Fabian Bader<p>Great writeup that demonstrates that Intune is really powerful and you should not manage your PAW devices from the same environment they manage.</p><p><a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Intune" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intune</span></a> <a href="https://infosec.exchange/tags/ControlPlane" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ControlPlane</span></a> <a href="https://infosec.exchange/tags/RedTenant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTenant</span></a></p><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/abusing-intune-permissions-entra-id-environments" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cloud.google.com/blog/topics/t</span><span class="invisible">hreat-intelligence/abusing-intune-permissions-entra-id-environments</span></a></p>