youtube image
From YouTube: How attackers can use applications for sustained persistence and how to find it - September 2021

Description

This month’s in-depth topic: Hiding in the Clouds: How attackers can use applications for sustained persistence and how to find it. In this session - What is application consent and why should you care (terms, user experience, applications and service principals, threats), Key permissions to look for (what permissions, what impact), How to investigate consent grants (discovery, IOCs, investigation), and Best practices to protect yourself from app consent attacks (policies, consents, risky OAuth apps, overprivileged apps, go-dos, resources). This session was delivered by Microsoft Program Managers Mark Morowczynski and Bailey Bercik. Recorded on September 16, 2021. Q&A last 10 minutes and in chat throughout call.

Stay connected:
• Twitter https://twitter.com/microsoft365dev and @azuread
• YouTube https://aka.ms/M365DevYouTube (Developer channel) and https://aka.ms/m365pnp/videos (Community channel)
• Blogs https://aka.ms/m365pnp/community/blog
• Recurrent Invite https://aka.ms/IDDevCommunityCalendar