Inversecos.com

Detecting Fake Events in Azure Sign-in Logs

WEBMethod 1: An attacker gains local admin / domain admin privileges on an AD FS server and proceeds to generates FAKE logs in Azure. Method 2: An attacker who has compromised a global administrator account can create a FAKE Azure AD Health Agent on their attacker machine and generate fake logs. This option is possible for tenants not …

Actived: 8 days ago

URL: https://www.inversecos.com/2023/01/detecting-fake-events-in-azure-sign-in.html