The saying “You don’t know what you can’t see” is essential; ask yourself, “How can you protect systems if you do not have a firm grasp of what your network looks like|? Having a vulnerability tool is an excellent first ...
Impact The ADFS replication service can be abused to steal the token signing cert as the service is not encrypted and does not require authentication to access. Solution (for single ADFS server) Apply a firewall rule so that inbound tcp/80 ...