Skip to content
  • Home
  • Secure Score Series
  • Security
  • MCAS
  • Azure AD
  • Power Platform
  • Logic Apps
  • Intune
  • About me
  • info@janbakker.tech
  • Home
  • Secure Score Series
  • Security
  • MCAS
  • Azure AD
  • Power Platform
  • Logic Apps
  • Intune
  • About me

Close the gap. Azure AD Identity Protection & Conditional Access.

  • July 14, 2020July 15, 2020
  • 2 Comments
  • Azure AD, Security
  • 8 min read

This blog is about Azure AD Identity Protection and Conditional Access, and how these two features are working together. This is not my first article on this subject. (neither my last) In previous blogs, I covered the sign-in risk and user risk policies as part of the Secure Score Series, and in my blog, about Azure Multifactor Authentication I talked about Azure AD Identity Protection, and how it can be used to roll out MFA in your organization.

Microsoft released the user risk integration with Conditional Access last week, so for me, it seemed the perfect occasion to write a blog about this. To understand why this integration is such a big deal, let’s first take a look at those two features individually.

What is Conditional Access?

Conditional Access is a feature in Azure Active Directory and requires a Premium P1 license. It can be used to protect your Office 365 and Azure AD resources. I often call it: ” the firewall of the cloud”. You can deploy if-this-than-that statements to determine who has access to resources and under what conditions.

Conceptual Conditional signal plus decision to get enforcement

There are a lot of signals and conditions that can be used. Also, Conditional Access integrates with many other security features such as Microsoft Defender ATP, Intune (App Protection), and Cloud App Security. You can build policies like:

  • To access Exchange Online from an unmanaged device, all users have to perform MFA.
  • Users in the sales team can not access the CRM application unless they are using a managed device.
  • When users access SharePoint Online from an untrusted device, they cannot download or upload documents.
  • Users who access Onedrive for Business on their iOS or Android device must use the (protected) Onedrive app.
Conceptual Conditional Access process flow

What is Azure AD Identity Protection?

Azure AD Identity Protection is also a premium feature in Azure Active Directory but requires a Premium P2 license. The feature is all about risk detection and remediation. Identity protection uses Azure AD threat intelligence to determine whether the sign-ins are risky. In case of a risky sign-in, the user can self-remediate by approving the MFA request.

All the sign-ins are aggregated so that the user risk is calculated. This happens both in real-time and offline. You can investigate the risks from the Azure portal, or export the risk data to analyze it elsewhere.

Multiple risks can be detected. The most important one is the ability to detect leaked credentials. To take advantage of that feature, you’ll have to turn on password hash synchronization. You can read all about that part in one of my previous blogs. There are a couple of other risks that can be identified:

  • Atypical travel
  • Anonymous IP address
  • Unfamiliar sign-in properties
  • Malware linked IP address
  • Known attack patterns

Malicious IP addresses are detected when attackers use dictionary attacks, brute force, password spray, or list cleaning methods.

When you are licensed for Cloud App Security, Identity Protection can also detect additional risks such as suspicious inbox manipulation rules and impossible travel.

Risk and remediation

So, Azure AD Identity Protection gives you two parameters that you can work with:

  • User risk (represents the probability that a given identity or account is compromised.)
  • Sign-in risk (represents the probability that a given authentication request isn’t authorized by the identity owner.)

Take a look at this overview to understand the flow of Azure AD Identity Protection.

For both risk types, you can set up policies to let users remediate the risk. Users with a risky sign-in can self-remediate by satisfying the MFA challenge. Users that trigger the user risk policy, can be blocked or forced to reset their password.

That brings us to the core of this blog post. As these policies apply for all of the Azure resources and applications, some organizations want to configure some granularity on top, or instead of these policies.

Conditional Access goodness

As of today, both user and sign-in risk can be used as conditions in Conditional Access. The ‘sign-in risk’ condition is out of preview already, and Microsoft recently added the ‘user risk’ condition. Take note this feature is still in preview at the time of writing.

Next, you can configure the action. You can block access, or force a password reset. When you pick “Require Password change (Preview)”, take note of these three things:

  • “Require multi-factor authentication” is also checked
  • This will only work when you select “All cloud apps”
  • You can only select the User risk (Preview) condition in combination with password reset. All other conditions are greyed out.

User risk support in Azure AD Conditional Access policy allows you to create multiple user risk-based policies. Different minimum user risk levels can be required for different users and apps. Based on user risk, you can create policies to block access, require multi-factor authentication, secure password change, or redirect to Microsoft Cloud App Security to enforce session policy, such as additional auditing. Also, you could make use of the report-only setting to measure user impact first.

Microsoft's recommendation is to require password change for users on high risk.

Sign-in experience

For this demo, I created a policy that will force a password reset once the user’s risk level is medium or high. Once the user has reached that point, the user will be prompted for MFA first. After successful authentication, the user can change the password.

Good to know

When you have configured either “Require multi-factor authentication” or “Require password change (Preview)” and the user has not registered for MFA, the session will be blocked.

So, why is this better?

As I mentioned earlier, organizations can now deploy more fine-grained and specific policies, based on user risk. You can now use multiple conditions and make full use of the exclusions. You could build a policy to block access for high-risk administrator accounts, and have another one for your regular users with different conditions and controls.

Azure AD Identity Protection is a must-have if you ask me. At least for your administrators and users that have access to intellectual property or high confidential data. When those users get breached, it will most likely damage your companies reputation and cost a lot of money and effort to restore the damage. That’s an easy business case right? You can try Azure Premium for free. This will give you instant insight into your risky users.

Resources

I suggest you take a look at this video: Ignite 2019 session about Azure Active Directory Identity Protection

This will give you some in depth information about how risk is detected and how you can integrate this product with other systems.

Also check out the Microsoft documentation to learn more about the premium features:

Azure AD Conditional Access documentation

Azure AD Identity Protection documentation

Also, check out these base protection policies to get you started.

Stay safe!

2 thoughts on “Close the gap. Azure AD Identity Protection & Conditional Access.”

  1. Pingback: Close the gap. Azure AD Identity Protection & Conditional Access. – JanBakker.tech – 365 admin service

  2. Pingback: Control access from unmanaged devices with Cloud App Security - JanBakker.tech

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

previousUse Power Automate as your Conditional Access Police Department
nextPrepopulate phone methods for MFA and SSPR using Graph API

Related Posts

Self Service in Microsoft 365

  • Azure AD

One of the great things about Azure Active Directory is the capability of self-service. Maintaining security groups can be a laborious and cumbersome task to… 

Read More »Self Service in Microsoft 365

Enrich Microsoft 365 profile card with extensions and custom attributes

  • Azure AD

Microsoft 365 is equipped with a very nice, but underestimated feature: Profile cards. I’m sure you know Microsoft Delve, and how it can enrich your… 

Read More »Enrich Microsoft 365 profile card with extensions and custom attributes

Azure Active Directory Identity Governance – Azure AD Entitlement Management

  • Azure AD
  • Security

In this series, we take a look at Azure Active Directory Identity Governance. This premium feature provides you with all the tools that you need… 

Read More »Azure Active Directory Identity Governance – Azure AD Entitlement Management
JanBakker.tech

Powered by WordPress

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok!