Home
%3CLINGO-SUB%20id%3D%22lingo-sub-750784%22%20slang%3D%22en-US%22%3EMaximizing%20your%20Identity%20Security%20Posture%20with%20Azure%20Advanced%20Threat%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-750784%22%20slang%3D%22en-US%22%3E%3CH2%20id%3D%22toc-hId-1792353194%22%20id%3D%22toc-hId-1792353194%22%3ECan%20your%20Identity%20Security%20Posture%20be%20fixed%3F%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20fact%20known%20to%20security%20teams%20worldwide%20is%20that%20most%20cyber-attacks%20leverage%20existing%20unpatched%20vulnerabilities%20(ever%20heard%20of%20%3CA%20href%3D%22https%3A%2F%2Fwww.nsa.gov%2FNews-Features%2FNews-Stories%2FArticle-View%2FArticle%2F1865726%2Fnsa-cybersecurity-advisory-patch-remote-desktop-services-on-legacy-versions-of%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBlueKeep%3C%2FA%3E%3F)%2C%20and%20have%20taught%20us%20that%20often%20the%20most%20effective%20proactive%20security%20strategy%20for%20any%20organization%20is%20maintaining%20healthy%20security%20posture.%20If%20you%20haven%E2%80%99t%20done%20it%20already%2C%20patch%20your%20operating%20system%20while%20you%20read%20this!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20attacks%20continue%20to%20grow%2C%20in%20both%20sophistication%20and%20scale%2C%20maintaining%20a%20strong%20identity%20security%20posture%20has%20never%20been%20more%20important.%20Malicious%20actors%20and%20attackers%20are%20constantly%20searching%20for%20exploitable%20weak%20spots.%20According%20to%20a%20recent%20%3CA%20href%3D%22https%3A%2F%2Fblog.code42.com%2Fwp-content%2Fuploads%2F2015%2F12%2Fcode42-unpredictable-humans.png%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esurvey%3C%2FA%3Eby%20Code42%2C%20unpredictable%20humans%20remain%20the%20weakest%20link%20in%20data%20security.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhat%20can%20be%20done%20to%20mitigate%20the%20risks%20that%20users%20may%20unknowingly%20create%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--759803767%22%20id%3D%22toc-hId--759803767%22%3EIdentity%20security%20posture%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EProactive%20management%20and%20improvement%20of%20your%20identity%20security%20posture%20is%20the%20best%20defensive%20strategy%20against%20unpredictable%20human%20behavior.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBy%20investigating%20network%20traffic%20and%20gathering%20data%20directly%20from%20your%20identity%20infrastructure%20(Active%20Directory%20schema%20and%20domain%20controllers%20as%20well%20as%20other%20services)%20Azure%20Advanced%20Threat%20Protection%20(Azure%20ATP)%20can%20identify%20common%20misconfigurations%20and%20weak%20spots%20that%20can%20be%20used%20to%20compromise%20your%20environment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBy%20providing%20you%20with%20the%20relevant%20information%20to%20remediate%20the%20risks%20and%20assure%20they%20don%E2%80%99t%20resurface%2C%20our%20latest%20Identity%20Security%20Posture%20Assessment%20capabilities%20are%20your%20best%20new%20line%20of%20defense.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F132201i8C5C0EB5D574C250%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22image001.png%22%20title%3D%22image001.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20ATP%20is%20a%20cloud-based%20security%20solution%20that%20leverages%20your%20on-premises%20Active%20Directory%20signals%20to%20identify%2C%20detect%2C%20and%20investigate%20advanced%20threats%2C%20compromised%20identities%2C%20and%20malicious%20insider%20actions%20directed%20at%20your%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20ATP%20also%20enables%20SecOps%20analysts%20and%20security%20professionals%20struggling%20to%20detect%20advanced%20attacks%20in%20hybrid%20environments%20to%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMonitor%20users%2C%20entity%20behavior%2C%20and%20activities%20with%20learning-based%20analytics%3C%2FLI%3E%0A%3CLI%3EProtect%20user%20identities%20and%20credentials%20stored%20in%20Active%20Directory%3C%2FLI%3E%0A%3CLI%3EIdentify%20and%20investigate%20suspicious%20user%20activities%20and%20advanced%20attacks%20throughout%20the%20kill%20chain%3C%2FLI%3E%0A%3CLI%3EProvide%20clear%20incident%20information%20on%20a%20simple%20timeline%20for%20fast%20triage%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETake%20immediate%20action%20to%20secure%20your%20organization%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsing%20Azure%20ATP%E2%80%99s%20identity%20security%20posture%20assessments%2C%20a%20Security%20Administrator%20can%20quickly%20understand%20if%20an%20assessment%20requires%20their%20immediate%20attention%20using%20the%20suggested%20remediation.%20%26nbsp%3BBy%20providing%20data%2C%20context%20(most%20critical%20entities)%20and%20urgency%20ranking%2C%20your%20security%20administrators%20can%20refocus%20on%20what%20really%20matters.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EReady%20to%20dive%20even%20deeper%3F%20Azure%20ATP%20provides%20the%20relevant%20information%20on%20why%20each%20assessment%20is%20important%20to%20your%20organization%2C%20along%20with%20all%20the%20contextual%20information%20needed%20for%20your%20security%20team%20to%20act%20and%20improve%20your%20security%20posture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EField%20example%3A%20Still%20hunting%20legacy%20protocol%20usage%3F%20The%20hunt%20is%20over.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20security%20community%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fmiriamxyra%2F2017%2F11%2F07%2Fstop-using-lan-manager-and-ntlmv1%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eneeds%3C%2FA%3Ean%20easy%20way%20to%20identify%20and%20access%20use%20of%20legacy%20authentication%20protocols%20such%20as%20NTLMv1%20in%20organizations%20of%20all%20sizes.%20Additionally%2C%20most%20organizations%20accept%20the%20risk%20of%20legacy%20protocols%20because%20they%20fear%20existing%20line%20of%20business%20apps%20will%20cease%20functioning.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELeveraging%20Azure%20ATP%20sensors%20on%20the%20domain%20controller%2C%20we%20surface%20the%20riskiest%20entities%20in%20your%20organization%20that%20continue%20authenticating%20with%20NTLMv1%20as%20a%20remediation%20guide.%20%26nbsp%3BIt%E2%80%99s%20key%20to%20remediate%20legacy%20protocols%20before%20disabling%20NTLMv1%20usage%20completely%20with%20use%20of%20a%20%3CSTRONG%3ELAN%20Manager%20authentication%20level%3C%2FSTRONG%3Egroup%20policy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F131691iE7608F2F00C4C12F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22ispm2.png%22%20title%3D%22ispm2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EField%20example%3A%20Stop%20unconstrained%20Kerberos%20delegations%20in%20their%20tracks%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESeveral%20methods%20of%20Active%20Directory-based%20attacks%20are%20known%20to%20leverage%20often%20misconfigured%20entities%2C%20especially%20ones%20set%20with%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2F389thoughts%2F2017%2F04%2F18%2Fget-rid-of-accounts-that-use-kerberos-unconstrained-delegation%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eunconstrained%3C%2FA%3E%20Kerberos%20delegation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEntities%20capable%20of%20unconstrained%20Kerberos%20delegation%20enjoy%20nearly%20unlimited%20organizational%20power%2C%20allowing%20them%20to%20impersonate%20any%20service%20as%20another%20entity%2C%20much%20like%20how%20domain%20controllers%20operate%20in%20Active%20Directory.%20It%20is%20strongly%20recommended%20to%20modify%20this%20permission%20to%20allow%20for%20more%20controlled%2C%20constrained%2C%20or%20resource-based%20Kerberos%20delegation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBy%20querying%20the%20active%20schema%2C%20Azure%20ATP%20surfaces%20all%20non-domain%20controller%20entities%20currently%20configured%20in%20your%20organization%20with%20unconstrained%20Kerberos%20delegation%2C%20enabling%20you%20to%20act%20immediately%20to%20remediate%20the%20threat.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F131692i5381CFE248A514EA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22ispm3.png%22%20title%3D%22ispm3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDemonstrate%20impact%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EImproving%20your%20identity%20security%20posture%20as%20an%20ongoing%20process%20is%20a%20proven%20way%20to%20make%20your%20organization%20more%20resilient%20to%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETogether%2C%20with%20our%20team%20of%20security%20researchers%20and%20developers%2C%20these%20new%20Azure%20ATP%20assessments%20provide%20continuous%20support%20to%20your%20security%20admins%20and%20CISOs%20by%20providing%20an%20accurate%20picture%20of%20what%20your%20security%20posture%20looks%20like%20and%20which%20issues%20require%20immediate%20remediation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUse%20Azure%20ATP%20to%20provide%20your%20teams%20with%20all%20the%20context%20they%20need%20to%20monitor%2C%20improve%2C%20and%20secure%20your%20environment%20and%20deliver%20better%2C%20long-term%20security%20across%20your%20enterprise.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20ATP%20is%20already%20a%20part%20of%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FSecurity-Privacy-and-Compliance%2FMaximizing-Your-Security-Posture-with-Azure-ATP%2Fba-p%2F772052%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Secure%20Score%3C%2FA%3E%20and%20we%20will%20add%20dedicated%20scoring%20for%20each%20of%20these%20new%20assessments%20to%20Secure%20Score%E2%80%99s%20identity%20category%20in%20a%20later%20update.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Faatpwebinar%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESign-up%3C%2FA%3E%20to%20attend%20our%20webinar%20where%20we%20walk%20you%20through%20how%20to%20leverage%20Azure%20ATP%20to%20maximize%20your%20security%20posture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELearn%20more%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-isp-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EUnderstanding%20Identity%20Security%20Posture%3C%2FA%3E%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-cas-isp-clear-text%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20assessment%3A%20Entities%20exposing%20credentials%20in%20cleartext%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-cas-isp-legacy-protocols%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20assessment%3A%20Legacy%20protocols%20usage%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-cas-isp-weak-cipher%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20assessment%3A%20Weak%20cipher%20usage%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-cas-isp-unconstrained-kerberos%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20assessment%3A%20Unsecure%20Kerberos%20delegation%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-cas-isp-print-spooler%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20assessment%3A%20Domain%20Controllers%20with%20Print%20Spooler%20service%20available%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-cas-isp-dormant-entities%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20assessment%3A%20Dormant%20entities%20in%20sensitive%20groups%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH2%20id%3D%22toc-hId-983006568%22%20id%3D%22toc-hId-983006568%22%3EGet%20Started%20Today%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%E2%80%99re%20one%20of%20the%20many%20enterprise%20customers%20already%20using%20Azure%20ATP%20and%20want%20to%20use%20these%20new%20Identity%20Security%20Posture%20Management%20assessments%2C%26nbsp%3B%20turn%20on%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F20%2Finvestigating-identity-threats-hybrid-cloud-environments%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Enew%20identity%20threat%20investigation%20experience%3C%2FA%3Etoday.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EJust%20starting%20your%20Azure%20ATP%20journey%3F%20begin%20a%20trial%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fenterprise-mobility-security%2Fmtptrial%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Threat%20Protection%3C%2FA%3Eto%20experience%20the%20benefits%20of%20the%20most%20comprehensive%2C%20integrated%2C%20and%20secure%20threat%20protection%20solution%20for%20the%20modern%20workplace.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EJoin%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Advanced-Threat-Protection%2Fbd-p%2FAzureAdvancedThreatProtection%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20ATP%20community%3C%2FA%3Efor%20the%20latest%20updates%20and%20news%20about%20identity%20security%20posture%20assessments%20and%20management.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-750784%22%20slang%3D%22en-US%22%3E%3CP%3EWhat%20can%20be%20done%20to%20mitigate%20the%20risks%20that%20users%20may%20unknowingly%20create%3F%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-750784%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Advanced%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Can your Identity Security Posture be fixed?

 

A fact known to security teams worldwide is that most cyber-attacks leverage existing unpatched vulnerabilities (ever heard of BlueKeep?), and have taught us that often the most effective proactive security strategy for any organization is maintaining healthy security posture. If you haven’t done it already, patch your operating system while you read this!

 

As attacks continue to grow, in both sophistication and scale, maintaining a strong identity security posture has never been more important. Malicious actors and attackers are constantly searching for exploitable weak spots. According to a recent survey by Code42, unpredictable humans remain the weakest link in data security.

 

What can be done to mitigate the risks that users may unknowingly create?

 

Identity security posture

 

Proactive management and improvement of your identity security posture is the best defensive strategy against unpredictable human behavior.

 

By investigating network traffic and gathering data directly from your identity infrastructure (Active Directory schema and domain controllers as well as other services) Azure Advanced Threat Protection (Azure ATP) can identify common misconfigurations and weak spots that can be used to compromise your environment.

 

By providing you with the relevant information to remediate the risks and assure they don’t resurface, our latest Identity Security Posture Assessment capabilities are your best new line of defense. 

image001.png

 

 

Azure ATP is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.

 

Azure ATP also enables SecOps analysts and security professionals struggling to detect advanced attacks in hybrid environments to:

 

  • Monitor users, entity behavior, and activities with learning-based analytics
  • Protect user identities and credentials stored in Active Directory
  • Identify and investigate suspicious user activities and advanced attacks throughout the kill chain
  • Provide clear incident information on a simple timeline for fast triage

 

Take immediate action to secure your organization

 

Using Azure ATP’s identity security posture assessments, a Security Administrator can quickly understand if an assessment requires their immediate attention using the suggested remediation.  By providing data, context (most critical entities) and urgency ranking, your security administrators can refocus on what really matters.

 

Ready to dive even deeper? Azure ATP provides the relevant information on why each assessment is important to your organization, along with all the contextual information needed for your security team to act and improve your security posture.

 

Field example: Still hunting legacy protocol usage? The hunt is over.

 

The security community needs an easy way to identify and access use of legacy authentication protocols such as NTLMv1 in organizations of all sizes. Additionally, most organizations accept the risk of legacy protocols because they fear existing line of business apps will cease functioning.

 

Leveraging Azure ATP sensors on the domain controller, we surface the riskiest entities in your organization that continue authenticating with NTLMv1 as a remediation guide.  It’s key to remediate legacy protocols before disabling NTLMv1 usage completely with use of a LAN Manager authentication level group policy.

 

ispm2.png

 

 

Field example: Stop unconstrained Kerberos delegations in their tracks

 

Several methods of Active Directory-based attacks are known to leverage often misconfigured entities, especially ones set with unconstrained Kerberos delegation.

 

Entities capable of unconstrained Kerberos delegation enjoy nearly unlimited organizational power, allowing them to impersonate any service as another entity, much like how domain controllers operate in Active Directory. It is strongly recommended to modify this permission to allow for more controlled, constrained, or resource-based Kerberos delegation.

 

By querying the active schema, Azure ATP surfaces all non-domain controller entities currently configured in your organization with unconstrained Kerberos delegation, enabling you to act immediately to remediate the threat.

 

ispm3.png

 

Demonstrate impact

 

Improving your identity security posture as an ongoing process is a proven way to make your organization more resilient to threats.

 

Together, with our team of security researchers and developers, these new Azure ATP assessments provide continuous support to your security admins and CISOs by providing an accurate picture of what your security posture looks like and which issues require immediate remediation.

 

Use Azure ATP to provide your teams with all the context they need to monitor, improve, and secure your environment and deliver better, long-term security across your enterprise.

 

Azure ATP is already a part of Microsoft Secure Score and we will add dedicated scoring for each of these new assessments to Secure Score’s identity category in a later update.

 

Sign-up to attend our webinar where we walk you through how to leverage Azure ATP to maximize your security posture.

 

Learn more:

 

Get Started Today

 

If you’re one of the many enterprise customers already using Azure ATP and want to use these new Identity Security Posture Management assessments,  turn on the new identity threat investigation experience today.

 

Just starting your Azure ATP journey? begin a trial of Microsoft Threat Protection to experience the benefits of the most comprehensive, integrated, and secure threat protection solution for the modern workplace.

 

Join the Azure ATP community for the latest updates and news about identity security posture assessments and management.