My colleague Dan has finally started his own blog about VMWare virtualisation products, and area he holds a lot of expertise in.
Check it out – PenguinPunk.net
You may withdraw your consent at any time. Please visit our Privacy Statement for additional information
My colleague Dan has finally started his own blog about VMWare virtualisation products, and area he holds a lot of expertise in.
Check it out – PenguinPunk.net
Everyone probably knows how to use the Send As and Send on Behalf of permissions to send email from user mailboxes. Here we venture into the same task, but for Microsoft 365 Groups, shared mailboxes, distribution lists, and mail-enabled security groups. Once your permissions are aligned, everything is pretty simple.
In this episode of Practical Protection, we discuss Microsoft’s Secure Future Initiative and what their latest progress report reveals about improving identity protection, reducing privileged access, and accelerating vulnerability response—and what you can take from it to strengthen your own environment.
In this installment of the Graph Activity Log series, we uncover how attackers exploit OAuth app consent to silently access Microsoft 365 data. Using targeted KQL queries and PowerShell automation, this blog shows how to detect, investigate, and respond to these stealthy identity-based threats.