One of the most effective measures is to disable any unnecessary device code authentication flows. If it isn’t essential for business operations, then it should be removed to eliminate a ...
The actor will generate a legitimate device code authentication request ... Disabling device code flow wherever possible.