Know what your #enemy does:
https://microsoft.github.io/Azure-Threat-Research-Matrix/
#Microsoft #M365 #Threat-Matrix shows how attackers work from Initial Access to Persistence.
Administrative-tier-model to impede privilege escalation attacks in 2024:
Find out what‘s happening in your tenant using the #Microsoft Unified Audit Log to identify malicious activities:
Great to read: #Microsoft IR Team on Common Attacks against identities and recommendations to impede them.
In real-world customer engagements, Microsoft Incident Response (Microsoft IR) sees combinations of issues and misconfigurations that could lead to attacker access to customers’ Microsoft Entra ID tenants. Effective protection of a customer’s Entra ID tenant is less challenging than protecting an Active Directory deployment but does require governance and monitoring. Reducing risk and exposure of your most privileged accounts plays a critical role in preventing or detecting attempts at tenant-wide compromise.
Pretty cool next step to optimize phishing - using Microsoft DevTenants with custom domains:
https://badoption.eu/blog/2023/12/03/PhishingInfra.html
Phishing from within .. so to say .. and with the trust everyone puts into *.protection.outlook.com senders.
Speedrun for a O365 Phishing infrastructure Microsoft offers some Developer Tenants for O365. Those tenants can be used to set up a fishing infrastructure within minutes, emails will make it to almost all inboxes, specially in O365 environments. And you get a nice Teams phishing infra as bonus