AndrewCZ
andrewztrhgf.bsky.social
AndrewCZ
@andrewztrhgf.bsky.social
Enthusiast of PowerShell automation

https://doitpshway.com/

https://github.com/ztrhgf
Reposted by AndrewCZ
Side note...

If you are using the Teams webhook with Microsoft's Verified ID Helpdesk sample, you should not trust any of the notifications you receive 😬

Unfortunately, everything is exposed to and sent by the client with no validation that user verification was performed :(
I hate to ask... but is Verified ID transactions broken for anyone else?

graph.microsoft.com/...

I built a Logic App that was working but now sees no data. If anyone knows other sources for Verified ID transactions, LMK! :)
August 15, 2025 at 1:20 AM
Reposted by AndrewCZ
I'm not sure if many use the mobile device management features in OWA and the new #Outlook, but if you do, Microsoft is about to remove this facility from client settings. Mobile device management through EAC remains unchanged.
office365itpros.com/2025/08/15/m...
#Microsoft365
Mobile Device Management Options Disappear from OWA
Microsoft plans to remove the ability of users to perform mobile device management (for their devices) from the OWA and new Outlook for Windows clients.
office365itpros.com
August 15, 2025 at 9:07 AM
Reposted by AndrewCZ
🚀 New Blog: Master Log Tiering with Microsoft Sentinel Data Lake 🚀

🛡️ Microsoft Sentinel’s modern security data lake is a game-changer for SOC teams, CISOs, and security architects. In this article, I break down:

📌 Unified Data Management — onboarding all your security data across clouds and…
Master Log Tiering With Microsoft Sentinel Data Lake
Microsoft Sentinel has evolved from a cloud-native SIEM into a modern security data lake platform that enables organizations to ingest, retain, and analyze massive volumes of log data without compromising on cost or coverage. Traditional SIEMs forced security teams to make painful tradeoffs – either limit logging and retention (leaving blind spots) or pay exorbitant costs to store everything. Sentinel’s new data lake…
charbelnemnom.com
August 15, 2025 at 2:05 PM
Reposted by AndrewCZ
Two years ago I published a two part series on #MSGraph logs and how to use them for threat hunting.

Now comes part 3 and the logs are finally available to the masses.

#EntraID #KQL #Security

cloudbrothers.info/en/detect-th...
Detect threats using GraphAPIAuditEvents - Part 3
For a long time now, defenders had the ability to monitor behavior of human- and workload identities in Entra tenants not only through AuditLogs but with high level of insight with the MicrosoftGraphA...
cloudbrothers.info
August 15, 2025 at 3:57 PM
Reposted by AndrewCZ
📢 Breaking changes: Guest billing for Entra ID Governance

I haven't seen any announcements on this and guidance is extremely lacking, so Joe Stocker gave me time to create a script to help everyone assess costs early :)

I would love your feedback!
github.com/nathanmcnult...
July 23, 2025 at 11:21 PM
I have rewritten Get-IntunePolicy using graph api batching (Invoke-GraphBatchRequest from my MSGraphStuff module) and now it returns all our Intune policies in just 11 seconds instead of 50! Check doitpshway.com/how-to-use-m... for more details.

#powershell #graph #MSIntune
How to use Microsoft Graph Api Batching to speed up your scripts
Graph Api batching is a great way to dramatically improve the performance of your Graph API-related scripts. It enables parallel execution of up to 20 Graph API calls, which is fantastic, but there is one tiny little problem. You have to write your o...
doitpshway.com
July 23, 2025 at 2:57 PM
Reposted by AndrewCZ
Struggling to find a caller by object ID in AzureActivity in your directory? It may be from another directory.

Check the claims field, the tenant ID is contained within the claim and you can use something like aadinternals.com/osint/ to find out which tenant the caller is from.
OSINT
Entra ID Open Source Intelligence tool
aadinternals.com
July 2, 2025 at 10:33 AM
Reposted by AndrewCZ
Sentinel DevOps Connection - This script creates the new Azure DevOps repository with Microsoft Sentinel code content. github.com/mystak23/...

#MicrosoftSentinel #Cybersecurity #MicrosoftSecurity #Security #DefenderXDR
GitHub - mystak23/Sentinel_DevOpsConnection: This repository contains a script for automatic MicrosoftSentinel - AzureDevOps connection.
This repository contains a script for automatic MicrosoftSentinel - AzureDevOps connection. - mystak23/Sentinel_DevOpsConnection
github.com
June 25, 2025 at 3:45 PM
Reposted by AndrewCZ
Ever wonder exactly what Defender AV settings are configured and where they got those settings from?

This new feature in Defender for Endpoint shows the effective configuration and the source the settings came from

Very helpful for troubleshooting :)

learn.microsoft.com/...
May 29, 2025 at 4:35 AM
Reposted by AndrewCZ
It was Patch Tuesday this week, time to align the driver deployment with the monthly patch Tuesday!

#Windows #WindowsUpdate #MsIntune #Automation

inthecloud247.com/automaticall...
Automatically deploy Windows drivers on Patch Tuesday | Peter Klapwijk - In The Cloud 24-7
Automatically deploy drivers for Windows devices on Patch Tuesday to avoid unneeded reboots.
inthecloud247.com
May 15, 2025 at 6:34 AM
Reposted by AndrewCZ
One of the questions during our #MSGraph sessions at @mmsmoa.bsky.social was around filtering. Highly recommend checking out @merill.net’s blog post for a deeper dive and fantastic visuals

merill.net/2024/07/prop...

#PowerShell #MMSMOA
May 9, 2025 at 9:40 PM
Reposted by AndrewCZ
Reposted by AndrewCZ
🚨 PSA: FAKE Microsoft Authenticator apps are flooding the App Store & Play Store! ⚠️

Protect your users!

ONLY send them to the official download link 👇

Bookmark this! Update your user guides & intranet NOW. RT to spread the word!

#CyberSecurity #MFA

🧵↓
April 22, 2025 at 9:00 AM
Reposted by AndrewCZ
Most Microsoft tenants do not have Advanced Auditing configured correctly, and orgs only find out after it is too late :(

I tried really hard to make this as short and simple as possible. Please be nice to your IR folks and set this up, it's important ;)

nathanmcnulty.com/bl...
Comprehensive Guide to Configuring Advanced Auditing
This post provides everything you need to ensure Advanced Auditing is fully configured and auditing everything we possibly can for both existing and new users. I recently shared guidance for this via social media (see below), and it felt like a perfect time to revisit my previous posts and combine everything into one comprehensive guide :) You likely aren't collecting all available events to the Unified Audit Log First, not all events are enabled or retained optimally. Consider creating this policy in the Purview portal (leave users and record types blank to collect everything). Retention is based on license... pic.twitter.com/IEKKfrkpI8
nathanmcnulty.com
April 16, 2025 at 5:13 AM
Reposted by AndrewCZ
Microsoft attempts to fix the problem with V2.26.1 of the Graph #PowerShell SDK and Azure Automation. This is the kind of issue that should never have appeared in public. Sad to see vital components abused.
office365itpros.com/2025/04/14/m...
#Microsoft365
Microsoft Attempts to Fix Microsoft Graph PowerShell SDK
V2.26 and V2.26.1 of the Microsoft Graph PowerShell SDK were low-quality, buggy disasters. Microsoft aims to fix the problem in the next version.
office365itpros.com
April 14, 2025 at 9:42 AM
Reposted by AndrewCZ
I've been mulling over this concept of a break glass application in Entra, and thought I'd share some important notes for anyone that might be considering it

For reference, here's the article:
blog.admindroid.com/...

Short thread, but my primary concern is privilege escalation
Recover Admin Account with Entra Break Glass Access Application
Learn how to configure break glass access application in Entra ID to recover admin accounts from the lockouts.
blog.admindroid.com
April 11, 2025 at 3:42 AM
Reposted by AndrewCZ
So, uhh, this seems like something that is highly abusable that I bet almost nobody is monitoring for... :-/

learn.microsoft.com/...
April 8, 2025 at 5:24 AM
Reposted by AndrewCZ
# Find apps missing SPs, select and register
Get-MgBetaAuditLogSignIn -Filter "signInEventTypes/any(t: t eq 'servicePrincipal') and servicePrincipalId eq '00000000-0000-0000-0000-000000000000'" | Out-GridView -PassThru | ForEach-Object {New-MgBetaServicePrincipal -AppId $_.appId}
This is awesome! Microsoft is killing off the ability for multi-tenant applications to authenticate in directories where a service principal has not been registered.

learn.microsoft.com/...

I'd like to automate discovery and remediation for admins, but I need help testing :)
Retire Service Principal-Less Authentication - Microsoft identity platform
Learn about the mitigation steps tenant administrators should perform for service principal-less authentication behavior deprecation.
learn.microsoft.com
April 6, 2025 at 12:20 AM
Reposted by AndrewCZ
While at the Microsoft MVP summit, one of the MVPs mentioned the Microsoft.OSConfig module. I haven’t used it before, and I like how it works! In this blog post, I will show you how it works.

powershellisfun.com/2025/04/04/i...

#PowerShell #Security #OSConfig
PowerShell is fun :)Introduction to the Microsoft.OSConfig PowerShell module
While at the Microsoft MVP summit, one of the MVPs mentioned the Microsoft.OSConfig module. I haven’t used it before, and I like how it works and how the product team works with the Desired S…
powershellisfun.com
April 4, 2025 at 9:58 PM
Reposted by AndrewCZ
New website and first blog post in a couple years! :)

I got to talk with @merill.net recently about Restricted Management Admin Units, but some noted they break Access Packages and PIM making them less useful

While true by design, we can actually fix this!

nathanmcnulty.com/blog/2025/04...
Managing Restricted Groups with Access Packages
👮 Restricted Management Admin Units (RMAU) in #EntraID Hackers HATE This Hidden Entra ID Feature Most Admins Never Use@NathanMcNulty breaks it down for us 👇 🎧 Get the full podcast episode at https://t...
nathanmcnulty.com
April 4, 2025 at 7:57 PM
Reposted by AndrewCZ
This is awesome! Microsoft is killing off the ability for multi-tenant applications to authenticate in directories where a service principal has not been registered.

learn.microsoft.com/...

I'd like to automate discovery and remediation for admins, but I need help testing :)
Retire Service Principal-Less Authentication - Microsoft identity platform
Learn about the mitigation steps tenant administrators should perform for service principal-less authentication behavior deprecation.
learn.microsoft.com
April 5, 2025 at 2:11 AM
Reposted by AndrewCZ
When someone leaves a #Microsoft365 tenant, they might have several scheduled meetings in the future. Transferring ownership of these meetings is a manual process, but we have some #PowerShell to report the details of meetings...
office365itpros.com/2025/04/03/t...
Transfer Meeting Ownership Can be Hard Work
Outlook does not include a transfer meeting ownership feature. Moving responsibility from an ex-employee to give someone else meeting ownership is hard.
office365itpros.com
April 3, 2025 at 8:42 AM