A LinkedIn post from Guardz highlights security risks tied to over-permissioned service principals in Microsoft Entra ID, particularly for managed service providers managing Microsoft 365 and Azure environments. The post references a technical deep dive by Elli Shlomo that reportedly details how attackers could exploit excessive permissions to delete users, disrupt recovery, escalate privileges, and remove evidence.
Claim 30% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
For investors, the focus on Entra ID misconfigurations suggests Guardz is positioning itself as a specialist in securing Microsoft-centric cloud ecosystems, a large and growing market for MSP-focused cybersecurity tools. By educating MSPs on a specific, high-impact attack vector, the company may be reinforcing demand for its threat protection offerings and strengthening its brand as a technical authority, which could support future customer acquisition and retention in the MSP channel.

