PowerShell: Auditing MFA Methods in Microsoft 365
In previous posts we looked at different authentication methods and evaluated their strengths and weaknesses, then looked at session hijacking and device-bound session credentials. Weβre now going to put that knowledge to practical use by auditing the MFA methods in use in a Microsoft environment.
Continue reading...