Microsoft 365 Attack Techniques - Part II