How to Protect against Token Theft | Conditional Access

  Рет қаралды 5,615

T-Minus365

T-Minus365

Күн бұрын

Пікірлер: 25
@Fiddle-j1q
@Fiddle-j1q Ай бұрын
Awesome....Thank you for explaining and showing! This is exactly what i needed to make our environment secured.
@danpowell7421
@danpowell7421 Ай бұрын
Great Overview Nick. Loved the Star Wars analogy for describing token Theft :) You make a really good point about the browser on an unmanaged device. I suppose this is another reason why we should be blocking users from logging on to web browsers using their personal accounts.
@robjeeves
@robjeeves 2 ай бұрын
Superb presentation, elevated with Star Wars. Good work nick ❤
@VuDucThuan-iy2mk
@VuDucThuan-iy2mk 2 ай бұрын
Thank you for sharing. The information is very impressive, as is the description of the necessary conditions to apply the methods for preventing token theft.
@MickMacklerack
@MickMacklerack 2 ай бұрын
Microsoft added a template for this as normal MFA is so utterly useless. The template is called "require mdm-enrolled and compliant devices to access cloud apps for all users (Preview)"
@hullan666
@hullan666 Ай бұрын
Compliant devices etc… won’t protect you from token theft. You authorize from your compliant device and recieves a token. If I steel that token on the way to you I can replay that token in my browser
@MickMacklerack
@MickMacklerack Ай бұрын
@hullan666 If they steal the token from the device via a virus but it stops evilginx phishing sites which are the norm.
@lostmatt
@lostmatt 2 ай бұрын
Nick - would rolling up MFA to Passkeys solve this problem upfront? Where if the session token is stolen from a user enrolled with Passkey - the thief would not be able to use it because they couldn't authenticate with device that the Passkey is on due to lack of proximity?
@ricklucas6216
@ricklucas6216 2 ай бұрын
This is my question as well. Can the token be stolen and used on P1 if using Passkey on Microsoft Authenticator?
@LivingInCloud1
@LivingInCloud1 2 ай бұрын
Sorry no. Passkeys would block attempts to steal the tokens or cookies when the actual authentication happens. What Nick explains here is abusing the token from the client after that phase. No matter HOW the token ended up on the client, it can be stolen by malware. Passkeys are great, but does not protect from this kind of attacks as it happens after that has taken place. Let's hope Microsoft (and others) start supporting the Device Bound kind of tokens broader!
@paulmckenna9477
@paulmckenna9477 2 ай бұрын
@@LivingInCloud1 Thank you for the explanation. I was similarly unclear about whether or not passkeys would solve the problem. I find it a bit annoying that it requires purchasing a rather expensive P2 license just to over come what is a flawed implementation using tokens. Seems like the ability to bind a token to a device should be available to anyone that cares to implement it.
@LivingInCloud1
@LivingInCloud1 2 ай бұрын
@@paulmckenna9477 Indeed, once that takes hold we will be in a very good place. Phishfree logins + Device bound token = LOVE!
@stormlight1553
@stormlight1553 27 күн бұрын
It sounds like there is no fix for people who use their home computers to get remote access to company resources unless MS allows token binding to non joined machines?
@hullan666
@hullan666 Ай бұрын
I’m a little confused about what you say around the 11:10 mark. If the user signs in fram a compliant device - the user is granted an access token. Surely that token would be able to replay from another browser? Why wouldn’t it? Once I have your authenticated session from your hybrid joined compliant device - entra will let me in. Or am I misunderstanding something?
@t-minus365
@t-minus365 Ай бұрын
Yea you are correct, that is a misquote on my part.(updated the video snippet) This worked in testing but it was related to CAE with risky user detection not because of device compliance. This will only help mitigate it if you pair the device with other policies/protections, that reduce this happening like enabling Local Security Authority (LSA) protection on the device.
@steff_ff3
@steff_ff3 2 ай бұрын
I never use Compliant devices in a CA because it's too buggy. Devices fall off of compliance all the time. I much prefer to use Azure registered and joined. Make sure you pair that policy with one asking for MFA to enroll a device to be safe.
@dutchbachelor
@dutchbachelor 2 ай бұрын
That is what I am afraid of, too... i.e. I have set the Minimum OS version and all of a sudden ALL my devices are non-compliant because of that. While I KNOW for a fact that ALL devices are above the version I set. I triple checked, the version is entered correctly. Still haven't figured out what the issue is.
@AbdullahOllivierreIT
@AbdullahOllivierreIT 2 ай бұрын
start gradually, exclude known BYOD (Entra Reg) and target only Office 365 cloud app. Then ratchet up to include all cloud apps. When an org allows BYOD, just exclude those allowed from this policy. In your Intune Device Compliance increase the non-compliant grace period to say like 30 days to allow IT initially adjust and take time to fix the non compliant issues.
@OutdoorsJustin
@OutdoorsJustin 2 ай бұрын
10 minutes in and find out that security settings are hidden behind more licensing. Thanks Microsoft.
@BrandonSzychbrown
@BrandonSzychbrown 2 ай бұрын
So I understand all the concepts for the Conditional Access policies to prevent token theft except for the compliant devices policy. In theory if the user is already authenticated with a compliant device and the attacker grabbed that token wouldn't they be able to login since that token already satisfied the compliant devices policies? I didn't think device compliance was actively checked besides the initial login unless you had something like session timeouts where you needed to reauthenticate as it expires. I do get the premise that a compliant device would be harder for an attacker to compromise and grab a token due to corporate security.
@Tractshun
@Tractshun 2 ай бұрын
I have never seen an answer to this. If it only checks compliance during the initial authentication, that doesn’t do anything to prevent stolen tokens from being reused from a different device.
@kronouzmobilelegendz9456
@kronouzmobilelegendz9456 Ай бұрын
Qpo
@TotemYuri
@TotemYuri 2 ай бұрын
Thanks for the video; it was very informative. I have a question: MCAS has its own policies for protecting against stolen access tokens by implementing "session access". Would you recommend using those policies in addition to Entra ID, or should we rely solely on Entra ID? Or is that different as it seems the MCAS session policies are very granular...
Level up your cyber security assessments with this framework
35:54
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН
My scorpion was taken away from me 😢
00:55
TyphoonFast 5
Рет қаралды 2,7 МЛН
Protecting Against Credential and Token Theft
52:32
John Savill's Technical Training
Рет қаралды 23 М.
How to Find MFA Bypasses in Conditional Access Policies
12:46
Beau Bullock
Рет қаралды 35 М.
Automate Employee Onboarding in Microsoft 365 | Full Tutorial
57:22
My top policies for securing device registration in Microsoft 365
15:20
How secure is your Microsoft environment? | Find out in minutes
11:35
How to Set Up Defender for Office 365: A Complete Guide
28:18
Jonathan Edwards
Рет қаралды 16 М.