Related
Talk: Microsoft Entra ID – Defense
Our recommendations for setting up the Entra ID tenant, conditional access policies, what to monitor, and with which tools to audit Entra ID.
Talk: Microsoft Entra ID – Lateral Movement & PersistenceTalk:
After a successful phishing attempt, attackers aim to elevate their privileges and maintain access to the compromised Entra ID environment for as long as possible.
Discussion