Microsoft 365 (6)

Cipher

PowerShell: Auditing MFA Methods in Microsoft 365

In previous posts we looked at different authentication methods and evaluated their strengths and weaknesses, then looked at session hijacking and device-bound session credentials. We’re now going to put that knowledge to practical use by auditing the MFA methods in use in a Microsoft environment.

Continue reading...