Sep 04 2024 07:35 AM
Hi,
does anyone know, what is microsoft's official recommendation to prevent any attackers from distributing malware via microsoft's own cloud resources like discussed at Cloud storage from Microsoft, Google used in malware attacks • The Register?
According to microsoft's networking principles, traffic related to Microsoft 365 shouldn't be inspected by any networking component and routed directly to microsoft (bypassing proxies and other traffic inspection solutions).
How can this be configured safely, when there is such attack path?