<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hybrid Brothers - Microsoft Security Blog on Hybrid Brothers</title><link>https://hybridbrothers.com/</link><description>Recent content in Hybrid Brothers - Microsoft Security Blog on Hybrid Brothers</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 19 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hybridbrothers.com/index.xml" rel="self" type="application/rss+xml"/><item><title>MC2MC Live: License to Secure</title><link>https://hybridbrothers.com/public-speaking/19-03-2026/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/19-03-2026/</guid><description>&lt;p&gt;After the great feedback from YellowHat, I decided to give my &amp;lsquo;From a cloud-only Entra account to Domain Admin&amp;rsquo; session on our own MC2MC Live event. The crowd was great and asked very interesting questions. I had lots of fun giving a session to my own Belgian community.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://assets.hybridbrothers.com/images/public-speaking/19-03-2026/From%20a%20cloud-only%20Entra%20account%20to%20Domain%20Admin%20-%20MC2MC%20Live.pdf"&gt;Find the slide deck here&lt;/a&gt;&lt;/p&gt;





&lt;div class="image-gallery" id="gallery-1774606259"&gt;
 &lt;div class="gallery-container"&gt;
 &lt;div class="gallery-images"&gt;
 
 
 &lt;div class="gallery-item active" data-index="0"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-03-2026/mc2mc-image-1.jpeg" alt="MC2MC Live" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;MC2MC Live&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="1"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-03-2026/mc2mc-image-2.jpeg" alt="Purple Teaming" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Purple Teaming&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="2"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-03-2026/mc2mc-image-3.jpeg" alt=" Microsoft Security" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt; Microsoft Security&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="3"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-03-2026/mc2mc-image-4.jpeg" alt="Gallery image" loading="lazy"&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="4"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-03-2026/mc2mc-image-5.jpeg" alt="Gallery image" loading="lazy"&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-navigation"&gt;
 &lt;button class="gallery-prev" data-gallery="gallery-1774606259" aria-label="Previous image"&gt;‹&lt;/button&gt;
 &lt;button class="gallery-next" data-gallery="gallery-1774606259" aria-label="Next image"&gt;›&lt;/button&gt;
 &lt;/div&gt;
 
 &lt;div class="gallery-dots"&gt;
 
 &lt;button class="gallery-dot active" data-gallery="gallery-1774606259" data-index="0" aria-label="Go to image 1"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="1" aria-label="Go to image 2"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="2" aria-label="Go to image 3"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="3" aria-label="Go to image 4"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="4" aria-label="Go to image 5"&gt;&lt;/button&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
&lt;/div&gt;</description></item><item><title>Remediating Agent Identities for Identity Admins and SOCs</title><link>https://hybridbrothers.com/posts/agentid-remediation/</link><pubDate>Mon, 16 Feb 2026 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/agentid-remediation/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With Microsoft launching Agent ID at the end of 2025, a new kind of identities were born in Entra ID. These identities are specially built for dynamic requirements of AI Agents, and is therefore a completely new concept to understand for Identity Administrators. But more importantly, how is your organization going to respond if one of these new identities are compromised? We will go over it in this blogpost, focussing specifically on how to &lt;strong&gt;remediate the identities linked to the agent&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Getting a first grip on Copilot Studio agents as an administrator</title><link>https://hybridbrothers.com/posts/agentid-copilotstudio-recommendations/</link><pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/agentid-copilotstudio-recommendations/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With the rise of AI Agents in organizations, I see at many customers AI Identities rapidly being created in Entra ID. One of the first questions most admins almost immediately have is, how can we know who created the AI Agent Identities, and how can we know where the related Agent lives? In this blogpost I will talk you through the steps on how to answer these basic but important governance questions.&lt;/p&gt;</description></item><item><title>Yellowhat</title><link>https://hybridbrothers.com/public-speaking/13-01-2026/</link><pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/13-01-2026/</guid><description>&lt;p&gt;Yellowhat has always been on my bucket list, and what an event is was! Speaking for 200+ on-site and 2000+ livestream attendees was really amazing! Below you can find the slide-deck with all the references to the detection use cases mentioned during the talk &lt;strong&gt;at the end of the slide deck&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://assets.hybridbrothers.com/images/public-speaking/13-01-2026/From%20a%20cloud-only%20Entra%20account%20to%20Domain%20Admin%20-%20Yellowhat.pdf"&gt;Find the slide deck here&lt;/a&gt;&lt;/p&gt;





&lt;div class="image-gallery" id="gallery-1774606259"&gt;
 &lt;div class="gallery-container"&gt;
 &lt;div class="gallery-images"&gt;
 
 
 &lt;div class="gallery-item active" data-index="0"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/13-01-2026/image-1.jpeg" alt="Yellowhat" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Yellowhat&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="1"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/13-01-2026/image-2.jpeg" alt="Purple Teaming" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Purple Teaming&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="2"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/13-01-2026/image-3.jpeg" alt=" Microsoft Security" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt; Microsoft Security&lt;/div&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-navigation"&gt;
 &lt;button class="gallery-prev" data-gallery="gallery-1774606259" aria-label="Previous image"&gt;‹&lt;/button&gt;
 &lt;button class="gallery-next" data-gallery="gallery-1774606259" aria-label="Next image"&gt;›&lt;/button&gt;
 &lt;/div&gt;
 
 &lt;div class="gallery-dots"&gt;
 
 &lt;button class="gallery-dot active" data-gallery="gallery-1774606259" data-index="0" aria-label="Go to image 1"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="1" aria-label="Go to image 2"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="2" aria-label="Go to image 3"&gt;&lt;/button&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
&lt;/div&gt;</description></item><item><title>Entra ID Synced Passkeys and security considerations</title><link>https://hybridbrothers.com/posts/entra-synced-passkeys/</link><pubDate>Tue, 18 Nov 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/entra-synced-passkeys/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;At Ignite 2025, Microsoft announced Entra ID would be &lt;a href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-what%E2%80%99s-new-in-secure-access-on-the-ai-frontier/4468732"&gt;supporting Synced Passkeys for multiple credential providers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://assets.hybridbrothers.com/images/posts/entra-synced-passkeys/image-32.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;This means users can now create phishing resistant credentials, and sync those credentials across devices. This new authentication method has a lot of advantages, but also raises a couple of questions. Let&amp;rsquo;s go over them together.&lt;/p&gt;
&lt;h2 id="synced-passkeys"&gt;Synced passkeys&lt;/h2&gt;
&lt;h3 id="the-benefits"&gt;The benefits&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Stronger security&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Obviously, passkeys provide phishing resistant authentication meaning users are protected against attacks such as access token stealing. This method introduces better security than basic MFA methods, and ensures attackers are only able to compromise the login when the system where the passkeys is stored is compromised.&lt;/p&gt;</description></item><item><title>Defender XDR VS Microsoft Sentinel table changes</title><link>https://hybridbrothers.com/posts/defender-xdr-vs-sentinel-table-changes/</link><pubDate>Sat, 11 Oct 2025 08:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/defender-xdr-vs-sentinel-table-changes/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;When connecting Microsoft Sentinel to Defender XDR, there are a couple of changes happening in tables which you should be aware of. Even though they are documented in the Microsoft Learn, I it is not always clear what the exact impact is. Let&amp;rsquo;s go over it together.&lt;/p&gt;
&lt;h2 id="identityinfo-table"&gt;IdentityInfo table&lt;/h2&gt;
&lt;p&gt;In the &lt;a href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender"&gt;transition guidance from Microsoft Sentinel to the Defender Portal&lt;/a&gt;, there is a subtile mention that the &lt;code&gt;IdentityInfo&lt;/code&gt; &lt;a href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender#investigate-with-ueba-in-the-defender-portal"&gt;table schema changes when connecting Sentinel to Defender XDR&lt;/a&gt; when you have enabled UEBA in Microsoft Sentinel. It mentions that &amp;lsquo;Some fields that existed when used in the Azure portal are either renamed in the Defender portal, or aren&amp;rsquo;t supported at all&amp;rsquo;, and proceeds to urge you to check your queries and update them as needed. But what are the exact changes?&lt;/p&gt;</description></item><item><title>Important changes to HybridBrothers.com</title><link>https://hybridbrothers.com/posts/important-changes-to-hybridbrothers-com/</link><pubDate>Wed, 01 Oct 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/important-changes-to-hybridbrothers-com/</guid><description>&lt;h2 id="what-is-changing"&gt;What is changing&lt;/h2&gt;
&lt;p&gt;As a valued member of our community, we would like to inform you that we are migrating our HybridBrothers.com blogging website to a new framework. More specifically, we are moving away from our current Ghost framework to Hugo. While the Ghost blogging platform works great, we decided to move away from it due to the hosting complexity it introduces.&lt;/p&gt;
&lt;p&gt;In the new framework, a couple of features will unfortunately not exist anymore. These features are:&lt;/p&gt;</description></item><item><title>Transition from Microsoft Sentinel to Defender XDR - Practical challenges</title><link>https://hybridbrothers.com/posts/transition-from-microsoft-sentinel-to-defender-xdr-practical-challenges/</link><pubDate>Fri, 04 Jul 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/transition-from-microsoft-sentinel-to-defender-xdr-practical-challenges/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Microsoft announced on the 1st of July 2025 that the &lt;a href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-custo/4428613?ref=hybridbrothers.com"&gt;Microsoft Sentinel Azure Portal UI&lt;/a&gt; will be deprecated at the 1st of July 2026, and all requests will be redirected to the Security Portal instead. This means that all Microsoft Sentinel customers have 1 year time to transition to the Defender portal and change their processes.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://assets.hybridbrothers.com/images/posts/transition-from-microsoft-sentinel-to-defender-xdr-practical-challenges/image-1.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;Even though the technical switch is very easy to do, I had a lot of challenges to be able to switch to the Defender Portal during the last year. A lot of issues and bugs are already solved by now, but there are still some caveats and nuanced that you need to take into account when switching. In the first part you can read the challenges I personally struggled with, and in the second part you can find other challenges and nuances documented in the Learn pages.&lt;/p&gt;</description></item><item><title>Microsoft 365 Security &amp; Compliance User Group</title><link>https://hybridbrothers.com/public-speaking/30-04-2025/</link><pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/30-04-2025/</guid><description>&lt;p&gt;Together with Thijs, I gave our updated session on how we architect a SOC on top of Microsoft Defender XDR and Microsoft Sentinel. Since there were a lot of changes during the last couple of months in the Microsoft XDR and SIEM stack, we had a lot of new stuff to talk about!&lt;/p&gt;
&lt;p&gt;The session covered the latest developments in Microsoft&amp;rsquo;s security stack and how organizations can leverage these changes to improve their security posture.&lt;/p&gt;</description></item><item><title>Detecting non-privileged Windows Hello abuse</title><link>https://hybridbrothers.com/posts/detecting-non-privileged-windows-hello-abuse/</link><pubDate>Sat, 26 Apr 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/detecting-non-privileged-windows-hello-abuse/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;I recently followed a live session of &lt;a href="https://dirkjanm.io/?ref=hybridbrothers.com"&gt;Dirk-Jan Mollema&lt;/a&gt; and &lt;a href="https://www.pentestpartners.com/security-blog/author/ceri-coburn/?ref=hybridbrothers.com"&gt;Ceri Coburn&lt;/a&gt; on how Windows Hello for Business can be abused as a non-privileged user. I was very intrigued by the concept of the attack they demonstrated, which is why a spend a couple of days thinking of ways how we can counter this attack with detective controls as blue teamers.&lt;/p&gt;
&lt;p&gt;Before diving into the controls, let&amp;rsquo;s first do a recap on what the attack scenario is all about. Interesting to note is that I flagged each detection rule and hunting query I created with the below banner throughout this blogpost:&lt;/p&gt;</description></item><item><title>MDE Device Discovery - Improving the monitored network page</title><link>https://hybridbrothers.com/posts/mde-device-discovery-improving-the-monitored-network-page/</link><pubDate>Wed, 19 Mar 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/mde-device-discovery-improving-the-monitored-network-page/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;This blogpost is probably the first of a series that I will create in the coming months on Device Discovery. I regularly see organizations buy a specific tool to create an asset inventory list of what lives in their networks, while this is something we can actually do with Microsoft Defender for Endpoint (with some nuances). By using the tools we already have, we can save costs, and make sure that everything is as much centralized as possible in the Defender XDR asset inventory. But to be completely honest, the Microsoft tooling that provide these insights can use some improvements here and there. Because of this, I wanted to talk in this blogpost what I think could be done better, and how you can actually get these insights via some KQL queries.&lt;/p&gt;</description></item><item><title>Correlating Defender for Endpoint and Global Secure Access Logs</title><link>https://hybridbrothers.com/posts/correlating-defender-for-endpoint-and-global-secure-access-logs/</link><pubDate>Sun, 16 Feb 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/correlating-defender-for-endpoint-and-global-secure-access-logs/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;If you are working with Microsoft security solutions, you might have heard of the new kid on the block called Microsoft Global Secure Access. Being a blue teamer myself, I asked myself how we can use this new Secure Service Edge solution - and specifically the Internet Access logs - to make our detections better.&lt;/p&gt;
&lt;p&gt;During my research I found that these logs are especially interesting when we correlate them with the EDR solution of Microsoft called Microsoft Defender for Endpoint. If you want to learn how you can do this, make sure to keep reading.&lt;/p&gt;</description></item><item><title>MC2MC Connect</title><link>https://hybridbrothers.com/public-speaking/06-02-2025/</link><pubDate>Thu, 06 Feb 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/06-02-2025/</guid><description>&lt;p&gt;Speaking at my very own event, that was something else! I brought my session about how Microsoft Defender for Endpoint and Global Secure Access to a fully packed room, and it was amazing!&lt;/p&gt;





&lt;div class="image-gallery" id="gallery-1774606259"&gt;
 &lt;div class="gallery-container"&gt;
 &lt;div class="gallery-images"&gt;
 
 
 &lt;div class="gallery-item active" data-index="0"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/06-02-2025/image-1.jpg" alt="Speaking to a packed room at MC2MC Connect" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Speaking to a packed room at MC2MC Connect&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="1"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/06-02-2025/image-2.jpg" alt="Discussing Microsoft Defender for Endpoint integration" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Discussing Microsoft Defender for Endpoint integration&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="2"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/06-02-2025/image-3.jpg" alt="Q&amp;amp;A session with the audience" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Q&amp;amp;A session with the audience&lt;/div&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-navigation"&gt;
 &lt;button class="gallery-prev" data-gallery="gallery-1774606259" aria-label="Previous image"&gt;‹&lt;/button&gt;
 &lt;button class="gallery-next" data-gallery="gallery-1774606259" aria-label="Next image"&gt;›&lt;/button&gt;
 &lt;/div&gt;
 
 &lt;div class="gallery-dots"&gt;
 
 &lt;button class="gallery-dot active" data-gallery="gallery-1774606259" data-index="0" aria-label="Go to image 1"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="1" aria-label="Go to image 2"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="2" aria-label="Go to image 3"&gt;&lt;/button&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
&lt;/div&gt;</description></item><item><title>Workplace Ninja Connect Netherland</title><link>https://hybridbrothers.com/public-speaking/05-02-2025/</link><pubDate>Wed, 05 Feb 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/05-02-2025/</guid><description>&lt;p&gt;I was honored to bring my session on how Microsoft Defender for Endpoint and Global Secure Access can be used together to have better network detection strategies at Workplace Ninja Connect in the Netherlands!&lt;/p&gt;





&lt;div class="image-gallery" id="gallery-1774606259"&gt;
 &lt;div class="gallery-container"&gt;
 &lt;div class="gallery-images"&gt;
 
 
 &lt;div class="gallery-item active" data-index="0"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/05-02-2025/workplace-ninja-connect-netherlands.jpg" alt="Demonstrating integration between Defender for Endpoint and Global Secure Access" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Demonstrating integration between Defender for Endpoint and Global Secure Access&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="1"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/05-02-2025/image-1.jpg" alt=" Full room" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt; Full room&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="2"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/05-02-2025/image-2.jpg" alt=" Selfie with the banner" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt; Selfie with the banner&lt;/div&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-navigation"&gt;
 &lt;button class="gallery-prev" data-gallery="gallery-1774606259" aria-label="Previous image"&gt;‹&lt;/button&gt;
 &lt;button class="gallery-next" data-gallery="gallery-1774606259" aria-label="Next image"&gt;›&lt;/button&gt;
 &lt;/div&gt;
 
 &lt;div class="gallery-dots"&gt;
 
 &lt;button class="gallery-dot active" data-gallery="gallery-1774606259" data-index="0" aria-label="Go to image 1"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="1" aria-label="Go to image 2"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="2" aria-label="Go to image 3"&gt;&lt;/button&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
&lt;/div&gt;</description></item><item><title>Privacy Policy</title><link>https://hybridbrothers.com/privacy-policy/</link><pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/privacy-policy/</guid><description>&lt;h1 id="privacy-policy"&gt;Privacy Policy&lt;/h1&gt;
&lt;h2 id="how-to-contact-us"&gt;How to contact us&lt;/h2&gt;
&lt;p&gt;Should you have any questions about this privacy policy, the data we hold on your, or you would like to exercise one of your data protection rights, please do not hesitate to contact us at &lt;a href="mailto:info@hybridbrothers.com"&gt;info@hybridbrothers.com&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="background"&gt;Background&lt;/h2&gt;
&lt;p&gt;Hybrid Brothers is committed to user privacy.&lt;/p&gt;
&lt;p&gt;The policy on protection of individuals with regard to the processing of personal data by Hybrid Brothers is based on the requirements of the current legal framework in relation to data processing and with the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation).&lt;/p&gt;</description></item><item><title>Parsing CEF messages without Azure Monitor Agent</title><link>https://hybridbrothers.com/posts/parsing-cef-messages-without-azure-monitor-agent/</link><pubDate>Mon, 13 Jan 2025 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/parsing-cef-messages-without-azure-monitor-agent/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;During my time as SOC Engineer, I do a lot of third-party data source ingestion projects for clients into their Microsoft Sentinel instances. Most of these data sources are &lt;strong&gt;network security solutions&lt;/strong&gt; like &lt;strong&gt;firewalls&lt;/strong&gt; and &lt;strong&gt;proxy solutions&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;When you want to ingest this data into Microsoft Sentinel, you have a couple of scenario&amp;rsquo;s and architectures you can build to accomplish this. The architecture you will find the most on the internet is by using the &lt;a href="https://learn.microsoft.com/en-us/azure/sentinel/connect-cef-syslog-ama?tabs=portal&amp;amp;ref=hybridbrothers.com"&gt;Azure Monitoring Agent&lt;/a&gt;. Even though the features in the AMA agents are getting better, I still prefer to use &lt;strong&gt;Logstash&lt;/strong&gt; during my ingestion projects instead. In my opinion, Logstash is more flexible and provides more capabilities than the AMA agent currently does.&lt;/p&gt;</description></item><item><title>MC2MC Live - Forward to the Past</title><link>https://hybridbrothers.com/public-speaking/19-04-2024/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/19-04-2024/</guid><description>&lt;p&gt;At MC2MC Live: Forward to the past I was able to give a session on how to manage Azure Bicep templates at scale and automatically. Very happy to have given this session to such a big audience in West Flanders!&lt;/p&gt;





&lt;div class="image-gallery" id="gallery-1774606259"&gt;
 &lt;div class="gallery-container"&gt;
 &lt;div class="gallery-images"&gt;
 
 
 &lt;div class="gallery-item active" data-index="0"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-04-2024/mc2mc-savaco.jpeg" alt="Presenting Bicep template management strategies" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Presenting Bicep template management strategies&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="1"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-04-2024/image-1.jpg" alt="Demonstrating automated deployment workflows" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Demonstrating automated deployment workflows&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="2"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/19-04-2024/image-2.jpg" alt=" Big room" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt; Big room&lt;/div&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-navigation"&gt;
 &lt;button class="gallery-prev" data-gallery="gallery-1774606259" aria-label="Previous image"&gt;‹&lt;/button&gt;
 &lt;button class="gallery-next" data-gallery="gallery-1774606259" aria-label="Next image"&gt;›&lt;/button&gt;
 &lt;/div&gt;
 
 &lt;div class="gallery-dots"&gt;
 
 &lt;button class="gallery-dot active" data-gallery="gallery-1774606259" data-index="0" aria-label="Go to image 1"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="1" aria-label="Go to image 2"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="2" aria-label="Go to image 3"&gt;&lt;/button&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;The session focused on practical approaches to managing infrastructure as code at enterprise scale, including automated testing and deployment pipelines.&lt;/p&gt;</description></item><item><title>Device isolation and containment strategies</title><link>https://hybridbrothers.com/posts/device-isolation-and-containment-strategies/</link><pubDate>Mon, 09 Dec 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/device-isolation-and-containment-strategies/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;As a Security Operation Center, you want to be able to contain devices and users on a network as a response to an adversary event. However, depending on the security stack you are using, containing a device can be done using multiple ways. Each way of performing a containment action can bring benefits from another, and sometimes it is hard to understand which option is the best one to use.&lt;/p&gt;</description></item><item><title>Entra ID Private Access with private integrated storage accounts</title><link>https://hybridbrothers.com/posts/entra-private-access-with-private-integrated-storage-accounts/</link><pubDate>Mon, 04 Nov 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/entra-private-access-with-private-integrated-storage-accounts/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In the past couple of weeks, I worked on a project where I needed to provide access to a securely private integrated Azure Storage Account via the Entra ID Private access profile. During this project I encountered a very interesting bug, that made me better understand the insights of how Global Secure Access works.&lt;/p&gt;
&lt;h2 id="the-setup"&gt;The setup&lt;/h2&gt;
&lt;p&gt;The requirement for this setup is that access to the Storage Account was provided by using the Azure Storage Explorer application. Via this applications we needed to tunnel the data through Entra ID Private Access, and allowed it to access the private integrated Storage Account.&lt;/p&gt;</description></item><item><title>Cyber back to school: Microsoft Token Theft Unveiled</title><link>https://hybridbrothers.com/posts/cyber-back-to-school-microsoft-token-theft-unveiled/</link><pubDate>Fri, 25 Oct 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/cyber-back-to-school-microsoft-token-theft-unveiled/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;I am thrilled to participate in the Cyber Back to School initiative hosted during cyber awareness month! This session is all about Primary Refresh Token VS Access Token stealing in Microsoft Entra ID, and will show the practical countermeasures for each of them. I preferred to write a blog post for this instead of a PowerPoint deck since there are a lot of technical details and references I want to cover.&lt;/p&gt;</description></item><item><title>Client Credentials - Client Certificate</title><link>https://hybridbrothers.com/posts/client-credentials-client-certificate/</link><pubDate>Mon, 21 Oct 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/client-credentials-client-certificate/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The process is quite similar to the client secret flow described &lt;a href="https://hybridbrothers.com/posts/client-credentials-client-secret/"&gt;here&lt;/a&gt;, so be sure to take a look! The challenge here lies in generating a JWT (JSON Web Token) based on a certificate. I will provide a detailed explanation of how the JWT is generated and exchanged for an access token below.&lt;/p&gt;
&lt;h3 id="flow-details"&gt;Flow Details&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://assets.hybridbrothers.com/images/posts/client-credentials-client-certificate/image-1.png" alt="Authentication schema"&gt;&lt;/p&gt;
&lt;p&gt;For more information about this flow be sure to check the previous article. However in short:&lt;/p&gt;</description></item><item><title>Client Credentials - Client Secret</title><link>https://hybridbrothers.com/posts/client-credentials-client-secret/</link><pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/client-credentials-client-secret/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The next authentication flow in my series will be the Client Credentials Flow. Be sure to check out the first one &lt;a href="https://hybridbrothers.com/posts/authorization-code-flow/"&gt;here&lt;/a&gt;! We will first take a look at the client secret model. I will skip the basics in this article as this has been explained in my other article.&lt;/p&gt;
&lt;h3 id="flow-details"&gt;Flow Details&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://assets.hybridbrothers.com/images/posts/client-credentials-client-secret/image-1.png" alt="Authentication schema"&gt;&lt;/p&gt;
&lt;p&gt;Above you can see this flow provided by the OAuth docs. It&amp;rsquo;s a lot simpler then the Authorization Code Flow, however this is inherent because it is a &lt;strong&gt;non-interactive&lt;/strong&gt; sign-in flow meaning mostly used by daemons, services, etc&amp;hellip; There&amp;rsquo;s only one step and it&amp;rsquo;s the exchange of your client secret or a JWT (JSON Web Token) for an access token.&lt;/p&gt;</description></item><item><title>Bicep: Dynamic naming technique</title><link>https://hybridbrothers.com/posts/bicep-dynamic-naming-technique/</link><pubDate>Thu, 03 Oct 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/bicep-dynamic-naming-technique/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;When designing IaC modules finding the correct syntax to deploy a certain resource type is often not the hardest thing to do. What I found in 4 years of writing Bicep code, is that defining a dynamic way to name your resources which is also easy to use, seems to pose quite the challenge. This article won&amp;rsquo;t define the best way to get this but a way that seems to work for me and the customers I have worked with in the past.&lt;/p&gt;</description></item><item><title>Cyber Back to School</title><link>https://hybridbrothers.com/public-speaking/01-10-2024/</link><pubDate>Tue, 01 Oct 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/01-10-2024/</guid><description>&lt;p&gt;I spoke together with my colleague &lt;a href="https://www.linkedin.com/in/thijslecomte/?ref=hybridbrothers.com"&gt;Thijs Lecomte&lt;/a&gt; at Cyber back to School, where we recorded our session on how to architect a SOC on top of Microsoft Sentinel and Microsoft Defender XDR. You can find the video &lt;a href="https://youtu.be/h5XwFaDSQKk"&gt;here&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Azug @ Noest</title><link>https://hybridbrothers.com/public-speaking/26-09-2024/</link><pubDate>Thu, 26 Sep 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/26-09-2024/</guid><description>&lt;p&gt;At a recent community event, I presented a deep dive into various authentication flows in Entra Id, showcasing how to retrieve an ARC server from a resource group. During the session, I reverse-engineered four main flows, with one having 4 sub-flows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Authorization Code Flow&lt;/strong&gt;: Designed for user authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Client Credentials Flow&lt;/strong&gt;: Explored with certificate, secret, and federated credentials for service-to-service authentication.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Device Code Flow&lt;/strong&gt;: Highlighted for user interaction on devices with limited input capabilities.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Managed Identity Flow&lt;/strong&gt;: Demonstrated seamless authentication for services running on Azure without needing credentials. In this case I used an ARC-enrolled server.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://assets.hybridbrothers.com/images/public-speaking/26-09-2024/azug.pdf"&gt;You can download the session slides here.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Analyzing MDE Network Inspections</title><link>https://hybridbrothers.com/posts/analyzing-mde-network-inspections/</link><pubDate>Fri, 26 Jul 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/analyzing-mde-network-inspections/</guid><description>&lt;h2 id="microsoft-defender-for-endpoint-and-network-monitoring"&gt;Microsoft Defender for Endpoint and Network Monitoring&lt;/h2&gt;
&lt;p&gt;In November 2022, Microsoft announced they integrated the &lt;a href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/new-network-based-detections-and-improved-device-discovery-using/ba-p/3682111?ref=hybridbrothers.com"&gt;Zeek open-source network traffic analyzer in Microsoft Defender for Endpoint&lt;/a&gt;. This analyzer helps Defender for Endpoint in analyzing suspicious network traffic and detect network related attacks. In April 2023 they extended the support with Zeek by &lt;a href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enrich-your-advanced-hunting-experience-using-network-layer/ba-p/3794693?ref=hybridbrothers.com"&gt;including a couple of network signatures in Advanced Hunting&lt;/a&gt;. By doing this Microsoft allows security professionals to create threat-hunting and custom detection rules on top of the data Zeek is gathering.&lt;/p&gt;</description></item><item><title>T1556.009 - Detect and prevent suspicious conditional access policy modifications</title><link>https://hybridbrothers.com/posts/suspicious-conditional-access-modifications/</link><pubDate>Wed, 26 Jun 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/suspicious-conditional-access-modifications/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In April 2024, MITRE came with their new V15 version of ATT&amp;amp;CK. In this version a new sub-technique was introduced called &amp;lsquo;&lt;a href="https://attack.mitre.org/techniques/T1556/009/?ref=hybridbrothers.com"&gt;T1556.009 - Modify Authentication Process: Conditional Access Policies&lt;/a&gt;&amp;rsquo;. This was, in my opinion, a great addition to the framework, since it is an important technique which can be abused by adversaries. By changing a Conditional Access policy (later referred to as &amp;lsquo;CA policy&amp;rsquo;), an adversary can establish Credential Access, Defense Evasion, and Persistence in Entra ID. Since it is such a vital component, I thought it was time to do a bit of a deep dive into how we can detect and mitigate suspicious CA policy changes.&lt;/p&gt;</description></item><item><title>Authorization Code Flow</title><link>https://hybridbrothers.com/posts/authorization-code-flow/</link><pubDate>Sat, 22 Jun 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/authorization-code-flow/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In the past, I was always curious about the workings of Connect-AzAccount, the authentication command from the Az.Accounts PowerShell module. This led me to delve into debugging, and the subsequent article is a product of that exploration. It&amp;rsquo;s intriguing that both Az CLI and Az PowerShell are operational across all tenants, even the newly created ones. I aimed to emulate this functionality in PowerShell and utilize it in my scripts. For instance, this could be beneficial when executing commands across various tenants, a task that the Az modules are not adept at handling.&lt;/p&gt;</description></item><item><title>Experts Live Netherlands</title><link>https://hybridbrothers.com/public-speaking/04-06-2024/</link><pubDate>Tue, 04 Jun 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/04-06-2024/</guid><description>&lt;p&gt;I spoke together with my colleague &lt;a href="https://www.linkedin.com/in/thijslecomte/?ref=hybridbrothers.com"&gt;Thijs Lecomte&lt;/a&gt; at &lt;a href="https://www.expertslive.nl/?ref=hybridbrothers.com"&gt;Experts Live&lt;/a&gt;, where we talked about how we architecture a Security Operations Center on top of Defender XDR and Microsoft Sentinel. It was an amazing experience, and I definitely recommend going to the conference! If you missed the session, you can find the slide deck below.&lt;/p&gt;





&lt;div class="image-gallery" id="gallery-1774606259"&gt;
 &lt;div class="gallery-container"&gt;
 &lt;div class="gallery-images"&gt;
 
 
 &lt;div class="gallery-item active" data-index="0"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/04-06-2024/image-1.jpeg" alt="Selfie with Thijs and Louis" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Selfie with Thijs and Louis&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="1"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/04-06-2024/image-2.jpeg" alt="Badge and t-shirt" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Badge and t-shirt&lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-item " data-index="2"&gt;
 &lt;img src="https://assets.hybridbrothers.com/images/public-speaking/04-06-2024/image-3.jpeg" alt="Thijs and I giving our session" loading="lazy"&gt;
 
 &lt;div class="gallery-caption"&gt;Thijs and I giving our session&lt;/div&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
 
 
 &lt;div class="gallery-navigation"&gt;
 &lt;button class="gallery-prev" data-gallery="gallery-1774606259" aria-label="Previous image"&gt;‹&lt;/button&gt;
 &lt;button class="gallery-next" data-gallery="gallery-1774606259" aria-label="Next image"&gt;›&lt;/button&gt;
 &lt;/div&gt;
 
 &lt;div class="gallery-dots"&gt;
 
 &lt;button class="gallery-dot active" data-gallery="gallery-1774606259" data-index="0" aria-label="Go to image 1"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="1" aria-label="Go to image 2"&gt;&lt;/button&gt;
 
 &lt;button class="gallery-dot " data-gallery="gallery-1774606259" data-index="2" aria-label="Go to image 3"&gt;&lt;/button&gt;
 
 &lt;/div&gt;
 
 &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;a href="https://assets.hybridbrothers.com/images/public-speaking/04-06-2024/experts-live.pdf"&gt;You can download the session slides here.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Resolving MDI NNR issues</title><link>https://hybridbrothers.com/posts/mdi-nnr-health/</link><pubDate>Sat, 27 Apr 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/mdi-nnr-health/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Defender for Identity is a very important sensor to detect threats in an Active Directory environment. Therefore, it is important to make sure the sensors are performing well, and no health issues are being reported. When a sensor is in an unhealthy state, detections can be missed, or False Positives can lead to alert fatigue on the SOC.&lt;/p&gt;
&lt;p&gt;In this blogpost, I wanted to talk about one of the important features of Defender for Identity, which in practice has a lot of dependencies for it to work properly. We will go over these dependencies, how you can spot unhealthy scenarios, and how you can identify possible pain points.&lt;/p&gt;</description></item><item><title>Get control over corporate networks with device discovery</title><link>https://hybridbrothers.com/posts/get-control-over-corporate-networks-with-device-discovery/</link><pubDate>Sun, 14 Apr 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/get-control-over-corporate-networks-with-device-discovery/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;During the last few years, I worked with a couple of customers who struggle with getting control over their corporate networks. Even though we all know corporate networks should be managed well with all the correct security controls like segmentation, Network Access Control implementations, and zero-trust designs, a lot of organizations keep struggling with knowing what devices are present on legacy network segments.&lt;/p&gt;
&lt;p&gt;There are a couple of great network scanning and documentation solutions out there that can help organizations in getting insights into their networks. Although these dedicated network scanning solutions have many more features than what we are going to discuss in this post, I hope to inspire people you do not always need an expensive fancy network scanning solution to know what exists on your network. In this post I want to show you how we can get better network insights with just a couple of MDE onboarded devices with Device Discovery enabled, a sentinel workbook, and a list of your network segments described in a watchlist. Using this, I am confident you will have better insights into your network compared to what Device Discovery provides out of the box.&lt;/p&gt;</description></item><item><title>Using WDAC to ingest missing MDE events and detect token stealing</title><link>https://hybridbrothers.com/posts/using-wdac-to-ingest-missing-mde-events/</link><pubDate>Fri, 01 Mar 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/using-wdac-to-ingest-missing-mde-events/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In &lt;a href="https://hybridbrothers.com/posts/device-to-entraid/"&gt;a previous blog post&lt;/a&gt; I talked about how adversaries can exploit SSO capabilities of Hybrid or fully Entra ID joined devices. I mentioned the different ways we can steal tokens from the devices, either by using BrowserCore.exe or MicrosoftAccountTokenProvider.dll.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://assets.hybridbrothers.com/images/posts/using-wdac-to-ingest-missing-mde-events/image-1.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;Here I concluded that exploiting BrowserCore.exe to steal the PRT token can be detected via two different ways, but that we &lt;strong&gt;lack data in the DeviceImageLoad event of MDE to detect exploitation of MicrosoftAccountTokenProvider.dll because of the heavy filtering of these events&lt;/strong&gt;. In this blog post I want to talk about how &lt;strong&gt;WDAC policies can actually help us solve this problem&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>AitM detection with Sentinel via custom CSS</title><link>https://hybridbrothers.com/posts/aitm-detection-via-css/</link><pubDate>Thu, 01 Feb 2024 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/aitm-detection-via-css/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;You are probably wondering, what has CSS to do with detecting AitM sites. In this blog post, we will go over how we can use a custom CSS template in Microsoft Entra ID Company Branding, to trigger a logic that detects when a user visited a Microsoft login page via an AitM site. The idea of this detection was not initially my idea, so the credit for it goes to the projects I will refer to throughout the blog. I re-used the logic of these projects to build a Logic App that creates Microsoft Sentinel incidents when a suspected AitM connection is detected.&lt;/p&gt;</description></item><item><title>From hybrid / fully joined devices to Entra ID</title><link>https://hybridbrothers.com/posts/device-to-entraid/</link><pubDate>Thu, 21 Dec 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/device-to-entraid/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Adversaries are more and more interested in the data and infrastructure that lives in Cloud environments like Azure and Microsoft 365 solutions. Since Microsoft EntraID is the most common central IDP solution for these environments, it is important to identify the possible paths attackers can use to move from a device to possible crown jewels that live in these Cloud solutions.&lt;/p&gt;
&lt;p&gt;In this blog post, I wanted to talk about how adversaries can use Entra ID Joined or Hybrid Joined devices to move laterally to the cloud, using EntraID SSO features, and how they can get a foothold on these devices. This blog post is based on a Red-Teaming scenario I encountered in a real-life, and is written from a Blue-Teaming perspective.&lt;/p&gt;</description></item><item><title>Belgium Microsoft Cloud &amp; Security Community</title><link>https://hybridbrothers.com/public-speaking/30-11-2023/</link><pubDate>Thu, 30 Nov 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/30-11-2023/</guid><description>&lt;p&gt;&amp;ldquo;If you know the enemy and know yourself, you do not need to fear the result of a hundred battles.&amp;rdquo; ~ Sun Tzu ⚔&lt;/p&gt;
&lt;p&gt;I spoke at the Belgian Microsoft Cloud &amp;amp; Security Community on the 30th of November, hosted at &lt;a href="https://www.linkedin.com/company/thecollective-eu/?ref=hybridbrothers.com"&gt;The Collective Consulting&lt;/a&gt;. I talked about how we can leverage various MITRE toolsets in combination with the Microsoft Security stack, so we can arm us with vital knowledge about ourselves and our enemies.&lt;/p&gt;</description></item><item><title>Microsoft Sentinel User Forum</title><link>https://hybridbrothers.com/public-speaking/26-10-2023/</link><pubDate>Thu, 26 Oct 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/26-10-2023/</guid><description>&lt;p&gt;Together with my colleague &lt;a href="https://www.linkedin.com/in/louis-mastelinck-99144ab3/?ref=hybridbrothers.com"&gt;Louis Mastelinck&lt;/a&gt;, we talked on the Microsoft Sentinel user forum about Microsoft Sentinel data ingestion and avoiding alert fatigue. If you missed out on the session, you can find the slide deck below.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://assets.hybridbrothers.com/images/public-speaking/26-10-2023/sentinel-user-forum.pdf"&gt;You can download the session slides here.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Using Managed Identities in Logic App HTTP triggers</title><link>https://hybridbrothers.com/posts/using-managed-identities-in-logic-app-http-triggers/</link><pubDate>Thu, 03 Aug 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/using-managed-identities-in-logic-app-http-triggers/</guid><description>&lt;link rel="stylesheet" href="https://hybridbrothers.com/css/vendors/admonitions.4fd9a0b8ec8899f2ca952048d255a569f433f77dfb3f52f5bc87e7d65cdce449.css" integrity="sha256-T9mguOyImfLKlSBI0lWlafQz9337P1L1vIfn1lzc5Ek=" crossorigin="anonymous"&gt;
 &lt;div class="admonition warning"&gt;
 &lt;div class="admonition-header"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"&gt;&lt;path d="M256 32c14.2 0 27.3 7.5 34.5 19.8l216 368c7.3 12.4 7.3 27.7 .2 40.1S486.3 480 472 480L40 480c-14.3 0-27.6-7.7-34.7-20.1s-7-27.8 .2-40.1l216-368C228.7 39.5 241.8 32 256 32zm0 128c-13.3 0-24 10.7-24 24l0 112c0 13.3 10.7 24 24 24s24-10.7 24-24l0-112c0-13.3-10.7-24-24-24zm32 224a32 32 0 1 0 -64 0 32 32 0 1 0 64 0z"/&gt;&lt;/svg&gt;
 &lt;span&gt;Warning&lt;/span&gt;
 &lt;/div&gt;
 &lt;div class="admonition-content"&gt;
 &lt;p&gt;We &amp;lsquo;archived&amp;rsquo; this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more than 2 years old and might not contain the latest information. This means we did not migrate this blogpost to the new site, but you can still find a PDF version of this blogpost below.&lt;/p&gt;</description></item><item><title>MC2MC</title><link>https://hybridbrothers.com/public-speaking/22-06-2023/</link><pubDate>Thu, 22 Jun 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/public-speaking/22-06-2023/</guid><description>&lt;p&gt;My first public speaking experience! I spoke together with my colleague &lt;a href="https://www.linkedin.com/in/sander-bougrine-370a40134/?ref=hybridbrothers.com"&gt;Sander Bougrine&lt;/a&gt; on MC2MC, where we deep dived into how to integrate 3th part data connectors with Microsoft Sentinel.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://assets.hybridbrothers.com/images/public-speaking/22-06-2023/sentinel-s-got-game.pdf"&gt;You can download the session slides here.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Demystifying Data Collection Rules and Transformations</title><link>https://hybridbrothers.com/posts/demystifying-data-collection-rules-and-transformations/</link><pubDate>Sun, 21 May 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/demystifying-data-collection-rules-and-transformations/</guid><description>&lt;link rel="stylesheet" href="https://hybridbrothers.com/css/vendors/admonitions.4fd9a0b8ec8899f2ca952048d255a569f433f77dfb3f52f5bc87e7d65cdce449.css" integrity="sha256-T9mguOyImfLKlSBI0lWlafQz9337P1L1vIfn1lzc5Ek=" crossorigin="anonymous"&gt;
 &lt;div class="admonition warning"&gt;
 &lt;div class="admonition-header"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"&gt;&lt;path d="M256 32c14.2 0 27.3 7.5 34.5 19.8l216 368c7.3 12.4 7.3 27.7 .2 40.1S486.3 480 472 480L40 480c-14.3 0-27.6-7.7-34.7-20.1s-7-27.8 .2-40.1l216-368C228.7 39.5 241.8 32 256 32zm0 128c-13.3 0-24 10.7-24 24l0 112c0 13.3 10.7 24 24 24s24-10.7 24-24l0-112c0-13.3-10.7-24-24-24zm32 224a32 32 0 1 0 -64 0 32 32 0 1 0 64 0z"/&gt;&lt;/svg&gt;
 &lt;span&gt;Warning&lt;/span&gt;
 &lt;/div&gt;
 &lt;div class="admonition-content"&gt;
 &lt;p&gt;We &amp;lsquo;archived&amp;rsquo; this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more than 2 years old and might not contain the latest information. This means we did not migrate this blogpost to the new site, but you can still find a PDF version of this blogpost below.&lt;/p&gt;</description></item><item><title>Mapping MDE and Windows Security Events overlap</title><link>https://hybridbrothers.com/posts/mapping-mde-and-windows-security-events-overlap/</link><pubDate>Sat, 25 Mar 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/mapping-mde-and-windows-security-events-overlap/</guid><description>&lt;link rel="stylesheet" href="https://hybridbrothers.com/css/vendors/admonitions.4fd9a0b8ec8899f2ca952048d255a569f433f77dfb3f52f5bc87e7d65cdce449.css" integrity="sha256-T9mguOyImfLKlSBI0lWlafQz9337P1L1vIfn1lzc5Ek=" crossorigin="anonymous"&gt;
 &lt;div class="admonition warning"&gt;
 &lt;div class="admonition-header"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"&gt;&lt;path d="M256 32c14.2 0 27.3 7.5 34.5 19.8l216 368c7.3 12.4 7.3 27.7 .2 40.1S486.3 480 472 480L40 480c-14.3 0-27.6-7.7-34.7-20.1s-7-27.8 .2-40.1l216-368C228.7 39.5 241.8 32 256 32zm0 128c-13.3 0-24 10.7-24 24l0 112c0 13.3 10.7 24 24 24s24-10.7 24-24l0-112c0-13.3-10.7-24-24-24zm32 224a32 32 0 1 0 -64 0 32 32 0 1 0 64 0z"/&gt;&lt;/svg&gt;
 &lt;span&gt;Warning&lt;/span&gt;
 &lt;/div&gt;
 &lt;div class="admonition-content"&gt;
 &lt;p&gt;We &amp;lsquo;archived&amp;rsquo; this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more than 2 years old and might not contain the latest information. This means we did not migrate this blogpost to the new site, but you can still find a PDF version of this blogpost below.&lt;/p&gt;</description></item><item><title>Deploy sentinel analytic rules with bicep and PowerShell</title><link>https://hybridbrothers.com/posts/sentinel-using-bicep-and-powershell/</link><pubDate>Thu, 09 Feb 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/sentinel-using-bicep-and-powershell/</guid><description>&lt;link rel="stylesheet" href="https://hybridbrothers.com/css/vendors/admonitions.4fd9a0b8ec8899f2ca952048d255a569f433f77dfb3f52f5bc87e7d65cdce449.css" integrity="sha256-T9mguOyImfLKlSBI0lWlafQz9337P1L1vIfn1lzc5Ek=" crossorigin="anonymous"&gt;
 &lt;div class="admonition warning"&gt;
 &lt;div class="admonition-header"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"&gt;&lt;path d="M256 32c14.2 0 27.3 7.5 34.5 19.8l216 368c7.3 12.4 7.3 27.7 .2 40.1S486.3 480 472 480L40 480c-14.3 0-27.6-7.7-34.7-20.1s-7-27.8 .2-40.1l216-368C228.7 39.5 241.8 32 256 32zm0 128c-13.3 0-24 10.7-24 24l0 112c0 13.3 10.7 24 24 24s24-10.7 24-24l0-112c0-13.3-10.7-24-24-24zm32 224a32 32 0 1 0 -64 0 32 32 0 1 0 64 0z"/&gt;&lt;/svg&gt;
 &lt;span&gt;Warning&lt;/span&gt;
 &lt;/div&gt;
 &lt;div class="admonition-content"&gt;
 &lt;p&gt;We &amp;lsquo;archived&amp;rsquo; this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more than 2 years old and might not contain the latest information. This means we did not migrate this blogpost to the new site, but you can still find a PDF version of this blogpost below.&lt;/p&gt;</description></item><item><title>Ghost blogging on Azure Container Apps</title><link>https://hybridbrothers.com/posts/ghost-blogging-on-azure-container-apps/</link><pubDate>Sun, 29 Jan 2023 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/ghost-blogging-on-azure-container-apps/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Hosting a blog these days can easily be done without having to cost anything. There are a lot of solutions in the likes of Medium, Weebly, Wix,&amp;hellip; But for the more technology-minded people like us, who want to go the extra mile, we didn&amp;rsquo;t go for the easiest solution. We chose to run our blog on Azure Container Apps using the Ghost blogging platform.&lt;/p&gt;
&lt;p&gt;In this post, I&amp;rsquo;ll go deeper into how the site is hosted as well as how the deployment is done at this moment, which is not yet automated.&lt;/p&gt;</description></item><item><title>Operationalizing MITRE ATT&amp;CK to support Microsoft Sentinel deployments and detections</title><link>https://hybridbrothers.com/posts/operationalizing-mitre-att-ck-to-support-microsoft-sentinel-deployments-and-detections/</link><pubDate>Tue, 22 Nov 2022 00:00:00 +0000</pubDate><guid>https://hybridbrothers.com/posts/operationalizing-mitre-att-ck-to-support-microsoft-sentinel-deployments-and-detections/</guid><description>&lt;link rel="stylesheet" href="https://hybridbrothers.com/css/vendors/admonitions.4fd9a0b8ec8899f2ca952048d255a569f433f77dfb3f52f5bc87e7d65cdce449.css" integrity="sha256-T9mguOyImfLKlSBI0lWlafQz9337P1L1vIfn1lzc5Ek=" crossorigin="anonymous"&gt;
 &lt;div class="admonition warning"&gt;
 &lt;div class="admonition-header"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"&gt;&lt;path d="M256 32c14.2 0 27.3 7.5 34.5 19.8l216 368c7.3 12.4 7.3 27.7 .2 40.1S486.3 480 472 480L40 480c-14.3 0-27.6-7.7-34.7-20.1s-7-27.8 .2-40.1l216-368C228.7 39.5 241.8 32 256 32zm0 128c-13.3 0-24 10.7-24 24l0 112c0 13.3 10.7 24 24 24s24-10.7 24-24l0-112c0-13.3-10.7-24-24-24zm32 224a32 32 0 1 0 -64 0 32 32 0 1 0 64 0z"/&gt;&lt;/svg&gt;
 &lt;span&gt;Warning&lt;/span&gt;
 &lt;/div&gt;
 &lt;div class="admonition-content"&gt;
 &lt;p&gt;We &amp;lsquo;archived&amp;rsquo; this blogpost during a migration from the old HybridBrothers website framework to the new one, since it is more than 2 years old and might not contain the latest information. This means we did not migrate this blogpost to the new site, but you can still find a PDF version of this blogpost below.&lt;/p&gt;</description></item></channel></rss>