Forum Discussion
Marek_Belan
Dec 08, 2021Copper Contributor
Where find account with leaked password
Hi we setup password has sync and all about azure ad assword protection in audit mode. Now where i find account with leaked password? When i try chenge password do som leaked pass like asdf1234567...
Marek_Belan
Dec 09, 2021Copper Contributor
Hi
i dont want to see leaked password !
I want to see which account have leaked password.
i dont want to see leaked password !
I want to see which account have leaked password.
BilalelHadd
Dec 09, 2021Iron Contributor
Hi, again Marek_Belan,
You won't be able to see users with a leaked password configured. As stated earlier, when changing the configuration to enforced mode, users will be prevented from setting newly created passwords that are on the (custom and global) banned passwords list. The attempt will be, of course, logged.
Does this answer your question?
You won't be able to see users with a leaked password configured. As stated earlier, when changing the configuration to enforced mode, users will be prevented from setting newly created passwords that are on the (custom and global) banned passwords list. The attempt will be, of course, logged.
Does this answer your question?
- Marek_BelanDec 09, 2021Copper ContributorSo we setup The Azure AD Password Protection and we cant identify users with leaked password??????
- BilalelHaddDec 09, 2021Iron ContributorMarek_Belan,
Did you already read the Microsoft documentation about this feature? I assume not. Your suggestion would be a great feature request but isn't available at the moment.
--
When a user changes or resets their password, the new password is checked for strength and complexity by validating it against the combined list of terms from the global and custom banned password lists.
Even if a user's password contains a banned password, the password may be accepted if the overall password is otherwise strong enough. A newly configured password goes through the following steps to assess its overall strength to determine if it should be accepted or rejected:
--
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-premises-operations- Marek_BelanDec 09, 2021Copper ContributorPassword hash synchronization
Risk detections like leaked credentials require the presence of password hashes for detection to occur. For more information about password hash synchronization, see the article, Implement password hash synchronization with Azure AD Connect sync.
So where is the risk? We setup hash sync, user has leaked pasword, where i see rising risk of this user?