Skip to main content
Jerrad Dahlager
Jerrad Dahlager, CISSP, CCSP Cloud Security Architect Β· Adjunct Instructor
About me β†’

Scan Every Blob, Trace Every Read: Defender for Storage + Sentinel

Featured image for Blog

Storage is where malware waits. A blob uploaded to ingest/ by a pipeline step, a partner’s SFTP connector, or a misconfigured Logic App sits quietly until something downstream opens it β€” a Data Factory copy, a Function app, a Synapse notebook, a …

Detecting Infostealer Session Hijacking with Microsoft Sentinel

Featured image for Blog

Nearly 70% of incidents in the Americas now begin with stolen or misused accounts. Infostealers are the engine behind that number – families like Lumma, RedLine, and Vidar export browser cookies and session tokens directly from the victim’s machine, …

Investigate Hidden Privilege Paths with Microsoft Sentinel Data Federation and Custom Graphs

Featured image for Blog

After a compromised service principal incident, the first triage question is always the same: β€œWhat else can this identity reach?” The answer usually lives outside Sentinel, buried in entitlement exports, RBAC snapshots, or asset inventories that …

Block Prompt Injection at the Network Layer with Entra Prompt Shield

Featured image for Blog

A while back I built an LLM Firewall with AWS Lambda, a proxy that sits between users and the model to catch prompt injection. It worked, but it meant writing custom code for every app and having zero visibility into AI services I didn’t own. That’s …

Building Custom Sentinel Connectors in One Click with CCF Push

Featured image for Blog

Getting custom data into Microsoft Sentinel has traditionally required a lot of moving parts. You need a Data Collection Endpoint, a Data Collection Rule, an Entra app registration with a client secret, RBAC role assignments, a custom table …

AKS Runtime Security: Binary Drift, Anti-Malware & Gated Deployment with Defender for Cloud

Featured image for Blog

In December, I published a post on securing the container supply chain β€” SBOM generation, image signing, and build provenance with GitHub Actions. That covered build-time security: making sure the image you ship is the image you built. But what …

Detecting OAuth Redirect Abuse with Microsoft Sentinel and Entra ID

Featured image for Blog

On March 2, 2026, Microsoft published an advisory on OAuth redirection abuse enabling phishing and malware delivery. Microsoft described phishing-led campaigns where attackers register OAuth apps with attacker-controlled redirect URIs, then send …

The February 2026 Microsoft Sentinel Drop: UEBA Essentials, Copilot Connector, and 9 New GA Connectors

Featured image for Blog

February 2026 brought one of the more substantial Sentinel drops in recent memory. UEBA Essentials hit v3.0.6 with a refined workbook and more than 30 hunting queries (including multi-cloud detections shipped in earlier releases), the M365 Copilot …

March 2026 Entra ID Changes: Passkey Auto-Enablement and Conditional Access Enforcement

Featured image for Blog

Microsoft is shipping two Entra ID changes in March 2026 that will change how your users authenticate. Neither change requires administrator action to take effect, and that is precisely the risk. If you do not act before the deadlines, Microsoft …

Just-In-Time Access for AI Agents: Building a ZSP Gateway in Azure

Featured image for Blog

AI coding assistants need Contributor access to deploy infrastructure. Backup automation needs Key Vault secrets at 2 AM. Security scanners need Reader access on a schedule. The easy answer is standing permissions-give each service principal what it …

Keyboard Shortcuts

Navigation
Ctrl + K Open search / command palette
? Show this help
ESC Close dialogs
Actions
G then H Go to Home
G then B Go to Blog
G then A Go to About
G then C Go to Contact
G then T Go to Threat Feeds
G then G Go to Glossary
Shift + C Copy page URL
Easter Eggs
↑↑↓↓←→←→BA Konami code
Click cat 9Γ— Nine lives activation
Click logo 9Γ— Cat Burglar mode