Thomas Naunheim's Avatar

Thomas Naunheim

@naunheim.cloud

#Microsoft MVP | #CloudSecurity Architect ☁️ | #Entra #AzureAD πŸ”‘ + #AzureSecurity πŸ›‘οΈ | #CommunityRocks | #Schaengel

841
Followers
191
Following
53
Posts
09.11.2024
Joined
Posts Following

Latest posts by Thomas Naunheim @naunheim.cloud

Preview
Analyzing Workload Identity Activity Through Token-Based Hunting This post introduces the MicrosoftCloudWorkloadActivity KQL function and shows how to hunt token-based activity of workload identities across Microsoft cloud workloads. It covers key parameters, filte...

[New blog post] Analyzing #MicrosoftEntra πŸ€– Workload Identity Activity Through πŸͺ™ Token-Based Hunting: I’ve published a #KQL function to hunt activities by tokens from non-human identities and share some experimental queries and insights in this article.
www.cloud-architekt.net/token-huntin...

31.01.2026 16:00 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

#ConsentFix is a great way for attackers to work around some protective layers but not all. @naunheim.cloud , @cbrhh.bsky.social and I wrote a blog post on detection and mitigations. Hope you find it useful and can adapt it to your environment.

www.glueckkanja.com/de/posts/202...

02.01.2026 19:52 πŸ‘ 8 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Had the great privilege and a lot of fun joining πŸŽ™οΈ#EntraChat together with my friend and MVP fellow @samilamppu.bsky.social!

πŸ™ Big thanks to @merill.net for having us - it was a pleasure to be part of the podcast. I hope everyone listening enjoyed it as much as we did recording it!

02.11.2025 10:15 πŸ‘ 5 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

3️⃣ πŸ› οΈ Enhanced Enrichment Function
Recently, I've released a #KQL function integrating #ExposureManagement and #EntraOps data to identify sensitive callers, actions, and targets. Updated to support parameters like IP Address and Token Identifier.
πŸ”— github.com/Cloud-Archit...

30.07.2025 06:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

2️⃣ πŸ” Normalized schema for shared queries
Want to reuse existing queries or unify detection logic across both tables? I’ve published a #KQL function that normalizes the schema of GraphApiAuditEvents to match that of MicrosoftGraphActivityLogs.
πŸ”— github.com/Cloud-Archit...

30.07.2025 06:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

1️⃣ πŸ€” Comparison Deep Dive
What are the differences between GraphApiAuditEvents (XDR) and MicrosoftGraphActivityLogs (Diagnostic Logs in hashtag#MicrosoftSentinel)? I’ve built a comparison table outlining the differences in column availability and detail levels.

30.07.2025 06:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The availability of GraphApiAuditEvents in #MicrosoftDefender brings significant value to every environment, enhancing capabilities for detecting and hunting #MicrosoftGraph API calls. In my recent research, I’ve created a few resources that I’m happy to share with the community.

30.07.2025 06:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

4. IsSensitiveTarget 🎯
The modified object is classified as critical (based on Exposure Management Critical Assets), and the applied rule details are displayed. In this case, the service principal has been assigned critical app permissions in Exchange Online.

17.07.2025 06:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

3. IsSensitiveAction ▢️
The Graph request includes a POST to the servicePrincipal endpoint, which is flagged as a sensitive modification. This logic is experimental and simplified, so it may result in inaccurate classification and should be used in combo with others indicators.

17.07.2025 06:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

2. IsHighSensitiveScope πŸ”‘
However, the scope includes Application.ReadWrite.All, which has been identified as "Control Plane" by using EntraOps classification model.

17.07.2025 06:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

In the following example, several indicators are included that make this particular call interesting for further investigation:

1. IsSensitiveCaller πŸ—£οΈ
A regular enterprise user (based on Exposure Management Critical Asset information) is calling Graph.

17.07.2025 06:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

I've created an experimental KQL function that enriches the data with details from #ExposureManagement and #EntraOps. This might help identify sensitive Graph Calls from the large volume of events in this table.
πŸ”— The query is available here:
github.com/Cloud-Archit...

17.07.2025 06:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

πŸš€πŸ”Ž Track Sensitive Graph API Calls with my new #KQL Function for #MicrosoftDefenderXDR

Microsoft has released the new advanced hunting table "GraphAPIAuditEvents" which offers great opportunities to investigate activities based on #MicrosoftGraph API calls.

17.07.2025 06:43 πŸ‘ 3 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Defending Tier 0: Taking Control of Your Cloud's Control Plane
Defending Tier 0: Taking Control of Your Cloud's Control Plane YouTube video by Semperis

My session, β€œDefending Tier 0: Taking Control of Your Cloud’s Control Plane,” from last year’s #HIPConf is now available on YouTube. The session focused on securing privileged access and implementing a tiered administration model in #MicrosoftEntra.
youtu.be/pVPEieHtOVM

17.05.2025 07:48 πŸ‘ 5 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image Post image Post image

I have integrated the classification model of #EntraOps to identify sensitive roles in #MicrosoftEntra, #MicrosoftGraph, and #AzureRBAC. This function offers a holistic view and report on SPs including details such as ownership and assigned Azure Roles (enriched by CSPM data). (2/2)

09.04.2025 11:51 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

I've published a #KQL function ("WorkloadIdentityInfoXDR") for #MicrosoftDefender to enhance details of #MicrosoftEntra #WorkloadID from various sources, incl. the new table "OAuthAppInfo" but also IdentityInfo table and #ExposureManagement. (1/2)
πŸ”— github.com/Cloud-Archit...

09.04.2025 11:51 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Post image

Cloud #IdentitySummit 2025 is back!
Save the date and join this community event with #IdentitySecurity, #MicrosoftEntra, and #CloudIdentity deep dive sessions in Dortmund, Germany.

Call for Papers is open now:
sessionize.com/cloud-identi...

Stay tuned for more details:
www.identitysummit.cloud

08.04.2025 05:23 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
EntraOps Privileged EAM Community project to classify, identify and protect your privileges based on Enterprise Access Model (EAM)

Check out my community tool #EntraOps if you are interested to get a customized and detailed analysis of all permanent and PIM-managed role assignments in #EntraID, #Intune and #IdentityGovernance: www.cloud-architekt.net/entraops/

17.03.2025 06:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

There are some current limitations on this preview (for example, custom or scoped roles are not covered, data seems to be available in MDI tenants only). However, the new column offers some great capabilities at no additional implementation efforts.

17.03.2025 06:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

-🚨 Discovering alerts of privileged users with active or assigned roles, along with details on related roles and their highest access tier classification.

- πŸ•“ Determine which eligible or active roles were assigned at a specific time, and compare them to their current status

17.03.2025 06:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

This enables powerful hunting queries, such as:

-⚑️ Identifying assigned roles that include specific actions (e.g., reading BitLocker keys).

- πŸ¦Έβ€β™‚οΈ Listing all eligible assignments for Control Plane (Tier0) roles, including Microsoft role categories and assignment types (direct or indirect).

17.03.2025 06:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image Post image Post image Post image

IdentityInfo table in #MicrosoftDefender has been expanded to include eligible roles from #MicrosoftEntra. I’ve developed a #KQL function to get a summarized overview of all directory role assignments, enriched with details from my #EntraOps classification:
github.com/Cloud-Archit...

17.03.2025 06:12 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Thank you to everyone who joined my session in Amsterdam or via livestream! Huge thanks to the Yellowhat organizers for this incredible conference and for having me. I had an awesome time and can’t wait to see you all soon…

08.03.2025 09:31 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

I had the great pleasure of speaking about #MicrosoftEntra Token Hunting πŸͺπŸ”Ž at #YellowHat πŸš§πŸ‘·β€β™‚οΈ. You can find the slides from my session here:
πŸ“„ github.com/Cloud-Archit...
All #KQL sample queries are available in my repo:
πŸ‘¨β€πŸ’» github.com/Cloud-Archit...

08.03.2025 09:31 πŸ‘ 8 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

I have the great pleasure of joining a shared session with @samilamppu.bsky.social at the M365 Security & Compliance User Group tonight. Last preparations are now in full swing... You can find more details about the meetup and register for this free online event here:
www.meetup.com/m365sandcug/...

26.02.2025 12:51 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Yellowhat Yellowhat is a cutting-edge cybersecurity event dedicated to Microsoft Security Technology, offering advanced deep-dive sessions (level 400+) for seasoned professionals. It brings together experts and...

Interested to learn more? I'll be talking about token hunting at #Yellowhat and covering how to leverage these new sign-in details. More details about this free community event can be found here: yellowhat.live (3/3)

11.02.2025 17:31 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Azure Monitor Logs reference - SigninLogs - Azure Monitor Reference for SigninLogs table in Azure Monitor Logs.

Previously, these details were only available in XDR Hunting table "AADSignInEventsBeta", Portal and/or Graph API. These added properties offer the opportunity to write new analytics rules and hunting queries, for example in the area of #TokenTheft. (2/3)
learn.microsoft.com/en-us/azure/...

11.02.2025 17:31 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Enhancements in #MicrosoftEntra (diagnostic) logs: Several interesting sign-in properties (including Session ID, status for Token Protection, or GSA traffic) have been added to the sign-in logs and available in #MicrosoftSentinel. (1/3)

11.02.2025 17:31 πŸ‘ 3 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

I'm building a new home for IntuneBrew and would like to share my progress so far.

IntuneBrew.com will serve as the project's landing page, featuring a Quick Start Guide and an overview of key features.

29.01.2025 16:37 πŸ‘ 11 πŸ” 4 πŸ’¬ 2 πŸ“Œ 0
LinkedIn This link will take you to a page that’s not on LinkedIn

EntraOps repository:
github.com/Cloud-Archit...

Learn more about XSPM and Graph:
Deep Dive blog post on XSPM by @samilamppu.bsky.social
samilamppu.com/2024/04/25/m...

Blog posts by @fabian.bader.cloud
cloudbrothers.info/en/workshop-...
cloudbrothers.info/en/find-late...

Kusto Graph rocks! (3/3)

29.01.2025 06:47 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0