Disable Legacy Authentication Part 2
In part one we created a log analytics workspace and used a workbook to identify legacy authentication. In this part we will […]
This website uses cookies. By continuing to use this site, you accept our use of cookies.