Blog Post

Exchange Team Blog
3 MIN READ

Disabling Basic authentication in Exchange Online – Public Preview Now Available

The_Exchange_Team's avatar
The_Exchange_Team
Platinum Contributor
Oct 17, 2018

Several months ago we added a feature to the Microsoft 365 Roadmap which generated a lot of interest. The feature was named Disable Basic Authentication in Exchange Online using Authentication Policies and as the roadmap items stated - it provided the capability for an Admin to define protocols which should allow Basic Authentication. Why was that so interesting? Well as you probably know, Basic authentication in Exchange Online accepts a username and a password for client access requests and blocking Basic authentication can help protect your Exchange Online organization from brute force or password spray attacks. Lately there has been an increase in the occurrence of these types of attacks, and so we are accelerating our release of this feature as it helps prevent them. If your organization has no legacy email clients or doesn’t want to allow legacy email clients, you can use these new authentication policies in Exchange Online to disable Basic authentication requests. This forces all client access requests to use modern authentication, which will stop these attacks from impacting your organization. We are still working on some aspects of this feature, and we’ll highlight those for you here, but in response to the increase of attacks we are seeing, we want to make authentication policies available to you now, and are therefore rolling this out worldwide immediately. There is already an excellent article describing how this feature works and we strongly suggest you read, understand and follow the article before enabling this feature. There are three important caveats to this feature:

  • There is a lack of telemetry for tenant admins allowing them to report on which users are using Basic Auth (and with which protocol) and once a block is enabled, whether such traffic was blocked. In other words, we can’t really tell you how well the block is working.
  • A policy change can take up to 24 hours to take effect, unless the admin calls a cmdlet (such as Set-User) to ‘tickle’ each user. (Note that ‘tickling’ is a technical term, first used here). So the block might not kick in right away, and you might have to take some action if you want it to happen faster.
  • If a user’s identity has not been replicated to Azure AD/Exchange Online, they will not be blocked and so any request received by Exchange Online will be routed to the authoritative Security Token Service (STS) where it is likely to fail. This same behavior also means that any authentication requests for unknown users in a tenant (such as might happen during a password spray attack) will also be forwarded to the authoritative STS for the domain.
We had been holding back on moving from private to public preview primarily due the first two of these - a tenant admin could misconfigure something and not realize until it’s too late due to the lack of reporting and the delayed effect of policy change. However, given the increasing frequency of these types of attacks we would rather give you access to the capability, knowing you will all carefully read the documentation before configuring. We’ll continue to work on improving the feature set, but you don’t need to wait for us. We acknowledge that for large customers, tickling every user using Exchange Online PowerShell (which can be unreliable for long running scripts) is challenging, but again we feel the benefit outweighs the negatives at this stage. It’s in all our interests to prevent these types of attacks from compromising our data and users, and we hope you find these tools useful and helpful. Use them wisely! The Exchange Team

Updated Jul 01, 2019
Version 2.0

36 Comments

  • Can someone confirm if the behavior of the Office client app version "Microsoft Office 365 ProPlus" behaves the same way as Office 2013 where we have to add the "EnableADAL" registry key for modern auth? Back in 2017, we attempted to enable Exchange modern auth and our users experienced a password prompt loop and was told that even though we had Outlook 2016, that the ProPlus software behaved like Outlook 2013, and we'd need to deploy that registry key for modern auth to work.
  • For Set-User, -WhatIf does not work when combined with -AuthenticationPolicy

    The policy will apply, be careful.

  • Brilliant news. This in combination with an Azure Conditional Access policy for 'blocked locations' (aka countries my organisation doesn't operate in,) should prove very effective for blocking malicious actors.
  • Wonder if you guys could comment on how these new controls interact with client certificate based authentication to EXO?
  • Is there any way to find out how many connections made through basic auth in EXO ? How do we find if any application support basic auth or modern Auth ? as if i create the new auth policy by default its block the basic auth for the all protocol.Each admin does not wanted to get impacted to their application with with policy.hence if you have better idea to find out which protocol need to be exempted from the basic auth before?
  • Is there any chance you can explain the difference between this method of blocking and this article "Azure AD Conditional Access support for blocking legacy auth "?

    https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Conditional-Access-support-for-blocking-legacy-auth-is/ba-p/245417

    I appreciate your efforts to help clarify the "what might break" in the excellent article you linked to as well.

    • Deleted's avatar
      Deleted
      Nick, we see this feature as a benefit to federated auth deployments primarily. This means Exchange will stop those auth requests from being proxied back to your on-prem STS. Azure AD Conditional Access support for blocking legacy auth is something that kicks in after that flow has happened, so wouldn't be used if you used Auth Policies to block basic for Federated Auth users. But it would apply to cloud identity scenarios. Yes there is some overlap, and we will be rationalizing that a bit.

      The scenario this really helps with is password spray for federated domains. With this in place those auth requests (for users we know about) don't get to your STS at all.

  • while I like the idea, in practicality, its pretty useless to try and block basic authentication. 99% of the Mobile applications don't support modern authentication. I would argue that at least 80% of all user mailboxes also have a phone attached so blocking modern authentication for some protocols but leaving ActiveSync open is about as good as locking the front door but leaving the back door unlocked.

    Intelligent hackers are going to attack the obvious point..which is the activesync protocol.

    • Deleted's avatar
      Deleted
      That's not correct. Modern Authentication now is full supported by the native IOS and Android apps, so if you have modern devices you should be ok.

      If you have older devices (like Android 4.0 ) you shouldn't be worried because they don't support TLS 1.2 and therefore no chances to connect to O365 in the near (super close) future.

      • Deleted's avatar
        Deleted
        Kudos to Christian, he's spot on. The point of this feature is to force use of MA capable clients - if your clients aren't MA capable - then then this will force those users to upgrade them or be cut off - and that's a good thing for security. They have options, and Outlook mobile for iOS/Android is the best of them.
  • I saw a separate announcement that Basic Auth will be removed from EXO in 2020. Doesn't the Windows10 basic mail client, SurfaceHub, and Skype for Business meeting room devices all use "Basic Auth"? Are there any plans for those?
    • Deleted's avatar
      Deleted
      John, we announced Basic will be removed from EWS - https://blogs.technet.microsoft.com/exchange/2018/07/03/upcoming-changes-to-exchange-web-services-ews-api-for-office-365/
  • I'd love to do this, but am having a hard time thinking of any of my customers that would be positive they don't have anything using basic auth. I do however see this as potentially useful in securing *specific* accounts, such as VIPs or other types of accounts that we know to be using modern auth... though conditional access could also do this.

    Either way, thanks for the article, its a tool I'll throw in the box!

    • Deleted's avatar
      Deleted
      This block takes place at EXO when enabled Mike, before the on-prem STS or AAD get a look at it - take a look at the supporting doc.
      • Deleted's avatar
        Deleted
        Aha, gotchya, thanks. This would mitigate attacks against users who ARE already using modern auth then. Attacks that might otherwise circumvent/never reach the conditional access, etc workflow.

        I have actually seen on-prem ADFS servers inundated with password attempts that weren't blocked by the customers security because they are proxied from Microsoft.