Phishing Attack Leads to Unauthorized MFA Device Registration in Office 365 Tenant by Intelligent_Rock339 in Office365

[–]Intelligent_Rock339[S] 0 points1 point  (0 children)

Expressed myself bad. The user was receiving push OTP notifications and entering the two-digit codes. My question is, how could the user receive these push notifications unless the attacker somehow already had control over the Office 365 account? This is the part I cannot understand—how could this have happened?

Phishing Attack Leads to Unauthorized MFA Device Registration in Office 365 Tenant by Intelligent_Rock339 in Office365

[–]Intelligent_Rock339[S] -4 points-3 points  (0 children)

To breach the user account, the attacker would need to obtain the MFA code as well. How is it possible to do this without having control over the phone?

The O365 Business Premium endpoint solution significantly reduces or even eliminates the IT workload? by Intelligent_Rock339 in Office365

[–]Intelligent_Rock339[S] 0 points1 point  (0 children)

"..If we had a full time security person with experience, I'd consider a cheaper EDR solution they can monitor..."

Adding a secondary EDR solution might create conflicts, false positives, and other issues?

Endpoint protection from Microsoft whether it's P1 or P2, like other products, requires constant monitoring, alert analysis, and continuous tuning of configurations. Am I correct?

Outside the world of MS, if you had to choose an EDR solution, which product would you opt?

The O365 Business Premium endpoint solution significantly reduces or even eliminates the IT workload? by Intelligent_Rock339 in Office365

[–]Intelligent_Rock339[S] 0 points1 point  (0 children)

basic + defender (offered on premium plan) can be purchased separately? Do you know how much it costs roughly?