<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=592417851957511&amp;ev=PageView&amp;noscript=1">

Infinite Blog.

Josh Lucas

Passionate Security Engineer with demonstrated experience in computer and networks security and an emphasis on cloud architecture. Skilled with numerous technologies including the Microsoft 365 suite, Microsoft Azure, Palo Alto Next-Generation Firewalls and various EDR/SIEM products.
Find me on:

Recent Posts

Automating Vulnerability reports with Microsoft Defender – Part 2

In Part 1 of this series we brainstormed an idea for an app that would generate automated vulnerability reports using the Microsoft Defender for Endpoint API and email those recommendations directly to our end-users. We created an app registration in Azure AD, granted it the appropriate permissions to query the various Microsoft APIs, and finally scoped those application permissions so that our app could only send mail on behalf of a specific shared mailbox. With all of that supporting infrastructure sorted we can finally get started writing the script - but to do that we need to understand the OAuth 2.0 client credentials flow.

Automating Vulnerability reports with Microsoft Defender – Part 1