Cloudbrothers
Posts
Categories
About me
Talks
english
english
Deutsch
Cloudbrothers
Cancel
Posts
Categories
About me
Talks
english
english
Deutsch
All Categories
Azure AD
Windows Hello for Business Cloud Trust and KDC proxy
Why using a FIDO2 security key is important
Azure Dominance Paths
Just-In-Time role assignment in Microsoft Defender
Bypass sensitivity label restrictions with mobile Edge and conditional access policies
More >>
Identity and Access
Just-In-Time role assignment in Microsoft Defender
Alert changes to sensitive AD groups using MDI
Bypass sensitivity label restrictions with mobile Edge and conditional access policies
Journey To Passwordless: Restrict FIDO2 key usage & conclusion
Journey To Passwordless: Microsoft Authenticator App
More >>
Security
Windows Hello for Business Cloud Trust and KDC proxy
Why using a FIDO2 security key is important
Azure Dominance Paths
Current limits of Defender AV Tamper Protection
Defender for Endpoint - Did the Antivirus scan complete?
More >>
Conditional Access
Bypass sensitivity label restrictions with mobile Edge and conditional access policies
Journey To Passwordless: Restrict FIDO2 key usage & conclusion
Journey To Passwordless: Microsoft Authenticator App
Journey To Passwordless: PowerShell administration without a password
Journey To Passwordless: Windows 10 Device Onboarding and Windows Hello for Business
More >>
KQL
Why using a FIDO2 security key is important
Azure Dominance Paths
Detect and alert on unusual high phish or malware email volume
Current limits of Defender AV Tamper Protection
Defender for Endpoint - Did the Antivirus scan complete?
More >>
Azure
Azure Dominance Paths
Persistence with Azure Policy Guest Configuration
Operator mvexpand: expanded expression expected to have dynamic type
Certificate management with Azure Automation and Let's Encrypt
SCHANNEL settings in Azure Windows Marketplace image changed
More >>
PowerShell
Azure Dominance Paths
Manage group policies with PowerShell
Use Pulse Secure on Windows 11
PowerShell Tip: Resolve SPF Records
Test UDP connection with PowerShell
More >>
Microsoft 365
The case of the... MapiExceptionShutoffQuotaExceeded
Microsoft 365 license overview
Phase out Legacy Authentication - Endgame
Phase out Legacy Authentication - The next 9%
Phase out Legacy Authentication - The first 90%
More >>
Passwordless
Windows Hello for Business Cloud Trust and KDC proxy
Why using a FIDO2 security key is important
Journey To Passwordless: Restrict FIDO2 key usage & conclusion
Journey To Passwordless: Microsoft Authenticator App
Journey To Passwordless: PowerShell administration without a password
More >>
FIDO2
Why using a FIDO2 security key is important
Journey To Passwordless: Restrict FIDO2 key usage & conclusion
Journey To Passwordless: Microsoft Authenticator App
Journey To Passwordless: PowerShell administration without a password
Journey To Passwordless: Windows 10 Device Onboarding and Windows Hello for Business
More >>
Defender for Endpoint
The Hitchhiker's Guide to Microsoft Defender for Endpoint exclusions
Detect and alert on unusual high phish or malware email volume
Current limits of Defender AV Tamper Protection
Defender for Endpoint - Did the Antivirus scan complete?
Just-In-Time role assignment in Microsoft Defender
More >>
Windows
Current limits of Defender AV Tamper Protection
Defender for Endpoint - Did the Antivirus scan complete?
Create a Network Trace Without Wireshark
Test UDP connection with PowerShell
Proxy, Proxy on the Wall...
Defender AV
The Hitchhiker's Guide to Microsoft Defender for Endpoint exclusions
Current limits of Defender AV Tamper Protection
Defender for Endpoint - Did the Antivirus scan complete?
Create persistent Defender AV exclusions and circumvent Defender for Endpoint detection
Network
Create a Network Trace Without Wireshark
Test UDP connection with PowerShell
Optimize your Microsoft Teams traffic with QoS on a UniFi USG
Find a free IP address in Azure
User Group
Speaking @ Cloud Workplace Meetup
Speaking @ Microsoft Cloud Security User Group
Speaking @ Trust in Tech Cologne
Speaking @ Cloud Management User Group
Windows Server
Current limits of Defender AV Tamper Protection
Defender for Identity, Npcap on Windows Server 2022
SCHANNEL settings in Azure Windows Marketplace image changed
Clear computer Kerberos ticket and certificate cache
Active Directory
Exploit samAccountName spoofing with Kerberos
Manage group policies with PowerShell
Alert changes to sensitive AD groups using MDI
Log Analytics
Operator mvexpand: expanded expression expected to have dynamic type
Query the Log Analytics Workspace for all Azure VM
Azure Log Analytics - RegEx case insensitive
MFA
Windows Hello for Business Cloud Trust and KDC proxy
Why using a FIDO2 security key is important
Why the new MFA registration benefits your users
Office 365
Microsoft 365 license overview
Optimize your Microsoft Teams traffic with QoS on a UniFi USG
Is this ip address part of the Office 365 IP address range?
PKI
Golden Certificate and OCSP
The case of the... Intune SCEP Profil hangs in pending state
Clear computer Kerberos ticket and certificate cache
The case of the
The case of the... MapiExceptionShutoffQuotaExceeded
The case of the... The Sign-in method you're using isn't allowed
The case of the... Intune SCEP Profil hangs in pending state
Advanced Hunting
Alert changes to sensitive AD groups using MDI
Automated response to C2 traffic on your devices
Automation
Certificate management with Azure Automation and Let's Encrypt
AzureRM.Network 0.9 breaks Azure Automation Runbooks
Defender for Identity
Alert changes to sensitive AD groups using MDI
Defender for Identity, Npcap on Windows Server 2022
Exchange
The case of the... MapiExceptionShutoffQuotaExceeded
PowerShell Tip: Resolve SPF Records
Intune
The case of the... The Sign-in method you're using isn't allowed
The case of the... Intune SCEP Profil hangs in pending state
Module
AzureSimpleREST Module
PowerShell Modul Development: Pester Tests
TIL
Operator mvexpand: expanded expression expected to have dynamic type
TIL BitLocker + YubiKey = ❤️
ARM
Azure Availability Sets vNet dependency
Backup
"Reverse engineering" the Azure REST API
Defender for Office 365
Detect and alert on unusual high phish or malware email volume
DSC
Persistence with Azure Policy Guest Configuration
Excel
Query the Log Analytics Workspace for all Azure VM
GPO
Manage group policies with PowerShell
HHPSUG
Manage group policies with PowerShell
Kerberos
Exploit samAccountName spoofing with Kerberos
Let's Encrypt
Certificate management with Azure Automation and Let's Encrypt
Microsoft Information Protection
Bypass sensitivity label restrictions with mobile Edge and conditional access policies
Microsoft Teams
Optimize your Microsoft Teams traffic with QoS on a UniFi USG
OMS
Query the Log Analytics Workspace for all Azure VM
Pester
PowerShell Modul Development: Pester Tests
Proxy
Proxy, Proxy on the Wall...
PSScriptAnalyzer
PowerShell Modul Development: Pester Tests
REST
"Reverse engineering" the Azure REST API
Tools
Clear computer Kerberos ticket and certificate cache
UniFi
Optimize your Microsoft Teams traffic with QoS on a UniFi USG
YubiKey
TIL BitLocker + YubiKey = ❤️