Blog Post

Microsoft Entra Blog
3 MIN READ

Act fast to secure your infrastructure by moving to TLS 1.2!

ShobhitSahay's avatar
ShobhitSahay
Icon for Microsoft rankMicrosoft
Nov 22, 2021

Protecting sensitive data by putting the right security controls in place is of the utmost importance for every organization. This requires constantly evolving to satisfy standards and regulations that help protect data and combat threats. One of these standards is Transport Layer Security (TLS), which is an internet protocol to encrypt communications between your web browser and web server, as well as mobile applications communicating with any servers. We are recommending customers secure their infrastructure by using TLS 1.2 with Azure Active Directory. The older TLS versions (1.0 and 1.1) are being deprecated and removed to improve the security posture of your tenant and to be compliant with industry standards.  

 

TLS is a widely adopted security protocol that facilitates privacy and data security for communications over the Internet. TLS is used when connecting to Azure AD, Office 365, and other cloud services owned by Microsoft or other cloud service providers. The first of three TLS components is encryption, which hides the data being transferred from third parties. The second component is authentication, which ensures that the parties exchanging information are who they claim to be. The third is Integrity that verifies that the data has not been forged or tampered with. Since TLS 1.0, 1.1 protocols, and 3DES cipher are out of date, they do not support modern cryptographic algorithms. This results in security vulnerabilities that could be exploited by attackers. FedRamp and NIST SP 800-52r2 compliance requires legacy TLS (1.0, 1.1) protocols and cipher (3DES) to be deprecated.

 

Most Microsoft services, such as Microsoft 365, provide guidance on how to deprecate TLS 1.0 and 1.1. While many customers using Azure AD have already moved to TLS 1.2, we are sharing further guidance to accelerate this transition. Starting Jan. 31 2022, Azure AD will no longer support these deprecated TLS versions 1.0 and 1.1. Customers who have not moved to TLS 1.2 will be impacted since requests to Azure AD will fail.

 

Using Azure AD sign in logs to detect legacy TLS & plan transition

For complete guidance on supporting TLS 1.2 with Azure AD, refer to our documentation. Customers can use Azure AD sign-in logs to help identify clients or apps still using legacy TLS in their environment. For sign-ins performed over Legacy TLS, Azure AD will mark the Legacy TLS field in additional details with True. The Legacy TLS field appears only if the sign-in occurred over Legacy TLS, so if customers don’t see any Legacy TLS in their logs, they are ready for the switch to TLS 1.2.

 

There are multiple ways in which an administrator can use Legacy TLS protocols to review logs and find sign-in attempts.

 

  1. PowerShell: Customers can use PowerShell to filter and export sign-in log entries where Legacy TLS is being used. An Azure AD Premium license is needed to call MS Graph APIs through PowerShell. Learn more at Azure AD PowerShell cmdlets for reporting | Microsoft Docs
  1. UX: Customers can browse through more details of the legacy TLS-based sign-in log entry in the Azure Portal. For more details, refer to Sign-in logs in Azure Active Directory - preview | Microsoft Docs

 

Figure 1: Using Azure Portal to get TLS log

 

  1. JSON: Customers can download the last seven days of sign-in logs in JSON format to see the Legacy TLS flag. This flag will show only if Legacy TLS is being used for the sign-in request. Downloading the sign-in logs in CSV format rather than JSON does not expose the Legacy TLS flag. For more information, refer to How to download logs in Azure Active Directory | Microsoft Docs
  2. Azure Monitor: Finally, customers can analyze logs in Azure Monitor and set up log export. For details, refer to Analyze activity logs using Azure Monitor logs | Microsoft Docs

 

Figure 2: Using Azure Monitor to get TLS log

 

As cryptographic protocols evolve, customers should review industry standards and best practices while monitoring for new vulnerabilities to existing protocols. We hope with these toolsets, customers can easily move to TLS 1.2 and improve their security posture.

 

 

 

Learn more about Microsoft identity:

Updated Nov 22, 2021
Version 2.0
  • dmbuk's avatar
    dmbuk
    Copper Contributor

    Azure monitor log query returns plenty of events with Legacy TLS (TLS 1.0, 1.2, 3DES) and value = True
    as it says both 1.0 and 1.2, does it mean we are good or not?

    MS doc says:

    Check for a Legacy TLS (TLS 1.0, 1.1, or 3DES) value that's set to True. If you see that particular field and value, the sign-in attempt was made using legacy TLS. If the sign-in attempt was made using TLS 1.2, that field doesn't appear.

     

    So not quite clear what TLS was used 

     

  • prakashjha most of the client applications mentioned above do not negotiate or prefer a TLS protocol to use but rely on .Net framework or Winhttp to negotiate the TLS protocols to use. So one needs to check 

    1. If OS platform supports TLS 1.2 by default or needs an update to support it. You may also want to check if TLS 1.2 has been disabled at OS level via the registry.
    2. If OS Platform supports TLS 1.2 and the same is enabled in registry, do you have a web proxy or VPN that may be downgrading the TLS protocols to a lower version.
    3. If applications like Office that rely on .Net framework, ensure .Net framework is updated and configured to rely of the OS defaults for TLS.
    4. Try an update the application if there is a newer version available based on your OS version.

    More details of OS platform that support TLS 1.2, .Net framework updates and registry configuration to check if TLS 1.2 is disabled or .Net framework is configured to support OS defaults is mentioned in the article Enable TLS 1.2 support as Azure AD TLS 1.0/1.1 is deprecated - Active Directory | Microsoft Docs

     

     

  • prakashjha's avatar
    prakashjha
    Brass Contributor

    Thank you for this info. I queried our sign in data and see some AppDisplayName as follows

    Windows Sign In
    Microsoft Office
    Microsoft Authentication Broker

    Microsoft Teams

    OneDrive SyncEngine
    Office 365 SharePoint Online


    Does this mean the apps that are being used are old version ? Will a simple update of the app be sufficient to ensure this is taken care of?
    Can you provide some guidance on how should we remediate them?