BertJanCyber
bertjancyber.bsky.social
BertJanCyber
@bertjancyber.bsky.social
CSIRT | http://kqlquery.com | Microsoft Security MVP | Blue & Purple Team | SOC | SIEM | Threat Hunting | Detection Engineering | #KQL |
What EndpointCall do you use for these detections? Or do you only rely on SignInLogs for device code auth?
February 18, 2025 at 4:52 PM
I am aware, that is most often the case for the phishing flow. But this scenario focusses more on the flow of accessing management apis from unmanaged devices using device code auth.
February 18, 2025 at 4:50 PM
That deployment pipeline is not finished yet :D
December 23, 2024 at 8:55 PM