Technical requirements
To follow this chapter's instructions, you will need a Microsoft 365 subscription and devices that are managed by Intune. We have included links to the official repositories for the pentesting tools that we will be using for demonstration purposes as appropriate. You will need the following licensing or an equivalent SKU to deploy policies with Intune:
- Microsoft 365 E3 and/or E5
- Windows 10/11 Pro or Enterprise
Let's start by learning about Adversary-in-the-Middle attacks.