Skip to content

Instantly share code, notes, and snippets.

View jangeisbauer's full-sized avatar
🏠
Working from home

Jan Geisbauer jangeisbauer

🏠
Working from home
View GitHub Profile
Key,Value
dc890d15-9560-4a4c-9b7f-a736ec74ec40,full_access_as_app
73a45059-f39c-4baf-9182-4954ac0e55cf,TeamsAppInstallation.ReadWriteSelfForChat.All
59a6b24b-4225-4393-8165-ebaec5f55d7a,Channel.ReadBasic.All
a25ca244-bc95-4be7-bd58-ca9325bd24b2,AzureContainerRegistryRP
7b2ebf90-d836-437f-b90d-7b62722c4456,Schedule.Read.All
c7283fbe-34b8-4134-a6b4-771e6a87a497,
efe4d732-bfbb-4617-8a77-349a9d67c720,app_impersonation
66a874a2-b739-43fa-8e1a-176cd8290cf5,Collection.Read.All
9125c627-3755-4ad3-8742-4d6b193c4fc2,filteredhierarchy.read.all
Block Adobe Reader from creating child processes,7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c,https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-adobe-reader-from-creating-child-processes
Block all Office applications from creating child processes,D4F940AB-401B-4EFC-AADC-AD5F3C50688A,https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-all-office-applications-from-creating-child-processes
Block credential stealing from the Windows local security authority subsystem (lsass.exe),9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2,https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-credential-stealing-from-the-windows-local-security-authority-subsystem
Block executable content from email client and webmail,BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550,https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-