Forum Discussion
Cloud App Security IP block in Conjunction with Azure AD Conditional Access Policy
I have a conditional access policy which rejects Office 365 logins from IP's probably located outside of the US (and Bahamas, Canada). I still see alerts in Cloud App Security when foreign hackers attempt to log into various Office 365 accounts from those regions. We have MFA on all admin accounts and most others as well. Question, why does Cloud App Security flag those login attempts when we already have a conditional access policy blocking those regions? Is there some kind of ordering that happens with these rules? I notice that when I block the IP (make it Risky, a conditional access policy also blocks all risky IP logins), the attack goes away until they try another IP.
6 Replies
- Anisha GuptaCopper Contributor
Jim Hill
Can you elaborate on the alerts you are seeing in Cloud App Security? Is it one of the anomaly detection alerts such as 'Risky Sign in', 'Activity from anonymous IP address', or 'Multiple failed login attempts'? Or is this an access policy you have in place in MCAS that corresponds to your Azure AD Conditional Access Policy?- Jim HillBrass Contributor
Anisha Gupta I think I see what was happening. I had only a subset of users to which the conditional access policy "block login from risky IP's." Once I expanded that rule I see that by using the What If tool that the login attempt was blocked. Regardless, my users know to reject and report any incident during which they see an MFA authentication request on their smart phone apps since that would mean that the login passed the password authentication portion. We also have branding all over our sign in page so hopefully between that, the various rules, and Bitdefender we hope to minimize breaches. Thanks for looking at this.
- Jim HillBrass Contributor
Anisha Gupta we have the Cloud App Security set to alert only on the rule which fires when it sees multiple failed login attempts. This usually come from outside of our region, so I thought that any login attempt would first be blocked in Azure AD by having a conditional access policy blocking any login from outside of our region. I am guessing that the conditional access policy allows the user outside of the region to attempt to login, but just blocks it at that point, so it then shows in the Cloud App Security alert. Once we add that IP address as a risky IP it is blocked thereafter.
- kkalraCopper Contributor
#Microsoft #CloudAppSecurity
What's happening here is users are paying for a premium fee for a feature 'Cloud Security App' where Microsoft is failing to provide service to its own dashboard. It is like going through your Windows logs on Event viewer.
- It also gives you alerts from Microsoft server
i.e. Your file was accessed by Teams on US Microsoft Server (eeehhh!) - It gives you false alerts from failed sign-in.
Is it really a CloudAppSecurity alert? No, you cannot fix it (even if you mark it as false +ve)
i.e. Conditional access is blocking the sign-in attempt and that information is logged in AAD user sign-in alerts. - Similary 'Top users to investigate' score is wrong. As all the attempts are false +ve's, hence dropping your compliance score.
Concluding that a user will have a hard time monitoring the logs or will switch to another solution.
The ideal solution though would be to have option to upload a list of suspecious IP's, where user get brute force attacks to be blocked from attempting to login.Edit - Issue is noted since 2019 and yet the same till date. Good luck!
- It also gives you alerts from Microsoft server