10. Persistence Techniques

Various techniques that threat actors can leverage for persistence in an Azure/M365 environment