Blog Post

Microsoft Entra Blog
4 MIN READ

Azure AD Password Protection and Smart Lockout are now in Public Preview!

Alex_Simons's avatar
Alex_Simons
Icon for Microsoft rankMicrosoft
Sep 07, 2018
First published on CloudBlogs on Jun, 19 2018
Howdy folks,

Many of you know that unfortunately, all it takes is one weak password for a hacker to get access to your corporate resources. Hackers can often guess passwords because regular users are pretty predictable. Regular users create easy to remember passwords, and they reuse the same passwords or closely related ones over and over again. Hackers use brute force techniques like password spray attacks to discover and compromise accounts with common passwords, an attack pattern we told you about back in March .

So today I'm really excited to announce the public preview of Azure AD Password Protection and Smart Lockout. Azure AD Password Protection helps you eliminate easily guessed passwords from your environment, which can dramatically lower the risk of being compromised by a password spray attack. Specifically, these features let you:

  1. Protect accounts in Azure AD and Windows Server Active Directory by preventing users from using passwords from a list of more than 500 of the most commonly used passwords, plus over 1 million character substitution variations of those passwords.
  2. Manage Azure AD Password Protection for Azure AD and on-premises Windows Server Active Directory from a unified admin experience in the Azure Active Directory portal.
  3. Customize your Azure AD smart lockout settings and specify a list of additional company specific passwords to block.

Why you need Azure AD Password Protection

Banned passwords

Most users think if they have chosen a password that meets a complexity requirement, something like P@$$w0rd1!, they're safe, which is exactly wrong. Attackers know how users create passwords, and there are three general rules to be aware of.
  • They know to account for character substitutions like "$" for "s". "P@$$w0rd" isn't fooling anyone.
  • They also that if there are complexity rules, most people will apply them in the same way: by starting a word with a capital letter and ending the password with a digit or punctuation. (Because of this we've been recommending doing away with complexity rules , and the latest NIST recommendations agree .)
  • They know that requiring users to change their passwords periodically leads to other predictable patterns. For instance, if users have to change their password every quarter, they frequently pick passwords based on sports teams, months or seasons and combine them with the current year.
The fix to all of this is to apply a banned password system when users change their passwords, like Azure AD Password Protection. This is both the NIST recommendation and what we do in the cloud for Microsoft accounts and Azure AD accounts. Today's public preview gives you both the ability to do this in the cloud and on-premises—wherever your users change their passwords—and unprecedented configurability. All this functionality is powered by Azure AD, which regularly updates the databased of banned passwords by learning from billions of authentications and analysis of leaked credentials across the web. By checking all the password set or reset operations for your organization, password protection ensures that only passwords meeting your, and our, standards exist in your directory. Azure AD Password Protection also provides an integrated admin experience to control checks for passwords in your organization, in Azure and on-premises. Please note: Azure AD Premium Password Protection is an Azure AD Premium 1 feature.

Smart Lockout

Smart lockout is our lockout system that uses cloud intelligence to lock out bad actors who are trying to guess your users' passwords. That intelligence can recognize sign-ins coming from valid users and treats those differently than ones that attackers and other unknown sources. This means smart lockout can lock out the attackers while letting your users continue to access their accounts and be productive. Smart lockout is always on for all Azure AD customers with default settings that offer the right mix of security and usability, but you can also customize those settings with the right values for your environment. With banned passwords and smart lockout together, Azure AD password protection ensures your users have hard to guess passwords and bad guys don't get enough guesses to break in. Please note: Azure AD Smart Lockout is included in all versions of Azure AD (including those versions in Office365).

Get started in three simple steps

By default, all Azure AD password set and reset operations for Azure AD Premium users are configured to use Azure AD password protection. To configure a custom list of banned password strings for your organization and to configure Azure AD password protection for Windows Server Active Directory, follow the below simple steps:

Configure the password protection for your tenant

Go to Azure AD Active Directory > Security > Authentication Methods.

Customize your settings

  1. Set your custom smart lockout threshold (number of failures until the first lockout) and duration (how long the lockout period lasts)
  2. Enter the banned password strings for your organization in the textbox provided (one string per line) and turn on enforcement of your custom list
  3. Extend banned password protection to Windows Server Active Directory by enabling password protection in Active Directory. Start with the audit mode, which gives you the opportunity to evaluate the current state in your organization. Once an action plan is finalized, flip the mode to Enforced to start protecting users by preventing any weak passwords being used.

Install the Azure AD password protection proxy and domain controller agents in your on-premises environment.

Download the agents from the download center and use the instructions in the password protection deployment guide . Both the domain controller agent and the proxy agent support silent installation which can be leveraged using various deployment mechanisms like SCCM.

That's it! You're now configured to use Azure AD password protection across Azure AD and on-premises. Take a read through our detailed documentation to learn more about this functionality. As always, we're eager to hear from you! Still have more questions for us? Email aadppfeedback@microsoft.com or join us at the Ask Me Anything Session for Azure AD password protection. We look forward to hearing your feedback! Best regards, Alex Simons (Twitter: @Alex_A_Simons ) Director of Program Management Microsoft Identity Division
Updated Jul 24, 2020
Version 9.0

37 Comments

  • Lonnard:   on your password examples, be aware that the current algorithm does take into account complexity that is present even once a banned token is detected.    In your example, "frogs" was detected but "1234" gave it enough extra complexity to allow it to be accepted.   The algorithm tries to strike a balance between security and usability in this regard.  The algorithm is tuned fairly often so nothing should be regarded as set in stone.

     

    On your lockout issues, I am not aware of any potential interaction between onpremises Azure AD Password Protection DC agents and the Default Domain policy - from AD's perspective, AADPP is just another installed password filter dll.   Would you please contact me offline so I can get a few more details from you on this?

     

     

  • Callum Golding's avatar
    Callum Golding
    Copper Contributor

    Hi Alex,

     

    This is a great feature. Some queries though;

    1. If we only have one account with an Azure AD prem licence does activating 'Enforce custom list' only apply to that one particular user

     

    "updates the databased of banned passwords by learning from billions of authentications and analysis of leaked credentials across the web. By checking all the password set or reset operations for your organization, password protection ensures that only passwords meeting your, and our, standards exist in your directory. " 

     

    2. How exactly do we connect with this 'databased of banned passwords' does it happen automatically the moment we enable 'Enforce custom list'?

     

    Many thanks,

  •  Another problem has surfaced. I am investigating the environment, but this seems to interfer with account lockouts. We have the default password policy set to 10 attempts. We notice that once we get to 6 attempts, there is a delay of 30 seconds before allowing us further logon attempts. This appears to reset the count and therefore the threshold of 10 attampts is never reached. I set the Smart lockout threshold in Azure to 12. 

     

    More to this, no matter what thresholds are set in Smart Lockout or on-premises Default Domain Policy, on-prem user accounts will never get locked out once agents are installed on domain controllers. We disabled all agents and now the Default Domain Policy takes effect again.

  • Here is what I have found. If your on-premises GPO dictates 8 minimum characters, then the words in banned passowrd list but span at least 5 character os the password in order for it to show as bad. e.g. say you add the word "frogs". If you enter 123frogs it will be rejected. But if you enter 1234frogs, it will be accepted because the banned word only covers the last four required characters.  Also, it states the words must be at least 4 characters. So if we add "frog", this word will never be rejected because it will only ever span half the required password length. 

     

    More curious results. I added a 7 character word in the custom list "papanui". I was not able to use papanui1, papanui12, papanui123, but I was able to use papanui1234.  

     

     

  • Charles Hash's avatar
    Charles Hash
    Copper Contributor

    Are there any reporting ability tied to this yet? Would like to see trends and problem accounts for remediation.

  • We're still working on the final plan, but probably won't be GA until Q1 CY19.

  • Robert Woods's avatar
    Robert Woods
    Iron Contributor

    Alex_Simons Any idea when this is going to come out of preview? We want to roll out after testing in the lab since June but have policies against installing preview software in a prod environment.