o365blog.com
Open in
urlscan Pro
185.199.108.153
Public Scan
URL:
https://o365blog.com/post/devices/'
Submission: On August 24 via api from US — Scanned from DE
Submission: On August 24 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET //google.com/search
<form class="widget-search__form" role="search" method="get" action="//google.com/search">
<label>
<span class="screen-reader-text">Search for:</span>
<input class="widget-search__field" type="search" placeholder="SEARCH..." value="" name="q">
</label>
<input class="widget-search__submit" type="submit" value="Search">
<input type="hidden" name="sitesearch" value="http://o365blog.com">
</form>
Text Content
OFFICE 365 BLOG EVERYTHING ABOUT MICROSOFT 365 SECURITY Menu * AAD & M365 KILL CHAIN * AAD INTERNALS * LINKS * POWERSHELL * TALKS * TOOLS 404. PAGE NOT FOUND The page you were looking for appears to have been moved, deleted or does not exist. Please, use search or go to main page. Search for: RECENT POSTS * AADInternals World Tour August 2022: USA * Stealing and faking Azure AD device identities * Microsoft partners: The Good, The Bad, or The Ugly? * AADInternals admin and blue team tools * Spoofing Azure AD sign-ins logs by imitating AD FS Hybrid Health Agent CATEGORIES * * Article * Blog SOCIAL Twitter LinkedIn nestori.syynimaa@gerenios.com TAGS aadconnect (2) aadinternals (10) active-directory (1) adfs (5) admin (3) administration (1) authentication (1) azure (19) azure-active-directory (26) azuread (4) blackhat (2) blue-team (1) bprt (2) browser (1) compromise (1) conferences (1) defcon (1) desktop-sso (1) device (2) dns (3) email (2) encryption (1) exchange (1) federation (2) forensics (1) gdpr (1) global-administrator (1) graph (1) groups (1) guest (2) hybrid-join (2) identity (2) inactive (1) insider (1) intune (1) join (2) logs (1) mailbox (1) mdm (1) mfa (6) office-365 (9) office365 (9) on-prem (2) onedrive (1) outsider (2) partner (2) password (1) persistence (1) phishing (2) planner (1) powershell (13) prt (5) pta (1) recon (2) reconnaissance (4) seamless-sso (1) security (30) sso (2) sync (1) synchronisation (1) t2 (1) talks (1) teams (3) user (1) virtual-machine (1)