Markus Pitkäranta

16 posts

Markus Pitkäranta

Markus Pitkäranta

@PitkarantaM

Katılım Ekim 2012
135 Takip Edilen86 Takipçiler
Markus Pitkäranta retweetledi
Thomas Naunheim
Thomas Naunheim@Thomas_Live·
Since a few months, I'm working together with @samilamppu and @PitkarantaM on new content for #AzureAD Attack & Defense playbook 🔐☁️. Integration and visualization of #AzureAD configuration posture 💪 and security settings to #MicrosoftSentinel is our major goal. Stay tuned!
Thomas Naunheim@Thomas_Live

Monitoring of #AzureAD security settings are important and needs to be reviewed regularly. I've started to integrate the identity-related policies to my #AADOps PoC project via #MicrosoftGraph. #MicrosoftSentinel creates work items to track changes outside of regular deployment.

English
0
7
19
2.7K
Dr. Nestori Syynimaa
Dr. Nestori Syynimaa@DrAzureAD·
To celebrate my new #AADInternals blog, I also published an online OSINT tool at aadinternals.com/osint It allows to get tenant information using: * Tenant ID * Domain name * Email/UPN The domain list includes links to ease the gathering of further information. Enjoy!
Dr. Nestori Syynimaa tweet media
English
12
162
494
0
Markus Pitkäranta retweetledi
Joosua Santasalo
Joosua Santasalo@SantasaloJoosua·
Very often overlooked subject: Dangling redirect_uri's pointing to App Service URL in Azure AD App Registrations. Read the blog to inspect if your Azure AD might be susceptible for redirect_uri takeover? securecloud.blog/2021/05/28/usi…
English
0
19
40
0
Markus Pitkäranta
Markus Pitkäranta@PitkarantaM·
@lampiluoto @samilamppu It’s not related to the use of user accounts. MDE tells MCAS which services (domain names, URLs, ...) are being used on a client, and MCAS reflects that to its catalog of SaaS apps.
English
0
0
0
0
Tero Lampiluoto
Tero Lampiluoto@lampiluoto·
@samilamppu So.. first you allow using your accounts to random services and then this feature helps you to figure those out? Why to allow it in the first place?
English
1
0
0
0
Markus Pitkäranta retweetledi
Joosua Santasalo
Joosua Santasalo@SantasaloJoosua·
Teamed up with @sharegatetools to write about some common oversights in Azure environments, which are often easy to fix: 1. understand how AAD relates to Azure 2. limit attack surface of network exposed services, and 3. use resource-locks when applicable
ShareGate@sharegatetools

As a security consultant and #AzureMVP, @SantasaloJoosua has helped a lot of companies secure their cloud infrastructure. Joosua walks us through a few #AzureSecurity mistakes most companies don’t realize they’re making 🛡️ #AzureTips #CloudSecurity sharegate.com/blog/3-azure-s…

English
0
6
10
0
Markus Pitkäranta
Markus Pitkäranta@PitkarantaM·
@SantasaloJoosua Attack surface reduction in Windows 10 might be able to block that? Haven’t seen it widely in use though (at least not in block mode).
English
0
0
1
0
Joosua Santasalo
Joosua Santasalo@SantasaloJoosua·
Outlook Custom Forms Injection: Late to the game with this one. didn't know there exists method of executing Office VBA code from received email. If you've encountered this, I'd like to know what kind of mitigation options one might have in place?
Joosua Santasalo tweet mediaJoosua Santasalo tweet media
English
1
0
0
0
Markus Pitkäranta
Markus Pitkäranta@PitkarantaM·
@samilamppu Nice article! Note, that you can also add your custom initiatives to that dashboard (I don’t see that mentioned in the article for whatever reason). So it doesn’t need to based on any of the pre-built policies.
English
1
0
1
0
Markus Pitkäranta retweetledi
Sami Lamppu
Sami Lamppu@samilamppu·
Two new sign-in linked detection types to Identity Protection: Suspicious inbox manipulation rules and Impossible travel. These offline detections are discovered by #CloudAppSecurity and influence the user and sign-in risk in #IdentityProtection 👉 #two-new-identity-protection-detections" target="_blank" rel="nofollow noopener">docs.microsoft.com/en-us/azure/ac…
English
0
6
8
0