Protecting against Malicious Azure AD Applications (Part 2: Investigating using MCAS)

In a previous post, I detailed the importance of controlling Azure AD OAuth Applications and consent within your environment. I also looked at how we can add approval for OAuth app requests so that each app can be vetted by an admin before consent is granted. With controls and governance in place, it's important to …

Continue reading Protecting against Malicious Azure AD Applications (Part 2: Investigating using MCAS)