<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Protecting Microsoft 365 from on-premises attacks in Azure Active Directory Identity Blog</title>
    <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/ba-p/1751754</link>
    <description>&lt;P&gt;Many customers connect their private corporate networks to Microsoft 365 to benefit their users, devices, and applications. However, there are many well-documented ways these private networks can be compromised. As we have seen in &lt;A href="https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/" target="_blank" rel="noopener"&gt;recent events related to the SolarWinds compromise&lt;/A&gt;, on-premises compromise can propagate to the cloud. Because Microsoft 365 acts as the “nervous system” for many organizations, it is critical to protect it from compromised on-premises infrastructure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This document will show you how to configure your systems to protect your Microsoft 365 cloud environment from on-premises compromise. We primarily focus on Azure AD tenant configuration settings, the ways Azure AD tenants can be safely connected to on-premises systems, and the tradeoffs required to operate your systems in ways that protect your cloud systems from on-premises compromise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We strongly recommend you implement this guidance to secure your Microsoft 365 cloud environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Understanding primary threat vectors from compromised on-premises environments&lt;/H2&gt;
&lt;P&gt;Your Microsoft 365 cloud environment benefits from an extensive monitoring and security infrastructure. Using machine learning and human intelligence that looks across worldwide traffic can rapidly detect attacks and allow you to reconfigure in near-real-time. In hybrid deployments that connect on-premises infrastructure to Microsoft 365, many organizations delegate trust to on-premises components for critical authentication and directory object state management decisions. Unfortunately, if the on-premises environment is compromised, these trust relationships result in attackers’ opportunities to compromise your Microsoft 365 environment.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The two primary threat vectors are &lt;STRONG&gt;federation trust relationships&lt;/STRONG&gt; and &lt;STRONG&gt;account synchronization. &lt;/STRONG&gt;Both vectors can grant an attacker administrative access to your cloud.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Federated trust relationships&lt;/STRONG&gt;, such as SAML authentication, are used to authenticate to Microsoft 365 via your on-premises Identity Infrastructure. If a SAML token signing certificate is compromised, federation would allow anyone with that certificate to impersonate any user in your cloud&lt;STRONG&gt;. We recommend you disable federation trust relationships for authentication to Microsoft 365 when possible.&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Account synchronization&lt;/STRONG&gt; can be used to modify privileged users (including their credentials) or groups granted administrative privileges in Microsoft 365. &lt;STRONG&gt;We recommend you ensure that synchronized objects hold no privileges beyond a user&lt;/STRONG&gt; &lt;STRONG&gt;in Microsoft 365, &lt;/STRONG&gt;either directly or via inclusion in trusted roles or groups. Ensure these objects have no direct or nested assignment in trusted cloud roles or groups.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Principles for Protecting Microsoft 365 from on-premises compromise&lt;/H2&gt;
&lt;P&gt;To address the threat vectors outlined above, we recommend you adhere to the principles illustrated below: &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SLO1.PNG" style="width: 999px;"&gt;&lt;img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/241815iAFF55B566995BFF1/image-size/large?v=v2&amp;amp;px=999" role="button" title="SLO1.PNG" alt="SLO1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditordarlenebada_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Fully Isolate your Microsoft 365 administrator accounts.&lt;/STRONG&gt; They should be
&lt;UL&gt;
&lt;LI&gt;Mastered in Azure AD.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Authenticated with Multi-factor authentication (MFA).&lt;/LI&gt;
&lt;LI&gt;Secured by Azure AD conditional access.&lt;/LI&gt;
&lt;LI&gt;Accessed only by using Azure Managed Workstations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;These are restricted use accounts. &lt;STRONG&gt;There should be no on-premises accounts with administrative privileges in Microsoft 365. &lt;/STRONG&gt;For more information see this &lt;A href="https://docs.microsoft.com/microsoft-365/admin/add-users/about-admin-roles?view=o365-worldwide" target="_blank" rel="noopener"&gt;overview of Microsoft 365 administrator roles&lt;/A&gt;. Also see &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/m365-workload-docs" target="_blank" rel="noopener"&gt;Roles for Microsoft 365 in Azure Active Directory&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage devices from Microsoft 365. &lt;/STRONG&gt;Use Azure AD Join and cloud-based mobile device management (MDM) to eliminate dependencies on your on-premises device management infrastructure, which can compromise device and security controls.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No on-premises account has elevated privileges to Microsoft 365.&lt;/STRONG&gt; Accounts accessing on-premises applications that require NTLM, LDAP, or Kerberos authentication need an account in the organization’s on-premises identity infrastructure. Ensure that these accounts, including service accounts, are not included in privileged cloud roles or groups and that changes to these accounts cannot impact the integrity of your cloud environment. Privileged on-premises software must not be capable of impacting Microsoft 365 privileged accounts or roles.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use Azure AD cloud authentication &lt;/STRONG&gt;to eliminate dependencies on your on-premises credentials&lt;STRONG&gt;. &lt;/STRONG&gt;Always use strong authentication, such as Windows Hello, FIDO, the Microsoft Authenticator, or Azure AD MFA.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Specific Recommendations&lt;/H2&gt;
&lt;P&gt;The following sections provide specific guidance on how to implement the principles described above.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Isolate privileged identities&lt;/H3&gt;
&lt;P&gt;In Azure AD, users with privileged roles such as administrators are the root of trust to build and manage the rest of the environment. Implement the following practices to minimize the impact of a compromise.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use cloud-only accounts for Azure AD and Microsoft 365 privileged roles.&lt;/LI&gt;
&lt;LI&gt;Deploy &lt;A href="https://docs.microsoft.com/azure/active-directory/devices/howto-azure-managed-workstation" target="_blank" rel="noopener"&gt;Azure Managed Workstations&lt;/A&gt; for privileged access to manage Microsoft 365 and Azure AD.&lt;/LI&gt;
&lt;LI&gt;Deploy &lt;A href="https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure" target="_blank" rel="noopener"&gt;Azure AD Privileged Identity Management&lt;/A&gt;&lt;SPAN&gt; (PIM)&lt;/SPAN&gt; for just in time (JIT) access to all human accounts that have privileged roles, and require strong authentication to activate roles.&lt;/LI&gt;
&lt;LI&gt;Provide administrative roles the &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/delegate-by-task" target="_blank" rel="noopener"&gt;least privilege possible to perform their tasks&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To enable a richer role assignment experience that includes delegation and multiple roles at the same time, consider using Azure AD security groups or Microsoft 365 Groups (collectively “cloud groups”) and &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/groups-assign-role" target="_blank" rel="noopener"&gt;enable role-based access control&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&amp;nbsp;You can also use &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/administrative-units" target="_blank" rel="noopener"&gt;Administrative Units&lt;/A&gt; to restrict the scope of roles to a portion of the organization.&lt;/LI&gt;
&lt;LI&gt;Deploy &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/security-emergency-access" target="_blank" rel="noopener"&gt;Emergency Access Accounts&lt;/A&gt; and do NOT use on-premises password vaults to store credentials. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For more information, see &lt;A href="https://aka.ms/SPA" target="_blank" rel="noopener"&gt;Securing privileged access&lt;/A&gt;, which has detailed guidance on this topic. &amp;nbsp;Also, see &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/security-planning" target="_blank" rel="noopener"&gt;Secure access practices for administrators in Azure AD&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Use cloud authentication&lt;/H3&gt;
&lt;P&gt;Credentials are a primary attack vector. Implement the following practices to make credentials more secure.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-deployment" target="_blank" rel="noopener"&gt;Deploy passwordless authentication&lt;/A&gt;: Reduce the use of passwords as much as possible by deploying passwordless credentials. These credentials are managed and validated natively in the cloud. Choose from:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/passwordless-strategy" target="_blank" rel="noopener"&gt;Windows Hello for business&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-phone" target="_blank" rel="noopener"&gt;Authenticator App&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-security-key-windows" target="_blank" rel="noopener"&gt;FIDO2 security keys&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/deploymentplans/mfa" target="_blank" rel="noopener"&gt;Deploy Multi-Factor Authentication&lt;/A&gt;: Provision &lt;A href="https://docs.microsoft.com/azure/active-directory/fundamentals/resilience-in-credentials" target="_blank" rel="noopener"&gt;multiple strong credentials using Azure AD MFA&lt;/A&gt;. That way, access to cloud resources will require a credential that is managed in Azure AD in addition to an on-premises password that can be manipulated.
&lt;UL&gt;
&lt;LI&gt;For more information, see &lt;A href="https://aka.ms/resilientaad" target="_blank" rel="noopener"&gt;Create a resilient access control management strategy with Azure active Directory&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Limitations and tradeoffs&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hybrid account password management requires hybrid components such as password protection agents and password writeback agents. &amp;nbsp;If your on-premises infrastructure is compromised, attackers can control the machines on which these agents reside. While this will not compromise your cloud infrastructure, your cloud accounts will not protect these components from on-premises compromise.&lt;/LI&gt;
&lt;LI&gt;On-premises accounts synced from Active Directory are marked to never expire in Azure AD, based on the assumption that on-premises AD password policies will mitigate this. If your on-premises AD is compromised and synchronization from AD connect needs to be disabled, you must set the option &lt;A href="https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization#enforcecloudpasswordpolicyforpasswordsyncedusers" target="_blank" rel="noopener"&gt;EnforceCloudPasswordPolicyForPasswordSyncedUsers&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Provision User Access from the Cloud&lt;/H3&gt;
&lt;P&gt;Provisioning refers to the creation of user accounts and groups in applications or identity providers.&lt;/P&gt;
&lt;DIV id="tinyMceEditordarlenebada_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SLO2.PNG" style="width: 999px;"&gt;&lt;img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/241816i791A3932C3E83C77/image-size/large?v=v2&amp;amp;px=999" role="button" title="SLO2.PNG" alt="SLO2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Provision from cloud HR apps to Azure AD: &lt;/STRONG&gt;&amp;nbsp;This enables an on-premises compromise to be isolated without disrupting your Joiner-Mover-Leaver cycle from your cloud HR apps to Azure AD.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Cloud Applications:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Where possible, deploy&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/app-provisioning/user-provisioning" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Azure AD App Provisioning&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;as opposed to on-premises provisioning solutions.&amp;nbsp;This will protect some of your SaaS apps from being poisoned with malicious user profiles&amp;nbsp;due to&amp;nbsp;on-premises breaches.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;External Identities:&lt;/STRONG&gt; Use &lt;A href="https://docs.microsoft.com/azure/active-directory/external-identities/what-is-b2b" target="_blank" rel="noopener"&gt;Azure AD B2B collaboration&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;This will reduce the dependency on on-premises accounts for external collaboration with partners, customers, and suppliers. Carefully evaluate any direct federation with other identity providers. We recommend limiting B2B guest accounts in the following ways.
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Limit guest access to browsing groups and other properties in the directory&lt;/SPAN&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Use the external collaboration settings to restrict guest ability to read groups they are not members of.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Block access to the Azure portal. You can make rare necessary exceptions.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Create a Conditional Access policy that&amp;nbsp;includes&amp;nbsp;all guests and external users&amp;nbsp;and then&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/azure/role-based-access-control/conditional-access-azure-management" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;i&lt;/SPAN&gt;mplement a policy to block access&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Disconnected Forests: &lt;/STRONG&gt;Use &lt;A href="https://docs.microsoft.com/azure/active-directory/cloud-provisioning/what-is-cloud-provisioning" target="_blank" rel="noopener"&gt;Azure AD Cloud Provisioning&lt;/A&gt;. This enables you to connect to disconnected forests, eliminating the need to establish cross-forest connectivity or trusts, which can broaden the impact of an on-premises breach.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Limitations and Tradeoffs:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;When used to provision hybrid accounts, the Azure AD &amp;nbsp;from cloud HR systems relies on on-premises synchronization to complete the data flow from AD to Azure AD. If synchronization is interrupted, new employee records will not be available in Azure AD.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Use cloud groups for collaboration and access&lt;/H3&gt;
&lt;P&gt;Cloud groups allow you to decouple your collaboration and access from your on-premises infrastructure.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Collaboration:&lt;/STRONG&gt; &amp;nbsp;Use Microsoft 365 Groups and Microsoft Teams for modern collaboration. Decommission on-premises distribution lists, and &lt;A href="https://docs.microsoft.com/office365/admin/manage/upgrade-distribution-lists?view=o365-worldwide" target="_blank" rel="noopener"&gt;Upgrade distribution lists to Microsoft 365 Groups in Outlook&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Access: &lt;/STRONG&gt;Use Azure AD security groups or Microsoft 365 Groups to authorize access to applications in Azure AD.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Office 365 licensing: &lt;/STRONG&gt;Use group-based licensing to provision to Office 365 using cloud-only groups. This decouples control of group membership from on-premises infrastructure.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Owners of groups used for access should be considered privileged identities to avoid membership takeover from on-premises compromise. Take over includes direct manipulation of group membership on-premises or manipulation of on-premises attributes that can affect dynamic group membership in Microsoft 365.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Manage devices from the cloud&lt;/H3&gt;
&lt;P&gt;Use Azure AD capabilities to securely manage devices.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use Windows 10 Workstations: &lt;/STRONG&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/devices/azureadjoin-plan" target="_blank" rel="noopener"&gt;Deploy Azure AD Joined&lt;/A&gt; devices with MDM policies. Enable &lt;A href="https://docs.microsoft.com/mem/autopilot/windows-autopilot" target="_blank" rel="noopener"&gt;Windows Autopilot&lt;/A&gt; for a fully automated provisioning experience.
&lt;UL&gt;
&lt;LI&gt;Deprecate Windows 8.1 and earlier machines.&lt;/LI&gt;
&lt;LI&gt;Do not deploy Server OS machines as workstations.&lt;/LI&gt;
&lt;LI&gt;Use &lt;A href="https://www.microsoft.com/en/microsoft-365/enterprise-mobility-security/microsoft-intune" target="_blank" rel="noopener"&gt;Microsoft Intune&lt;/A&gt; as the source of authority of all device management workloads.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/devices/howto-azure-managed-workstation" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Deploy Azure Managed Workstations&lt;/STRONG&gt;&lt;/A&gt; for privileged access to manage Microsoft 365 and Azure AD.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;SPAN&gt;&lt;BR /&gt;Workloads, applications, and resources&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;On-premises SSO systems:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Deprecate any&amp;nbsp;on-premises&amp;nbsp;federation and Web Access Management infrastructure and configure applications to use Azure AD.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;SaaS and LOB applications that support modern authentication protocols:&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on" target="_blank" rel="noopener"&gt;Use Azure AD for single sign-on&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp;The more apps you&amp;nbsp;configure to use&amp;nbsp;Azure AD&amp;nbsp;for authentication,&amp;nbsp;the less risk in&amp;nbsp;the case&amp;nbsp;of an on-premises&amp;nbsp;compromise&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Legacy Applications&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;Authentication,&amp;nbsp;authorization, and remote access to legacy applications that do not support modern authentication can be enabled via&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy" target="_blank" rel="noopener"&gt;Azure AD Application Proxy&lt;/A&gt;. &amp;nbsp;They can also be enabled through a network or application delivery controller solution using&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/manage-apps/secure-hybrid-access" target="_blank" rel="noopener"&gt; secure hybrid access partner integrations&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Choose a VPN vendor that supports modern authentication and integrate its authentication with Azure AD.&amp;nbsp;In the case of an on-premises compromise, you can use Azure AD to disable or block access by disabling the VPN. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application and workload servers &amp;nbsp;&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Applications or resources that required servers can be migrated to Azure IaaS and use &lt;A href="https://docs.microsoft.com/azure/active-directory-domain-services/overview" target="_blank" rel="noopener"&gt;Azure AD Domain Services&lt;/A&gt; (Azure AD DS) to decouple trust and dependency on AD on-premises. To achieve this decoupling, virtual networks used for Azure AD DS should not have connection to corporate networks.&lt;/LI&gt;
&lt;LI&gt;Follow the guidance of the &lt;A href="https://aka.ms/TierModel" target="_blank" rel="noopener"&gt;credential tiering&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt; &lt;SPAN&gt;Application Servers are typically considered Tier 1 assets.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;BR /&gt;Conditional Access Policies&lt;/H3&gt;
&lt;P&gt;Use Azure AD Conditional Access to interpret signals and make authentication decisions based on them. For more information, see the &lt;A href="https://aka.ms/deploymentplans/ca" target="_blank" rel="noopener"&gt;Conditional Access deployment plan.&lt;/A&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/fundamentals/auth-sync-overview" target="_blank" rel="noopener"&gt;Legacy Authentication Protocols&lt;/A&gt;:&lt;STRONG&gt; &amp;nbsp;&lt;/STRONG&gt;Use Conditional Access to &lt;A href="https://docs.microsoft.com/azure/active-directory/conditional-access/howto-conditional-access-policy-block-legacy" target="_blank" rel="noopener"&gt;block legacy authentication&lt;/A&gt; protocols whenever possible. Additionally, disable legacy authentication protocols at the application level using application-specific configuration.
&lt;UL&gt;
&lt;LI&gt;See specific details for&amp;nbsp; &lt;A href="https://docs.microsoft.com/exchange/clients-and-mobile-in-exchange-online/disable-basic-authentication-in-exchange-online#how-basic-authentication-works-in-exchange-online" target="_blank" rel="noopener"&gt;Exchange Online&lt;/A&gt; and&amp;nbsp; &lt;A href="https://docs.microsoft.com/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps" target="_blank" rel="noopener"&gt;SharePoint Online&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Implement the recommended &lt;A href="https://docs.microsoft.com/microsoft-365/security/office-365-security/identity-access-policies?view=o365-worldwide" target="_blank" rel="noopener"&gt;Identity and device access configurations. &lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If you are using a version of Azure AD that does not include Conditional Access, ensure that you are using the &lt;A href="https://docs.microsoft.com/azure/active-directory/fundamentals/concept-fundamentals-security-defaults" target="_blank" rel="noopener"&gt;Azure AD security defaults&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;For more information on Azure AD feature licensing, see the &lt;A href="https://azure.microsoft.com/pricing/details/active-directory/" target="_blank" rel="noopener"&gt;Azure AD pricing guide&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;Monitoring &amp;nbsp;&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;Once you have configured your environment to protect your Microsoft 365 from an on-premises compromise, &lt;A href="https://docs.microsoft.com/azure/active-directory/reports-monitoring/overview-monitoring" target="_blank" rel="noopener"&gt;proactively monitor&lt;/A&gt; the environment.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scenarios to Monitor&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Monitor the following key scenarios, in addition to any scenarios specific to your organization. For example, you should proactively monitor access to your business-critical applications and resources.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Suspicious&amp;nbsp;activity&lt;/STRONG&gt;: All&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection#risk-detection-and-remediation" target="_blank" rel="noopener"&gt;Azure AD risk events&lt;/A&gt;&amp;nbsp;should be monitored for suspicious activity. &lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection" target="_blank" rel="noopener"&gt;Azure AD Identity Protection&lt;/A&gt;&amp;nbsp;is natively integrated with Azure Security Center.
&lt;UL&gt;
&lt;LI&gt;Define the network&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/quickstart-configure-named-locations" target="_blank" rel="noopener"&gt;named locations&lt;/A&gt;&amp;nbsp;to avoid noisy detections on location-based signals.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;User Entity Behavioral Analytics (UEBA)&amp;nbsp;alerts&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;Use UEBA to get insights on anomaly detection.
&lt;UL&gt;
&lt;LI&gt;Microsoft Cloud App Discovery (MCAS) provides&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/cloud-app-security/tutorial-ueba" target="_blank" rel="noopener"&gt;UEBA in the cloud&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;You can integrate&amp;nbsp;&lt;U&gt;on-prem UEBA from Azure ATP&lt;/U&gt;. MCAS reads signals from Azure AD Identity Protection.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Emergency access accounts activity&lt;/STRONG&gt;&lt;U&gt;:&amp;nbsp;&lt;/U&gt;Any access using&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/roles/security-emergency-access" target="_blank" rel="noopener"&gt;emergency access accounts&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;should be monitored and&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-emergency-access#monitor-sign-in-and-audit-logs" target="_blank" rel="noopener"&gt;alerts&lt;/A&gt;&amp;nbsp;created for investigations. This monitoring must include:&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Sign-ins.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Credential management.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Any updates on group memberships.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Application Assignments.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Privileged role activity&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;Configure and review security&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts?tabs=new#security-alerts" target="_blank" rel="noopener"&gt;alerts generated by Azure AD PIM&lt;/A&gt;. Monitor direct assignment of privileged roles outside PIM by generating alerts whenever a user is assigned directly.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure AD tenant-wide&amp;nbsp;configurations&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;Any change to tenant-wide configurations should generate alerts in the system.&amp;nbsp;These include but are not limited to
&lt;UL&gt;
&lt;LI&gt;Updating custom domains&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Azure AD B2B allow/block list&amp;nbsp;changes&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Azure AD B2B allowed identity providers (SAML IDPs through direct federation or social logins)&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Conditional Access or Risk policy changes&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application and&amp;nbsp;service&amp;nbsp;principal&amp;nbsp;objects&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;New applications or service principals that might require Conditional Access policies&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Additional credentials added to service principals&lt;/LI&gt;
&lt;LI&gt;Application consent activity&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Custom&amp;nbsp;roles&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;
&lt;UL&gt;
&lt;LI&gt;Updates of the custom role definitions&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;New custom roles created&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Log Management&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Define a log storage and retention strategy,&amp;nbsp;design,&amp;nbsp;and implementation to facilitate a consistent toolset such as SIEM systems like Azure Sentinel, common queries, and investigation and forensics playbooks.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure AD Logs &lt;/STRONG&gt;Ingest logs and signal produced following consistent best practices (e.g., diagnostics settings, log retention, SIEM ingestion, etc.).&amp;nbsp;The log strategy must include the following Azure AD logs: &amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Sign-in activity&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Audit logs&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Risk events&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Azure AD provides&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-activity-logs-azure-monitor" target="_blank" rel="noopener"&gt;Azure Monitor integration&lt;/A&gt;&amp;nbsp;for the sign-in activity log and audit logs. Risk events can be ingested through&amp;nbsp;&lt;A href="https://aka.ms/AzureADSecuredAzure/32b" target="_blank" rel="noopener"&gt;Microsoft Graph API&lt;/A&gt;.&amp;nbsp;You can &lt;A href="https://docs.microsoft.com/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics" target="_blank" rel="noopener"&gt;stream Azure AD logs to Azure monitor logs&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Hybrid Infrastructure OS Security Logs.&lt;/STRONG&gt;&amp;nbsp;All hybrid identity infrastructure OS logs should be archived and carefully monitored as a Tier 0 system, given the surface area implications. This includes:&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Azure AD Connect. &lt;A href="https://aka.ms/AzureADSecuredAzure/32e" target="_blank" rel="noopener"&gt;Azure AD Connect Health&lt;/A&gt;&amp;nbsp;must be deployed to monitor identity synchronization.&lt;/LI&gt;
&lt;LI&gt;Application Proxy Agents&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Password&amp;nbsp;write-back agents&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Password Protection Gateway machines&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;NPS that have the Azure MFA RADIUS extension&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Stay up to date&lt;/H2&gt;
&lt;P&gt;The Solarwinds attack is an ongoing investigation, and our teams continue to act as first responders to these attacks. As new information becomes available, we will make updates through our Microsoft Security Response Center (MSRC) blog at &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcomm.microsoft.com%2FPoliteMail245%2Fdefault.aspx%3Fpage%3DmOgDA41300uL7Q32_8nsGA%26ref_id%3DKI8WohcEM0KIdOtHZj3pQw&amp;amp;data=04%7C01%7Cadhall%40microsoft.com%7Ca48f35f285d94ccd698f08d8a3956502%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637439209352849256%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=Xebz37S3gWRu3E8WvV1FRMz6vDhcBRDY0uQCZi9ogEc%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;https://aka.ms/solorigate&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Sat, 19 Dec 2020 00:01:33 GMT</pubDate>
    <dc:creator>Alex Weinert</dc:creator>
    <dc:date>2020-12-19T00:01:33Z</dc:date>
    <item>
      <title>Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/ba-p/1751754</link>
      <description>&lt;P&gt;Many customers connect their private corporate networks to Microsoft 365 to benefit their users, devices, and applications. However, there are many well-documented ways these private networks can be compromised. As we have seen in &lt;A href="https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/" target="_blank" rel="noopener"&gt;recent events related to the SolarWinds compromise&lt;/A&gt;, on-premises compromise can propagate to the cloud. Because Microsoft 365 acts as the “nervous system” for many organizations, it is critical to protect it from compromised on-premises infrastructure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This document will show you how to configure your systems to protect your Microsoft 365 cloud environment from on-premises compromise. We primarily focus on Azure AD tenant configuration settings, the ways Azure AD tenants can be safely connected to on-premises systems, and the tradeoffs required to operate your systems in ways that protect your cloud systems from on-premises compromise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We strongly recommend you implement this guidance to secure your Microsoft 365 cloud environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Understanding primary threat vectors from compromised on-premises environments&lt;/H2&gt;
&lt;P&gt;Your Microsoft 365 cloud environment benefits from an extensive monitoring and security infrastructure. Using machine learning and human intelligence that looks across worldwide traffic can rapidly detect attacks and allow you to reconfigure in near-real-time. In hybrid deployments that connect on-premises infrastructure to Microsoft 365, many organizations delegate trust to on-premises components for critical authentication and directory object state management decisions. Unfortunately, if the on-premises environment is compromised, these trust relationships result in attackers’ opportunities to compromise your Microsoft 365 environment.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The two primary threat vectors are &lt;STRONG&gt;federation trust relationships&lt;/STRONG&gt; and &lt;STRONG&gt;account synchronization. &lt;/STRONG&gt;Both vectors can grant an attacker administrative access to your cloud.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Federated trust relationships&lt;/STRONG&gt;, such as SAML authentication, are used to authenticate to Microsoft 365 via your on-premises Identity Infrastructure. If a SAML token signing certificate is compromised, federation would allow anyone with that certificate to impersonate any user in your cloud&lt;STRONG&gt;. We recommend you disable federation trust relationships for authentication to Microsoft 365 when possible.&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Account synchronization&lt;/STRONG&gt; can be used to modify privileged users (including their credentials) or groups granted administrative privileges in Microsoft 365. &lt;STRONG&gt;We recommend you ensure that synchronized objects hold no privileges beyond a user&lt;/STRONG&gt; &lt;STRONG&gt;in Microsoft 365, &lt;/STRONG&gt;either directly or via inclusion in trusted roles or groups. Ensure these objects have no direct or nested assignment in trusted cloud roles or groups.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Principles for Protecting Microsoft 365 from on-premises compromise&lt;/H2&gt;
&lt;P&gt;To address the threat vectors outlined above, we recommend you adhere to the principles illustrated below: &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SLO1.PNG" style="width: 999px;"&gt;&lt;img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/241815iAFF55B566995BFF1/image-size/large?v=v2&amp;amp;px=999" role="button" title="SLO1.PNG" alt="SLO1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditordarlenebada_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Fully Isolate your Microsoft 365 administrator accounts.&lt;/STRONG&gt; They should be
&lt;UL&gt;
&lt;LI&gt;Mastered in Azure AD.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Authenticated with Multi-factor authentication (MFA).&lt;/LI&gt;
&lt;LI&gt;Secured by Azure AD conditional access.&lt;/LI&gt;
&lt;LI&gt;Accessed only by using Azure Managed Workstations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;These are restricted use accounts. &lt;STRONG&gt;There should be no on-premises accounts with administrative privileges in Microsoft 365. &lt;/STRONG&gt;For more information see this &lt;A href="https://docs.microsoft.com/microsoft-365/admin/add-users/about-admin-roles?view=o365-worldwide" target="_blank" rel="noopener"&gt;overview of Microsoft 365 administrator roles&lt;/A&gt;. Also see &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/m365-workload-docs" target="_blank" rel="noopener"&gt;Roles for Microsoft 365 in Azure Active Directory&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage devices from Microsoft 365. &lt;/STRONG&gt;Use Azure AD Join and cloud-based mobile device management (MDM) to eliminate dependencies on your on-premises device management infrastructure, which can compromise device and security controls.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No on-premises account has elevated privileges to Microsoft 365.&lt;/STRONG&gt; Accounts accessing on-premises applications that require NTLM, LDAP, or Kerberos authentication need an account in the organization’s on-premises identity infrastructure. Ensure that these accounts, including service accounts, are not included in privileged cloud roles or groups and that changes to these accounts cannot impact the integrity of your cloud environment. Privileged on-premises software must not be capable of impacting Microsoft 365 privileged accounts or roles.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use Azure AD cloud authentication &lt;/STRONG&gt;to eliminate dependencies on your on-premises credentials&lt;STRONG&gt;. &lt;/STRONG&gt;Always use strong authentication, such as Windows Hello, FIDO, the Microsoft Authenticator, or Azure AD MFA.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Specific Recommendations&lt;/H2&gt;
&lt;P&gt;The following sections provide specific guidance on how to implement the principles described above.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Isolate privileged identities&lt;/H3&gt;
&lt;P&gt;In Azure AD, users with privileged roles such as administrators are the root of trust to build and manage the rest of the environment. Implement the following practices to minimize the impact of a compromise.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use cloud-only accounts for Azure AD and Microsoft 365 privileged roles.&lt;/LI&gt;
&lt;LI&gt;Deploy &lt;A href="https://docs.microsoft.com/azure/active-directory/devices/howto-azure-managed-workstation" target="_blank" rel="noopener"&gt;Azure Managed Workstations&lt;/A&gt; for privileged access to manage Microsoft 365 and Azure AD.&lt;/LI&gt;
&lt;LI&gt;Deploy &lt;A href="https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure" target="_blank" rel="noopener"&gt;Azure AD Privileged Identity Management&lt;/A&gt;&lt;SPAN&gt; (PIM)&lt;/SPAN&gt; for just in time (JIT) access to all human accounts that have privileged roles, and require strong authentication to activate roles.&lt;/LI&gt;
&lt;LI&gt;Provide administrative roles the &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/delegate-by-task" target="_blank" rel="noopener"&gt;least privilege possible to perform their tasks&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To enable a richer role assignment experience that includes delegation and multiple roles at the same time, consider using Azure AD security groups or Microsoft 365 Groups (collectively “cloud groups”) and &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/groups-assign-role" target="_blank" rel="noopener"&gt;enable role-based access control&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&amp;nbsp;You can also use &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/administrative-units" target="_blank" rel="noopener"&gt;Administrative Units&lt;/A&gt; to restrict the scope of roles to a portion of the organization.&lt;/LI&gt;
&lt;LI&gt;Deploy &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/security-emergency-access" target="_blank" rel="noopener"&gt;Emergency Access Accounts&lt;/A&gt; and do NOT use on-premises password vaults to store credentials. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For more information, see &lt;A href="https://aka.ms/SPA" target="_blank" rel="noopener"&gt;Securing privileged access&lt;/A&gt;, which has detailed guidance on this topic. &amp;nbsp;Also, see &lt;A href="https://docs.microsoft.com/azure/active-directory/roles/security-planning" target="_blank" rel="noopener"&gt;Secure access practices for administrators in Azure AD&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Use cloud authentication&lt;/H3&gt;
&lt;P&gt;Credentials are a primary attack vector. Implement the following practices to make credentials more secure.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-deployment" target="_blank" rel="noopener"&gt;Deploy passwordless authentication&lt;/A&gt;: Reduce the use of passwords as much as possible by deploying passwordless credentials. These credentials are managed and validated natively in the cloud. Choose from:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/passwordless-strategy" target="_blank" rel="noopener"&gt;Windows Hello for business&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-phone" target="_blank" rel="noopener"&gt;Authenticator App&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-security-key-windows" target="_blank" rel="noopener"&gt;FIDO2 security keys&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/deploymentplans/mfa" target="_blank" rel="noopener"&gt;Deploy Multi-Factor Authentication&lt;/A&gt;: Provision &lt;A href="https://docs.microsoft.com/azure/active-directory/fundamentals/resilience-in-credentials" target="_blank" rel="noopener"&gt;multiple strong credentials using Azure AD MFA&lt;/A&gt;. That way, access to cloud resources will require a credential that is managed in Azure AD in addition to an on-premises password that can be manipulated.
&lt;UL&gt;
&lt;LI&gt;For more information, see &lt;A href="https://aka.ms/resilientaad" target="_blank" rel="noopener"&gt;Create a resilient access control management strategy with Azure active Directory&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Limitations and tradeoffs&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hybrid account password management requires hybrid components such as password protection agents and password writeback agents. &amp;nbsp;If your on-premises infrastructure is compromised, attackers can control the machines on which these agents reside. While this will not compromise your cloud infrastructure, your cloud accounts will not protect these components from on-premises compromise.&lt;/LI&gt;
&lt;LI&gt;On-premises accounts synced from Active Directory are marked to never expire in Azure AD, based on the assumption that on-premises AD password policies will mitigate this. If your on-premises AD is compromised and synchronization from AD connect needs to be disabled, you must set the option &lt;A href="https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization#enforcecloudpasswordpolicyforpasswordsyncedusers" target="_blank" rel="noopener"&gt;EnforceCloudPasswordPolicyForPasswordSyncedUsers&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Provision User Access from the Cloud&lt;/H3&gt;
&lt;P&gt;Provisioning refers to the creation of user accounts and groups in applications or identity providers.&lt;/P&gt;
&lt;DIV id="tinyMceEditordarlenebada_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SLO2.PNG" style="width: 999px;"&gt;&lt;img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/241816i791A3932C3E83C77/image-size/large?v=v2&amp;amp;px=999" role="button" title="SLO2.PNG" alt="SLO2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Provision from cloud HR apps to Azure AD: &lt;/STRONG&gt;&amp;nbsp;This enables an on-premises compromise to be isolated without disrupting your Joiner-Mover-Leaver cycle from your cloud HR apps to Azure AD.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Cloud Applications:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Where possible, deploy&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/app-provisioning/user-provisioning" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Azure AD App Provisioning&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;as opposed to on-premises provisioning solutions.&amp;nbsp;This will protect some of your SaaS apps from being poisoned with malicious user profiles&amp;nbsp;due to&amp;nbsp;on-premises breaches.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;External Identities:&lt;/STRONG&gt; Use &lt;A href="https://docs.microsoft.com/azure/active-directory/external-identities/what-is-b2b" target="_blank" rel="noopener"&gt;Azure AD B2B collaboration&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;This will reduce the dependency on on-premises accounts for external collaboration with partners, customers, and suppliers. Carefully evaluate any direct federation with other identity providers. We recommend limiting B2B guest accounts in the following ways.
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Limit guest access to browsing groups and other properties in the directory&lt;/SPAN&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Use the external collaboration settings to restrict guest ability to read groups they are not members of.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Block access to the Azure portal. You can make rare necessary exceptions.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Create a Conditional Access policy that&amp;nbsp;includes&amp;nbsp;all guests and external users&amp;nbsp;and then&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/azure/role-based-access-control/conditional-access-azure-management" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;i&lt;/SPAN&gt;mplement a policy to block access&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Disconnected Forests: &lt;/STRONG&gt;Use &lt;A href="https://docs.microsoft.com/azure/active-directory/cloud-provisioning/what-is-cloud-provisioning" target="_blank" rel="noopener"&gt;Azure AD Cloud Provisioning&lt;/A&gt;. This enables you to connect to disconnected forests, eliminating the need to establish cross-forest connectivity or trusts, which can broaden the impact of an on-premises breach.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Limitations and Tradeoffs:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;When used to provision hybrid accounts, the Azure AD &amp;nbsp;from cloud HR systems relies on on-premises synchronization to complete the data flow from AD to Azure AD. If synchronization is interrupted, new employee records will not be available in Azure AD.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Use cloud groups for collaboration and access&lt;/H3&gt;
&lt;P&gt;Cloud groups allow you to decouple your collaboration and access from your on-premises infrastructure.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Collaboration:&lt;/STRONG&gt; &amp;nbsp;Use Microsoft 365 Groups and Microsoft Teams for modern collaboration. Decommission on-premises distribution lists, and &lt;A href="https://docs.microsoft.com/office365/admin/manage/upgrade-distribution-lists?view=o365-worldwide" target="_blank" rel="noopener"&gt;Upgrade distribution lists to Microsoft 365 Groups in Outlook&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Access: &lt;/STRONG&gt;Use Azure AD security groups or Microsoft 365 Groups to authorize access to applications in Azure AD.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Office 365 licensing: &lt;/STRONG&gt;Use group-based licensing to provision to Office 365 using cloud-only groups. This decouples control of group membership from on-premises infrastructure.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Owners of groups used for access should be considered privileged identities to avoid membership takeover from on-premises compromise. Take over includes direct manipulation of group membership on-premises or manipulation of on-premises attributes that can affect dynamic group membership in Microsoft 365.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Manage devices from the cloud&lt;/H3&gt;
&lt;P&gt;Use Azure AD capabilities to securely manage devices.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use Windows 10 Workstations: &lt;/STRONG&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/devices/azureadjoin-plan" target="_blank" rel="noopener"&gt;Deploy Azure AD Joined&lt;/A&gt; devices with MDM policies. Enable &lt;A href="https://docs.microsoft.com/mem/autopilot/windows-autopilot" target="_blank" rel="noopener"&gt;Windows Autopilot&lt;/A&gt; for a fully automated provisioning experience.
&lt;UL&gt;
&lt;LI&gt;Deprecate Windows 8.1 and earlier machines.&lt;/LI&gt;
&lt;LI&gt;Do not deploy Server OS machines as workstations.&lt;/LI&gt;
&lt;LI&gt;Use &lt;A href="https://www.microsoft.com/en/microsoft-365/enterprise-mobility-security/microsoft-intune" target="_blank" rel="noopener"&gt;Microsoft Intune&lt;/A&gt; as the source of authority of all device management workloads.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/devices/howto-azure-managed-workstation" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Deploy Azure Managed Workstations&lt;/STRONG&gt;&lt;/A&gt; for privileged access to manage Microsoft 365 and Azure AD.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;SPAN&gt;&lt;BR /&gt;Workloads, applications, and resources&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;On-premises SSO systems:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Deprecate any&amp;nbsp;on-premises&amp;nbsp;federation and Web Access Management infrastructure and configure applications to use Azure AD.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;SaaS and LOB applications that support modern authentication protocols:&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on" target="_blank" rel="noopener"&gt;Use Azure AD for single sign-on&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp;The more apps you&amp;nbsp;configure to use&amp;nbsp;Azure AD&amp;nbsp;for authentication,&amp;nbsp;the less risk in&amp;nbsp;the case&amp;nbsp;of an on-premises&amp;nbsp;compromise&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Legacy Applications&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;Authentication,&amp;nbsp;authorization, and remote access to legacy applications that do not support modern authentication can be enabled via&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy" target="_blank" rel="noopener"&gt;Azure AD Application Proxy&lt;/A&gt;. &amp;nbsp;They can also be enabled through a network or application delivery controller solution using&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/manage-apps/secure-hybrid-access" target="_blank" rel="noopener"&gt; secure hybrid access partner integrations&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Choose a VPN vendor that supports modern authentication and integrate its authentication with Azure AD.&amp;nbsp;In the case of an on-premises compromise, you can use Azure AD to disable or block access by disabling the VPN. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application and workload servers &amp;nbsp;&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Applications or resources that required servers can be migrated to Azure IaaS and use &lt;A href="https://docs.microsoft.com/azure/active-directory-domain-services/overview" target="_blank" rel="noopener"&gt;Azure AD Domain Services&lt;/A&gt; (Azure AD DS) to decouple trust and dependency on AD on-premises. To achieve this decoupling, virtual networks used for Azure AD DS should not have connection to corporate networks.&lt;/LI&gt;
&lt;LI&gt;Follow the guidance of the &lt;A href="https://aka.ms/TierModel" target="_blank" rel="noopener"&gt;credential tiering&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt; &lt;SPAN&gt;Application Servers are typically considered Tier 1 assets.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;BR /&gt;Conditional Access Policies&lt;/H3&gt;
&lt;P&gt;Use Azure AD Conditional Access to interpret signals and make authentication decisions based on them. For more information, see the &lt;A href="https://aka.ms/deploymentplans/ca" target="_blank" rel="noopener"&gt;Conditional Access deployment plan.&lt;/A&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.microsoft.com/azure/active-directory/fundamentals/auth-sync-overview" target="_blank" rel="noopener"&gt;Legacy Authentication Protocols&lt;/A&gt;:&lt;STRONG&gt; &amp;nbsp;&lt;/STRONG&gt;Use Conditional Access to &lt;A href="https://docs.microsoft.com/azure/active-directory/conditional-access/howto-conditional-access-policy-block-legacy" target="_blank" rel="noopener"&gt;block legacy authentication&lt;/A&gt; protocols whenever possible. Additionally, disable legacy authentication protocols at the application level using application-specific configuration.
&lt;UL&gt;
&lt;LI&gt;See specific details for&amp;nbsp; &lt;A href="https://docs.microsoft.com/exchange/clients-and-mobile-in-exchange-online/disable-basic-authentication-in-exchange-online#how-basic-authentication-works-in-exchange-online" target="_blank" rel="noopener"&gt;Exchange Online&lt;/A&gt; and&amp;nbsp; &lt;A href="https://docs.microsoft.com/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps" target="_blank" rel="noopener"&gt;SharePoint Online&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Implement the recommended &lt;A href="https://docs.microsoft.com/microsoft-365/security/office-365-security/identity-access-policies?view=o365-worldwide" target="_blank" rel="noopener"&gt;Identity and device access configurations. &lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If you are using a version of Azure AD that does not include Conditional Access, ensure that you are using the &lt;A href="https://docs.microsoft.com/azure/active-directory/fundamentals/concept-fundamentals-security-defaults" target="_blank" rel="noopener"&gt;Azure AD security defaults&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;For more information on Azure AD feature licensing, see the &lt;A href="https://azure.microsoft.com/pricing/details/active-directory/" target="_blank" rel="noopener"&gt;Azure AD pricing guide&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;Monitoring &amp;nbsp;&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;Once you have configured your environment to protect your Microsoft 365 from an on-premises compromise, &lt;A href="https://docs.microsoft.com/azure/active-directory/reports-monitoring/overview-monitoring" target="_blank" rel="noopener"&gt;proactively monitor&lt;/A&gt; the environment.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scenarios to Monitor&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Monitor the following key scenarios, in addition to any scenarios specific to your organization. For example, you should proactively monitor access to your business-critical applications and resources.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Suspicious&amp;nbsp;activity&lt;/STRONG&gt;: All&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection#risk-detection-and-remediation" target="_blank" rel="noopener"&gt;Azure AD risk events&lt;/A&gt;&amp;nbsp;should be monitored for suspicious activity. &lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection" target="_blank" rel="noopener"&gt;Azure AD Identity Protection&lt;/A&gt;&amp;nbsp;is natively integrated with Azure Security Center.
&lt;UL&gt;
&lt;LI&gt;Define the network&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/quickstart-configure-named-locations" target="_blank" rel="noopener"&gt;named locations&lt;/A&gt;&amp;nbsp;to avoid noisy detections on location-based signals.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;User Entity Behavioral Analytics (UEBA)&amp;nbsp;alerts&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;Use UEBA to get insights on anomaly detection.
&lt;UL&gt;
&lt;LI&gt;Microsoft Cloud App Discovery (MCAS) provides&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/cloud-app-security/tutorial-ueba" target="_blank" rel="noopener"&gt;UEBA in the cloud&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;You can integrate&amp;nbsp;&lt;U&gt;on-prem UEBA from Azure ATP&lt;/U&gt;. MCAS reads signals from Azure AD Identity Protection.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Emergency access accounts activity&lt;/STRONG&gt;&lt;U&gt;:&amp;nbsp;&lt;/U&gt;Any access using&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/roles/security-emergency-access" target="_blank" rel="noopener"&gt;emergency access accounts&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;should be monitored and&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-emergency-access#monitor-sign-in-and-audit-logs" target="_blank" rel="noopener"&gt;alerts&lt;/A&gt;&amp;nbsp;created for investigations. This monitoring must include:&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Sign-ins.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Credential management.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Any updates on group memberships.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Application Assignments.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Privileged role activity&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;Configure and review security&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts?tabs=new#security-alerts" target="_blank" rel="noopener"&gt;alerts generated by Azure AD PIM&lt;/A&gt;. Monitor direct assignment of privileged roles outside PIM by generating alerts whenever a user is assigned directly.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure AD tenant-wide&amp;nbsp;configurations&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;Any change to tenant-wide configurations should generate alerts in the system.&amp;nbsp;These include but are not limited to
&lt;UL&gt;
&lt;LI&gt;Updating custom domains&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Azure AD B2B allow/block list&amp;nbsp;changes&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Azure AD B2B allowed identity providers (SAML IDPs through direct federation or social logins)&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Conditional Access or Risk policy changes&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application and&amp;nbsp;service&amp;nbsp;principal&amp;nbsp;objects&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;New applications or service principals that might require Conditional Access policies&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Additional credentials added to service principals&lt;/LI&gt;
&lt;LI&gt;Application consent activity&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Custom&amp;nbsp;roles&lt;/STRONG&gt;&lt;U&gt;:&lt;/U&gt;
&lt;UL&gt;
&lt;LI&gt;Updates of the custom role definitions&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;New custom roles created&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Log Management&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Define a log storage and retention strategy,&amp;nbsp;design,&amp;nbsp;and implementation to facilitate a consistent toolset such as SIEM systems like Azure Sentinel, common queries, and investigation and forensics playbooks.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure AD Logs &lt;/STRONG&gt;Ingest logs and signal produced following consistent best practices (e.g., diagnostics settings, log retention, SIEM ingestion, etc.).&amp;nbsp;The log strategy must include the following Azure AD logs: &amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Sign-in activity&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Audit logs&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Risk events&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Azure AD provides&amp;nbsp;&lt;A href="https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-activity-logs-azure-monitor" target="_blank" rel="noopener"&gt;Azure Monitor integration&lt;/A&gt;&amp;nbsp;for the sign-in activity log and audit logs. Risk events can be ingested through&amp;nbsp;&lt;A href="https://aka.ms/AzureADSecuredAzure/32b" target="_blank" rel="noopener"&gt;Microsoft Graph API&lt;/A&gt;.&amp;nbsp;You can &lt;A href="https://docs.microsoft.com/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics" target="_blank" rel="noopener"&gt;stream Azure AD logs to Azure monitor logs&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Hybrid Infrastructure OS Security Logs.&lt;/STRONG&gt;&amp;nbsp;All hybrid identity infrastructure OS logs should be archived and carefully monitored as a Tier 0 system, given the surface area implications. This includes:&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Azure AD Connect. &lt;A href="https://aka.ms/AzureADSecuredAzure/32e" target="_blank" rel="noopener"&gt;Azure AD Connect Health&lt;/A&gt;&amp;nbsp;must be deployed to monitor identity synchronization.&lt;/LI&gt;
&lt;LI&gt;Application Proxy Agents&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Password&amp;nbsp;write-back agents&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Password Protection Gateway machines&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;NPS that have the Azure MFA RADIUS extension&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Stay up to date&lt;/H2&gt;
&lt;P&gt;The Solarwinds attack is an ongoing investigation, and our teams continue to act as first responders to these attacks. As new information becomes available, we will make updates through our Microsoft Security Response Center (MSRC) blog at &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcomm.microsoft.com%2FPoliteMail245%2Fdefault.aspx%3Fpage%3DmOgDA41300uL7Q32_8nsGA%26ref_id%3DKI8WohcEM0KIdOtHZj3pQw&amp;amp;data=04%7C01%7Cadhall%40microsoft.com%7Ca48f35f285d94ccd698f08d8a3956502%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637439209352849256%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=Xebz37S3gWRu3E8WvV1FRMz6vDhcBRDY0uQCZi9ogEc%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;https://aka.ms/solorigate&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Dec 2020 00:01:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/ba-p/1751754</guid>
      <dc:creator>Alex Weinert</dc:creator>
      <dc:date>2020-12-19T00:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2003800#M3034</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;LI-USER uid="221690"&gt;&lt;/LI-USER&gt;&amp;nbsp;for Sharing with the Community&amp;nbsp;&lt;img class="lia-deferred-image lia-image-emoji" src="https://techcommunity.microsoft.com/html/@B71AFCCE02F5853FE57A20BD4B04EADD/images/emoticons/cool_40x40.gif" alt=":cool:" title=":cool:" /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Dec 2020 09:52:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2003800#M3034</guid>
      <dc:creator>James van den Berg</dc:creator>
      <dc:date>2020-12-19T09:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2003977#M3035</link>
      <description>&lt;P&gt;This looks amazing, well done!&lt;/P&gt;</description>
      <pubDate>Sat, 19 Dec 2020 12:55:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2003977#M3035</guid>
      <dc:creator>Pontus Själander</dc:creator>
      <dc:date>2020-12-19T12:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2004191#M3036</link>
      <description>&lt;P&gt;Thank you &lt;LI-USER uid="221690"&gt;&lt;/LI-USER&gt; and your team for this insightful and helpful guide&lt;/P&gt;</description>
      <pubDate>Sat, 19 Dec 2020 17:03:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2004191#M3036</guid>
      <dc:creator>ChristopheHumbert</dc:creator>
      <dc:date>2020-12-19T17:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2004670#M3037</link>
      <description>&lt;P&gt;Thank you for sharing&lt;/P&gt;</description>
      <pubDate>Sun, 20 Dec 2020 05:45:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2004670#M3037</guid>
      <dc:creator>amars4u</dc:creator>
      <dc:date>2020-12-20T05:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2004983#M3038</link>
      <description>&lt;P&gt;Awesome blog, thanks&amp;nbsp;&lt;LI-USER uid="221690"&gt;&lt;/LI-USER&gt;&amp;nbsp;! Just referred to your blog in our next release of the M365 Security for IT Pros book.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Dec 2020 13:55:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2004983#M3038</guid>
      <dc:creator>Peter Daalmans</dc:creator>
      <dc:date>2020-12-20T13:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2005101#M3039</link>
      <description>&lt;P&gt;I definitely need more time to digest the whole blog but I have a few simple questions for the scenario where there is an AD Connect connection between M365 &amp;amp; Local AD. According to best practices what should I implement:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. PIM on an AD-M365 synced account with SSO (same password) so you have just in time and just enough access leveraging the benefits of machine learning in AD identity protection and/or MCAS.&lt;/P&gt;&lt;P&gt;2. PIM on an M365 admin only account that is solely used for administrator access and therefore has no (or a very limited) data for the machine learning baseline.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And we use AD Connect to give users an consistent login experience and SSO. We would love to keep the identity controls on AAD level (like with AADDS) but so far that is not possible. Do I understand above blog correctly that you would recommend avoiding the use of AD Connect? Or at least the password sync functionality but that would mean we loose SSO as well and that seems crucial in our passwordless journey...&lt;/P&gt;</description>
      <pubDate>Sun, 20 Dec 2020 15:30:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2005101#M3039</guid>
      <dc:creator>Emanuel van der Aalst</dc:creator>
      <dc:date>2020-12-20T15:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2010944#M3046</link>
      <description>&lt;P&gt;Wow, massive. Good job! Great post :clapping_hands:&lt;/img&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 22:32:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2010944#M3046</guid>
      <dc:creator>ChristianBergstrom</dc:creator>
      <dc:date>2020-12-22T22:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2012390#M3048</link>
      <description>&lt;P&gt;&lt;LI-USER uid="176421"&gt;&lt;/LI-USER&gt;I think the best option is to have any person with an admin role on Azure/M365 to have a cloud only account to use when doing such activities (ideally dedicated workstation fro global admin/security admin etc...) and otherwise have their normal account for all the rest and so you can keep AAD Connect and password sync&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2020 13:42:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2012390#M3048</guid>
      <dc:creator>ChristopheHumbert</dc:creator>
      <dc:date>2020-12-23T13:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2025062#M3055</link>
      <description>&lt;P&gt;Great stuff, thanks for sharing this.&lt;/P&gt;&lt;P&gt;I only want to put a remark regarding conditional access, be careful as it does not fully support IPv6 specially if you are filtering connection by country or location.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jan 2021 03:16:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2025062#M3055</guid>
      <dc:creator>abra07</dc:creator>
      <dc:date>2021-01-01T03:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2039824#M3066</link>
      <description>&lt;P&gt;The link to Azure Managed Workstations results in a 404 now.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 12:27:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2039824#M3066</guid>
      <dc:creator>Nathan Buuck</dc:creator>
      <dc:date>2021-01-07T12:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2043288#M3068</link>
      <description>&lt;P&gt;&lt;LI-USER uid="221690"&gt;&lt;/LI-USER&gt;&amp;nbsp;Azure Managed Workstations link is dead. Is this what is meant?&amp;nbsp;&lt;A href="https://aka.ms/securedworkstation" target="_blank" rel="noopener"&gt;https://aka.ms/securedworkstation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 11:03:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2043288#M3068</guid>
      <dc:creator>AndrePKI</dc:creator>
      <dc:date>2021-01-08T11:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2043784#M3069</link>
      <description>&lt;P&gt;Great read!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 14:51:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2043784#M3069</guid>
      <dc:creator>rmbmsft</dc:creator>
      <dc:date>2021-01-08T14:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2043826#M3070</link>
      <description>&lt;P&gt;&lt;LI-USER uid="221690"&gt;&lt;/LI-USER&gt;&amp;nbsp; - regarding the SAML token signing exposure you mentioned. Would it not be a viable choice to store the private key in a Hardware Security Module to prevent the compromise?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 15:10:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2043826#M3070</guid>
      <dc:creator>M_LE_</dc:creator>
      <dc:date>2021-01-08T15:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2233428#M3371</link>
      <description>&lt;P&gt;I really would like to see someone address M_Le's question. Why does MSFT not highlight the use of an HSM in their guidance? I know it's not a silver bullet and vulnerabilities exist in HSMs, but it is curiously absent from most guidance, except the general securing ADFS doc.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 20:17:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2233428#M3371</guid>
      <dc:creator>ZekeDaGeek</dc:creator>
      <dc:date>2021-03-24T20:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Microsoft 365 from on-premises attacks</title>
      <link>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2275098#M3402</link>
      <description>&lt;P&gt;What about with a hybrid configuration of Exchange OnPrem and Exchange Online?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If Exchange administrator should have two separate accounts for Exchange OnPrem and Exchange Online how to create new mailboxes?&lt;/P&gt;&lt;P&gt;Exchange OnPrem should create a new remote mailbox using the local account&lt;/P&gt;&lt;P&gt;Then he should manage the same mailbox in Exchange ONline using an account in Azure AD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this the expected and correct procedure?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Apr 2021 19:57:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/bc-p/2275098#M3402</guid>
      <dc:creator>KrystianWieczorek</dc:creator>
      <dc:date>2021-04-15T19:57:25Z</dc:date>
    </item>
  </channel>
</rss>

