Conditional Access bypasses
Cloudbrothers
2025-11-30 08:00:00
收藏
In Microsoft Entra, Conditional Access is, after the Authentication itself, the most crucial part of defense against attackers. It’s referenced as “zero trust policy engine” and the idea behind is, that in addition to your username and password you can also enforce additional requirements when you access a specific resource. This could be any combination of a second factor (2FA), a specific authentication method (e.g. passkey) a device that is in a “compliant” state a trusted or compliant network and a lot more, depending on your specific use case.
目录
最新
- Conditional Access bypasses
- Remove old or orphaned Sentinels from the XDR Streaming API
- Detect threats using GraphAPIAuditEvents - Part 3
- Workshop: Kusto Graph Semantics Explained
- EDR Silencers and Beyond: Exploring Methods to Block EDR Communication - Part 1
- You always trust your CSP - Cross Tenant MFA and GDAP
- Find lateral movement paths using KQL Graph semantics
- Data Protection Made a Breeze: MDA integration in Edge for Business