Home
%3CLINGO-SUB%20id%3D%22lingo-sub-292510%22%20slang%3D%22en-US%22%3EConditional%20access%3A%20Ensuring%20that%20only%20secure%20users%20and%20devices%20get%20access%20to%20sensitive%20data%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-292510%22%20slang%3D%22en-US%22%3E%3CP%3EWith%20the%20increasingly%20wider%20perimeter%20that%20security%20teams%20need%20to%20manage%2C%20it%E2%80%99s%20vital%20to%20ensure%20that%20only%20trusted%20users%2C%20on%20trusted%20devices%2C%20under%20the%20right%20circumstances%20are%20granted%20access%20to%20sensitive%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIt%20is%20a%20common%20first%20step%20for%20attackers%2C%20who%20are%20seeking%20access%20to%20sensitive%20corporate%20information%2C%20to%20first%20attempt%20to%20breach%20the%20enterprise%20by%20gaining%20a%20foothold%20on%20a%20corporate%20device.%20Attackers%20apply%20various%20methods%20such%20as%20social%20engineering%2C%20malware%2C%20or%20other%20methods.%20Where%20they%20succeed%2C%20it%20poses%20a%20serious%20risk%20for%20an%20organization%20as%20attackers%20can%20leverage%20their%20control%20over%20the%20compromised%20device%20to%20gain%20access%20to%20sensitive%20corporate%20resources.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20address%20this%20concern%2C%20Windows%20Defender%20Advanced%20Threat%20Protection%20(Windows%20Defender%20ATP)%20and%20Intune%20created%20an%20integrated%20sensitive%20data%20access%20control%20solution%20through%20%3CA%20title%3D%22Conditional%20access%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-atp%2Fconditional-access-windows-defender-advanced-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3EConditional%20access%3C%2FEM%3E%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EConditional%20access%3C%2FEM%3E%20uses%20a%20combination%20of%20user%2C%20location%2C%20device%2C%20application%2C%20and%20risk%20conditions%20to%20ensure%20that%20only%20trusted%20users%20on%20trusted%20devices%20can%20access%20sensitive%20data.%20Windows%20Defender%20ATP%20measures%20and%20provides%20assurance%20that%20devices%20are%20trusted.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERestricting%20data%20access%20through%20device%20risk%20assessments%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIt%20starts%20with%20device%20monitoring%20through%20Windows%20Defender%20ATP.%20Detections%20that%20pose%20a%20potential%20compromise%20will%20immediately%20raise%20the%20risk%20level%20associated%20with%20device.%20Any%20change%20in%20device%20risk%20level%20is%20communicated%20immediately%20to%20Intune%20where%20it%20affects%20measured%20device%20compliance%20(or%20trust)%20and%20per%20corporate%20set%20policy%2C%20used%20in%20Azure%20Active%20Directory%20(Azure%20AD)%20to%20restrict%20access%20to%20resources.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20a%20device%20is%20determined%20to%20be%20of%20high%20risk%2C%20access%20from%20the%20device%20to%20corporate%20services%20and%20data%20governed%20by%20Azure%20AD%20is%20restricted.%20So%2C%20even%20if%20the%20attacker%20was%20successful%20in%20establishing%20a%20foothold%20through%20the%20compromised%20device%2C%20they%E2%80%99re%20immediately%20prevented%20from%20accessing%20sensitive%20corporate%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAddressing%20the%20risk%20on%20the%20device%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWhile%20it%E2%80%99s%20great%20that%20the%20attacker%20was%20prevented%20from%20accessing%20sensitive%20data%2C%20the%20risk%20on%20the%20device%20still%20needs%20to%20be%20addressed.%20This%20is%20where%20Windows%20Defender%20ATP%E2%80%99s%20automated%20investigation%20and%20remediation%20process%20comes%20in%20to%20address%20the%20root%20cause%20of%20the%20compromise%2C%20remediating%20the%20device%20to%20a%20safe%20state%20which%20in%20turn%20lowers%20the%20risk%20assessment%20of%20the%20device%2C%20consequently%20removing%20access%20restrictions%20in%20Intune%20and%20AAD.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet's%20see%20how%20it's%20done%3A%3C%2FP%3E%0A%3CP%20style%3D%22font-weight%3A%20400%3B%22%3E%3CSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FBbQ3G2owiMo%253Ffeature%253Doembed%26amp%3Burl%3Dhttp%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DBbQ3G2owiMo%26amp%3Bimage%3Dhttps%253A%252F%252Fi.ytimg.com%252Fvi%252FBbQ3G2owiMo%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22200%22%20height%3D%22112%22%20scrolling%3D%22no%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%20title%3D%22Video%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%20style%3D%22font-weight%3A%20400%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EConditional%20access%20in%20action%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESeveral%20weeks%20ago%2C%20the%20Windows%20Defender%20Advanced%20Threat%20Protection%20(Windows%20Defender%20ATP)%20team%20uncovered%20a%20new%20cyberattack%20that%20targeted%20several%20high-profile%20organizations%20in%20the%20energy%2C%20and%20food%20and%20beverage%20sectors%20in%20Asia.%20Given%20the%20target%20region%20and%20verticals%2C%20the%20attack%20chain%2C%20and%20the%20toolsets%20used%2C%20we%20believe%20the%20threat%20actor%20that%20the%20industry%20refers%20to%20as%20Tropic%20Trooper%20was%20likely%20behind%20the%20new%20attack.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20attack%20set%20off%20numerous%20Windows%20Defender%20ATP%20alerts%20and%20triggered%20the%20device%20risk%20calculation%20mechanism%2C%20which%20labeled%20the%20affected%20machines%20with%20the%20highest%20risk.%20The%20high%20device%20risk%20score%20put%20the%20affected%20machines%20at%20the%20top%20of%20the%20list%20in%20Windows%20Defender%20Security%20Center%2C%20which%20led%20to%20the%20early%20detection%20and%20discovery%20of%20the%20attack.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThrough%20%3CEM%3EConditional%20access%3C%2FEM%3E%2C%20compromised%20machines%20are%20blocked%20from%20accessing%20critical%20corporate%20assets.%20This%20protects%20organizations%20from%20the%20serious%20risk%20of%20attackers%20leveraging%20compromised%20devices%20to%20perform%20cyberespionage%20and%20other%20types%20of%20attacks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20read%20more%20about%20this%20case%20and%20how%20Windows%20Defender%20ATP-driven%20conditional%20access%20protects%20corporate%20users%2C%20devices%2C%20and%20data%2C%20read%3A%20%3CA%20href%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fmicrosoftsecure%2F2018%2F11%2F28%2Fwindows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3EWindows%20Defender%20ATP%20device%20risk%20score%20exposes%20new%20cyberattack%2C%20drives%20Conditional%20access%20to%20protect%20networks%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22font-weight%3A%20400%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EConclusion%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EConditional%20access%3C%2FEM%3E%20is%20helping%20many%20Windows%20Defender%20ATP%20customers%20to%20improve%20their%20level%20of%20protection%20from%20threats%20by%20assessing%20the%20risk%20of%20each%20request%20for%20access%20to%20a%20system%2C%20an%20application%2C%20or%20data%20in%20real%20time%2C%20restricting%20access%20to%20sensitive%20data%20when%20a%20potential%20compromise%20is%20identified%20and%20automatically%20remediating%20the%20root%20cause%20of%20the%20compromise.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsing%20%3CEM%3EConditional%20access%3C%2FEM%3E%20provides%20more%20reason%20to%20choose%20Microsoft%20365%20to%20protect%20critical%20business%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWant%20to%20take%20advantage%20of%20this%20capability%3F%20Start%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-atp%2Fconditional-access-windows-defender-advanced-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3C%2FSPAN%3E%20to%20learn%20more%20about%20%3CEM%3EConditional%20access%3C%2FEM%3E%20in%20Windows%20Defender%20ATP.%3C%2FP%3E%0A%3CP%20style%3D%22font-weight%3A%20400%3B%22%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-292510%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EWith%20the%20increasingly%20wide%3C%2FSPAN%3E%3CSPAN%3Er%3C%2FSPAN%3E%3CSPAN%3E%20perimeter%20that%20security%20teams%20need%20to%20manage%2C%20it%E2%80%99s%20vital%20to%20ensure%20that%20only%20%3C%2FSPAN%3E%3CSPAN%3Etrusted%20%3C%2FSPAN%3E%3CSPAN%3Eusers%2C%20on%20t%3C%2FSPAN%3E%3CSPAN%3Eru%3C%2FSPAN%3E%3CSPAN%3Ested%20%3C%2FSPAN%3E%3CSPAN%3Edevices%2C%20under%20the%20right%20circumstances%20are%20granted%20access%20to%20sensitive%20data.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

With the increasingly wider perimeter that security teams need to manage, it’s vital to ensure that only trusted users, on trusted devices, under the right circumstances are granted access to sensitive data.

 

It is a common first step for attackers, who are seeking access to sensitive corporate information, to first attempt to breach the enterprise by gaining a foothold on a corporate device. Attackers apply various methods such as social engineering, malware, or other methods. Where they succeed, it poses a serious risk for an organization as attackers can leverage their control over the compromised device to gain access to sensitive corporate resources.

 

To address this concern, Windows Defender Advanced Threat Protection (Windows Defender ATP) and Intune created an integrated sensitive data access control solution through Conditional access.

 

Conditional access uses a combination of user, location, device, application, and risk conditions to ensure that only trusted users on trusted devices can access sensitive data. Windows Defender ATP measures and provides assurance that devices are trusted.

  

Restricting data access through device risk assessments

It starts with device monitoring through Windows Defender ATP. Detections that pose a potential compromise will immediately raise the risk level associated with device. Any change in device risk level is communicated immediately to Intune where it affects measured device compliance (or trust) and per corporate set policy, used in Azure Active Directory (Azure AD) to restrict access to resources.

 

When a device is determined to be of high risk, access from the device to corporate services and data governed by Azure AD is restricted. So, even if the attacker was successful in establishing a foothold through the compromised device, they’re immediately prevented from accessing sensitive corporate data.

 

Addressing the risk on the device

While it’s great that the attacker was prevented from accessing sensitive data, the risk on the device still needs to be addressed. This is where Windows Defender ATP’s automated investigation and remediation process comes in to address the root cause of the compromise, remediating the device to a safe state which in turn lowers the risk assessment of the device, consequently removing access restrictions in Intune and AAD.

 

Let's see how it's done:

 

Conditional access in action

Several weeks ago, the Windows Defender Advanced Threat Protection (Windows Defender ATP) team uncovered a new cyberattack that targeted several high-profile organizations in the energy, and food and beverage sectors in Asia. Given the target region and verticals, the attack chain, and the toolsets used, we believe the threat actor that the industry refers to as Tropic Trooper was likely behind the new attack.

 

The attack set off numerous Windows Defender ATP alerts and triggered the device risk calculation mechanism, which labeled the affected machines with the highest risk. The high device risk score put the affected machines at the top of the list in Windows Defender Security Center, which led to the early detection and discovery of the attack.

 

Through Conditional access, compromised machines are blocked from accessing critical corporate assets. This protects organizations from the serious risk of attackers leveraging compromised devices to perform cyberespionage and other types of attacks.

 

To read more about this case and how Windows Defender ATP-driven conditional access protects corporate users, devices, and data, read: Windows Defender ATP device risk score exposes new cyberattack, drives Conditional access to protect... 

 

Conclusion

Conditional access is helping many Windows Defender ATP customers to improve their level of protection from threats by assessing the risk of each request for access to a system, an application, or data in real time, restricting access to sensitive data when a potential compromise is identified and automatically remediating the root cause of the compromise.

 

Using Conditional access provides more reason to choose Microsoft 365 to protect critical business data.

 

Want to take advantage of this capability? Start here to learn more about Conditional access in Windows Defender ATP.