasses - The Structured Way

YouTube
Last week #Microsoft published #MC1123830 where they announced #Entra #ConditionalAccess updates indicating that #AzureDevOps (ADO) will be separated from Azure Resource Manager (ARM). This means that you might have to update your policies in order to allow access to #ADO.

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜‚๐—ป๐—ธ๐—ป๐—ผ๐˜„๐—ป ๐—ฝ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

Under conditional access policies, it is possible to block individual device platforms. In general, it is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.

This also applies to device platforms within Microsoft Entra ID. For example, if your organization only uses Windows, iOS, and Android, it's a good idea to disable all other platforms. If you also use macOS, you need to add macOS as well, of course.

What I would definitely recommend blocking is Windows Phone and other unknown platforms. Unrecognized / unknown platforms are usually spoofed User Agents, which is mainly used by threat actors.

๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/vFhQgwXmqTo

#cswrld #videotutorial #entraid #conditionalaccess #platforms #blocking