Take a look at the article I linked. It says: "Microsoft Entra Internet Access for Microsoft services capabilities are included in a Microsoft Entra ID P1 or Microsoft Entra ID P2 license."
05.03.2025 12:17 β π 0 π 0 π¬ 0 π 0@cbrhh.bsky.social
Take a look at the article I linked. It says: "Microsoft Entra Internet Access for Microsoft services capabilities are included in a Microsoft Entra ID P1 or Microsoft Entra ID P2 license."
05.03.2025 12:17 β π 0 π 0 π¬ 0 π 0
@fabian.bader.cloud, @naunheim.cloud and I have also looked into the topic of TokenSmith and are describing the Blue Team perspective (including an effective detection) in this blog:
www.glueckkanja.com/blog/securit...
Unfortunately, that was only a matter of time!
This video combines two of the most dangerous tools at the moment associated with phishing - and it's surprisingly simple!
www.youtube.com/watch?v=Dp1z...
Do we have defense options? Read on π
A Compliant Network behaves like a Named Location and triggers the Continuous Access Evaluation trigger.
This will force the user to reauthenticate if the token is CAE enabled (and the Service is SharePoint Online).
-> learn.microsoft.com/en-us/entra/...
-> learn.microsoft.com/en-us/entra/...
4/4
Why should you do this?
You get the option to protect your resources behind the compliant network control by configuring a Conditional Access policy
-> learn.microsoft.com/en-us/entra/...
This policy is regarding to my tests really powerful to protect against replayed tokens.
3/4
Means: you can install the Global Secure Access Client on all your clients and route the traffic to all the Microsoft Endpoints through GSA.
-> learn.microsoft.com/en-us/entra/...
The client is available for Windows, Mac, Android and iOS and it is really easy to deploy.
2/4
Global Secure Access and Token Replay - a thread...
Did you know that "Microsoft Entra Internet Access for Microsoft" is included in your Entra ID P1 license?
-> learn.microsoft.com/en-us/entra/...
1/4
gist.github.com/CloudProtect...
This one does a very good job because it considers if the device is joined/registered any only looks at the AADGraph. For this resource its not normal that a non-registered device is accessing it
Any tips? That's a really strange coincidence - ours needs to be replaced too...
29.12.2024 20:33 β π 0 π 0 π¬ 1 π 0I hope every SOC is monitoring incoming emails for signs of anomalous incoming mail amounts to your users. If this happens the execution of any RMM by the target user is a high alert you should follow up on.
19.12.2024 22:24 β π 3 π 1 π¬ 2 π 0π @cbrhh and I will be part of this year's Experts Live DK with our session: The state of passkey in 2025
#ELDK2025
conference.expertsli...
Great news! π
I have the opportunity to speak in March at the #eldk2025 in Copenhagen!
I will do a comparison of Entra Private Access and a classic VPN solution and show why Global Secure Access is much closer to my understanding of Zero Trust Network Access.
Hope to see you there!