Connect with experts and redefine what’s possible at work – join us at the Microsoft 365 Community Conference May 6-8. Learn more >
Recent Blog ArticlesMost RecentMost LikesRe: Investigating malicious OAuth applications using the Unified Audit Log You should get the same results via the GUI or via PowerShell (assuming your search criteria are the same on both) Investigating malicious OAuth applications using the Unified Audit Log Abstract Supply chain attacks continue to evolve in sophistication with new TTPs emerging every few months. In this article we highlight some of the most recently observed TTPs and our recommendati...Total Identity Compromise: Microsoft Incident Response lessons on securing Active Directory Total Identity Compromise: Microsoft Incident Response lessons on securing Active Directory When Microsoft Incident Response (formerly DART/CRSP) is engaged during an incident, almost all envir...