MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack methods. In this video, I wanted to cover the evolution of MFA and highlight how different types of MFA can still leave your users exposed. This includes common attack methods and how to overcome them with authentication strengths in the Entra portal.
🚀 What You'll Learn:
Real-Life Applications: See firsthand what attack methods bad actors use to exploit different forms of MFA. See the end-user experience for configuring Passkeys.
💡 Why Watch?
Identify if your customers are exposed with weaker forms of MFA and make a game plane to upgrade them into methods that are phishing resistant.
👍 Engage with Me:
Loved this tutorial? Hit 'Like', subscribe, and share this video with colleagues who could benefit from my content. Have questions or your own tips to share? Drop a comment below - I'd love to hear how you're securing personal devices.
Blog: https://tminus365.com/the-strongest-f...
Intro Music- Jordyn Edmonds • Love That
Table of Contents:
00:00 -Intro
01:09 -Passwords
06:16 -OTP/TOTP
10:46 -Authenticator + Number Matching
12:30 -Man-in-the-middle Attacks
15:50 -Passkeys
27:40 -Pass the Cookie Attack
33:15 -Configuring Passkeys
36:15 -End-User Temporary Access Pass
38:46 -Security Key registration
40:35 -Windows Hello
41:29 -Pass the cookie demo
45:25 -Passkeys with Authenticator
____________________
Give this video a thumbs up if you enjoyed watching 👍
#microsoft #passkeys #entraID #microsoftsecurity #mfa #identityprotection
Thanks for watching the video The strongest form of MFA? | Why your MFA may need an upgrade
Watch video The strongest form of MFA? | Why your MFA may need an upgrade online without registration, duration hours minute second in high quality. This video was added by user T-Minus365 27 May 2024, don't forget to share it with your friends and acquaintances, it has been viewed on our site 3,29 once and liked it 11 people.