Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1225302%22%20slang%3D%22en-US%22%3ENew%20tools%20to%20block%20legacy%20authentication%20in%20your%20organization%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1225302%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20folks%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%E2%80%99re%20a%20regular%20reader%20of%20this%20blog%20series%2C%20you%20know%20we%E2%80%99ve%20been%20advocating%20for%20admins%20to%20enable%20multi-factor%20authentication%20(MFA)%20for%20a%20while.%20In%20one%20of%20my%20previous%20posts%2C%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fyour-pa-word-doesn-t-matter%2Fba-p%2F731984%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EYour%20Pa%24%24word%20doesn%E2%80%99t%20matter%3C%2FA%3E%2C%20I%20showed%20how%20vulnerable%20passwords%20are%20to%20attack%20and%20why%20enabling%20MFA%20reduces%20the%20likelihood%20of%20being%20compromised%20by%20more%20than%2099.9%20percent.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EFor%20MFA%20to%20be%20effective%2C%20you%20also%20need%20to%20block%20legacy%20authentication.%20%3C%2FEM%3E%3C%2FSTRONG%3EThis%20is%20because%20legacy%20authentication%20protocols%20like%20POP%2C%20SMTP%2C%20IMAP%2C%20and%20MAPI%20can%E2%80%99t%20enforce%20MFA%2C%20making%20them%20preferred%20entry%20points%20for%20adversaries%20attacking%20your%20organization.%20In%20September%202019%2C%20Exchange%20Online%20%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fhelp%2F4521831%2Fexchange-online-deprecating-basic-auth%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eannounced%20the%20deprecation%20of%20legacy%20authentication%3C%2FA%3E%20prior%20to%20its%20removal%20on%20October%2013%2C%202020.%20For%20more%20on%20the%20impact%20of%20legacy%20auth%2C%20and%20how%20we%20weaned%20Microsoft%20users%20off%20of%20it%2C%20check%20out%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DB_mhJO2qHlQ%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etalk%20Lee%20Walker%20and%20I%20gave%20at%20RSA%3C%2FA%3E%20a%20few%20weeks%20ago.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20numbers%20on%20legacy%20authentication%20from%20an%20analysis%20of%20Azure%20Active%20Directory%20(Azure%20AD)%20traffic%20are%20stark%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMore%20than%2099%20percent%20of%20password%20spray%20attacks%20use%20legacy%20authentication%20protocols%3C%2FLI%3E%0A%3CLI%3EMore%20than%2097%20percent%20of%20credential%20stuffing%20attacks%20use%20legacy%20authentication%3C%2FLI%3E%0A%3CLI%3EAzure%20AD%20accounts%20in%20organizations%20that%20have%20disabled%20legacy%20authentication%20experience%2067%20percent%20fewer%20compromises%20than%20those%20where%20legacy%20authentication%20is%20enabled%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22LegacyAuth.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176620iE646C57F420E87DC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22LegacyAuth.jpg%22%20alt%3D%22LegacyAuth.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDisabling%20legacy%20authentication%20for%20users%20is%20a%20must-do%20on%20your%20identity%20security%20checklist.%20In%20this%20blog%20post%2C%20I%E2%80%99ve%20asked%20Daniel%20Wood%2C%20a%20PM%20on%20the%20Identity%20Protection%20team%2C%20to%20walk%20through%20all%20the%20steps%20you%20need%20to%20take%20to%20secure%20your%20organization%20and%20introduce%20three%20changes%20we%E2%80%99ve%20made%20in%20Azure%20AD%20to%20make%20your%20job%20easier.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we%E2%80%99d%20love%20to%20hear%20your%20thoughts!%20Ping%20me%20on%20Twitter%20(%3CA%20href%3D%22http%3A%2F%2Ftwitter.com%2Falex_t_weinert%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40alex_t_weinert%3C%2FA%3E)%20and%20stay%20safe%20out%20there.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHey%20everyone!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20one%20of%20the%20PMs%20on%20the%20Identity%20Protection%20team%2C%20I%E2%80%99m%20going%20to%20walk%20you%20through%20a%20step-by-step%20guide%20to%20blocking%20legacy%20authentication%20in%20your%20organization.%20But%20first%2C%20I%E2%80%99m%20excited%20to%20announce%20three%20new%20capabilities%20our%20team%20has%20released%20to%20make%20the%20job%20easier.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EThe%20sign-in%20logs%20are%20now%20available%20in%20the%20Azure%20portal%20to%20all%20tenants%20for%207%20days%3C%2FLI%3E%0A%3CLI%3EThe%20sign-in%20logs%20now%20include%20the%20user%20agent%20used%20to%20sign%20in%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blog1.png%22%20style%3D%22width%3A%20746px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176642i2E25FDE3F2B2D18E%2Fimage-dimensions%2F746x396%3Fv%3D1.0%22%20width%3D%22746%22%20height%3D%22396%22%20title%3D%22blog1.png%22%20alt%3D%22blog1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%26nbsp%3BThe%20sign-in%20logs%20client%20apps%20filter%20now%20includes%20all%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fexchange%2Fclients-and-mobile-in-exchange-online%2Fdisable-basic-authentication-in-exchange-online%23authentication-policy-procedures-in-exchange-online%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Elegacy%20Exchange%20Online%20protocols%3C%2FA%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blog2.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176643i511B4490F281FE34%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22blog2.PNG%22%20alt%3D%22blog2.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EBlocking%20legacy%20authentication%20in%20your%20organization%20requires%20the%20right%20data.%20We%20worked%20with%20our%20customers%20and%20built%20the%20tools%20they%20asked%20for%20to%20give%20them%20the%20insights%20they%20need.%20The%20changes%20we%E2%80%99re%20announcing%20today%20will%20give%20all%20of%20you%20even%20more%20data%20about%20legacy%20authentication%20usage%20in%20your%20organization%2C%20so%20you%20can%20turn%20it%20off%20systematically%20and%20get%20the%20full%20benefits%20of%20protecting%20your%20organization%20with%20MFA.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%20id%3D%22toc-hId--684772595%22%3EStep%201%3A%20Understanding%20legacy%20authentication%20usage%20in%20your%20organization%3C%2FH4%3E%0A%3CP%3EThe%20first%20place%20to%20look%20when%20identifying%20legacy%20authentication%20usage%20in%20your%20organization%20is%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Freports-monitoring%2Fconcept-sign-ins%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20AD%20Sign-ins%20page%2C%3C%2FA%3E%20which%20is%20now%20available%20in%20the%20Azure%20portal%20to%20all%20tenants%20for%207%20days.%20The%20sign-in%20logs%20provide%20a%20wealth%20of%20information%2C%20including%20user%2C%20application%2C%20client%20app%2C%20device%E2%80%94and%20now%E2%80%94user%20agent.%20Filtering%20by%20client%20app%20will%20let%20you%20identify%20sign-ins%20by%20modern%20and%20legacy%20authentication.%20Client%20apps%2C%20including%20Browser%20or%20Mobile%20Apps%20and%20Desktop%20clients%2C%20are%20considered%20modern%20authentication%2C%20while%20the%20others%2C%20such%20as%20IMAP%2C%20POP%2C%20and%20MAPI%20are%20considered%20legacy%20authentication.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22legauth3.JPG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176628i649CA94A37288DEA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22legauth3.JPG%22%20alt%3D%22legauth3.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELarger%20customers%20will%20need%20to%20aggregate%20this%20data%20into%20a%20report%20or%20analyze%20the%20data%20using%20queries%20to%20fully%20understand%20patterns%20of%20legacy%20authentication%20usage.%20There%20are%20many%20ways%20to%20do%20this%20using%20Azure%20Monitor%20(with%20Azure%20AD%20Workbooks%20or%20Log%20Analytics)%2C%20Excel%2C%20Microsoft%20Graph%20API%2C%20or%20a%20SIEM%20system.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAggregating%20reports%20in%20Azure%20AD%20Workbooks%20and%20Log%20Analytics%20using%20Azure%20Monitor%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20recommend%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Freports-monitoring%2Fhowto-integrate-activity-logs-with-log-analytics%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Estreaming%20your%20sign-ins%20to%20Azure%20Monitor%3C%2FA%3E%20for%20real-time%20reporting%20and%20aggregation%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Freports-monitoring%2Fhowto-use-azure-monitor-workbooks%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20AD%20Workbooks%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fazure-monitor%2Flog-query%2Fget-started-portal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELog%20Analytics%3C%2FA%3E.%20Azure%20Monitor%20makes%20it%20easy%20to%20set%20the%20retention%20period%20and%20even%20set%20a%20daily%20cap%20on%20the%20amount%20of%20data%20stored.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20your%20sign-ins%20are%20streaming%20to%20Azure%20Monitor%2C%20navigate%20to%20the%20Workbooks%20tab%20in%20Azure%20AD%20and%20open%20the%20new%20%3CSTRONG%3ESign-ins%20using%20Legacy%20Auth%3C%2FSTRONG%3E%20workbook%3CEM%3E.%20%3C%2FEM%3EHere%20you%20will%20see%20information%20about%20which%20client%20apps%20are%20being%20used%20in%20your%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22legauth4.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176629iD5E11B1E3E08B681%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22legauth4.png%22%20alt%3D%22legauth4.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsing%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fkusto%2Fquery%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EKusto%20Query%20Language%20(KQL)%3C%2FA%3E%3CSPAN%3E%2C%3C%2FSPAN%3E%20you%20can%20write%20your%20own%20queries%20to%20create%20custom%20reports%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fazure-monitor%2Flog-query%2Fget-started-portal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Log%20Analytics%3C%2FA%3E.%20In%20Azure%20AD%2C%20simply%20click%20%3CSTRONG%3ELogs%20%3C%2FSTRONG%3Eto%20begin%20writing%20your%20own%20queries.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22legauth5.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176630iDC10BB4D8CD231B2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22legauth5.png%22%20alt%3D%22legauth5.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDownloading%20sign-ins%20to%20Excel%20in%20JSON%20or%20CSV%20format%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ETo%20download%20the%20sign-ins%20to%20JSON%20or%20CSV%20format%2C%20click%20on%20the%20%3CSTRONG%3EDownload%20%3C%2FSTRONG%3Ebutton%20at%20the%20top%20of%20the%20Sign-ins%20page.%20If%20you%20filter%20the%20sign-ins%20by%20certain%20client%20apps%2C%20your%20download%20will%20be%20based%20on%20the%20filter%20selections%20you%E2%80%99ve%20made.%20We%20recommend%20downloading%20to%20JSON%20because%20this%20format%20includes%20all%20the%20sign-in%20details%2C%20including%20user%20agent.%20The%20CSV%20format%20will%20only%20show%20the%20top-level%20information%20in%20each%20row%20of%20the%20sign-in%20logs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22legauth6.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176632i7D2C3F14DBD494BF%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22legauth6.png%22%20alt%3D%22legauth6.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-bottom%3A%203.0pt%3B%20line-height%3A%20normal%3B%22%3EYou%20can%20then%20open%20a%20JSON%20file%20in%20Excel%20using%20the%20%3CSTRONG%3EGet%20Data%3C%2FSTRONG%3E%20function.%3C%2FP%3E%0A%3CP%20style%3D%22margin-bottom%3A%203.0pt%3B%20line-height%3A%20normal%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22legauth7.png%22%20style%3D%22width%3A%20728px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176633i09ED100103EC33B8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22legauth7.png%22%20alt%3D%22legauth7.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-bottom%3A%203.0pt%3B%20line-height%3A%20normal%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUsing%20the%20Microsoft%20Graph%20API%20to%20get%20sign-ins%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIf%20you%20need%20to%20download%20more%20than%20250%2C000%20sign-in%20records%2C%20you%20can%20do%20so%20using%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fgraph%2Fapi%2Fresources%2Fazure-ad-auditlog-overview%3Fview%3Dgraph-rest-1.0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eaudit%20logs%20API%20in%20Microsoft%20Graph%3C%2FA%3E.%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%20id%3D%22toc-hId-1802740238%22%3E%26nbsp%3B%3C%2FH4%3E%0A%3CH4%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%20id%3D%22toc-hId--4714225%22%3EStep%202%3A%20Create%20Conditional%20Access%20policies%20in%20report-only%20mode%3C%2FH4%3E%0A%3CP%3EOnce%20you%E2%80%99ve%20identified%20legacy%20authentication%20usage%20patterns%20in%20your%20organization%2C%20it%E2%80%99s%20time%20to%20start%20blocking%20legacy%20authentication.%20In%20most%20organizations%2C%20you%20can%E2%80%99t%20block%20legacy%20authentication%20for%20everyone%20right%20away.%20We%20recommend%20starting%20by%20blocking%20legacy%20authentication%20for%20only%20the%20group%20of%20users%20that%20don%E2%80%99t%20use%20it.%20As%20you%20make%20progress%20upgrading%20to%20modern%20authentication%20and%20disabling%20legacy%20authentication%2C%20you%20can%20expand%20the%20list%20of%20users%20in%20the%20group.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20easiest%20way%20to%20monitor%20the%20impact%20of%20blocking%20legacy%20authentication%20without%20disrupting%20users%20is%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fconditional-access%2Fconcept-conditional-access-report-only%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConditional%20Access%20report-only%20mode%3C%2FA%3E.%20Policies%20in%20report-only%20mode%20are%20evaluated%20at%20sign-in%2C%20but%20the%20grant%20controls%20are%20not%20enforced%2C%20so%20you%20can%20see%20who%20is%20using%20legacy%20authentication%20in%20real%20time%20without%20blocking%20them.%20Start%20by%20creating%20a%20report-only%20policy%20that%20blocks%20legacy%20authentication%20for%20everyone%20in%20your%20organization.%20Remember%20that%20Conditional%20Access%20policies%20do%20not%20apply%20to%20legacy%20authentication%20clients%20by%20default%2C%20so%20you%20need%20to%20explicitly%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fconditional-access%2Fblock-legacy-authentication%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Escope%20your%20policy%20to%20block%20client%20apps%3C%2FA%3E%20that%20are%20not%20Browser%20or%20Modern%20authentication%20clients%20(i.e.%20legacy%20authentication%20clients).%20Let%20the%20policy%20run%20for%20a%20few%20days%20to%20get%20the%20most%20accurate%20reflection%20of%20legacy%20authentication%20usage%20in%20your%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22legauth8.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176634i79DE7A9D7FE85F4D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22legauth8.png%22%20alt%3D%22legauth8.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-bottom%3A%203.0pt%3B%20line-height%3A%20normal%3B%22%3EYou%20can%20determine%20how%20many%20users%20will%20be%20blocked%20by%20the%20policy%20by%20using%20the%20new%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Freports-monitoring%2Fhowto-use-azure-monitor-workbooks%23conditional-access-insights%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EConditional%20Access%20Insights%3C%2FSTRONG%3E%3C%2FA%3E%20workbook%20and%20selecting%20your%20policy%20in%20the%20Conditional%20Access%20policy%20filter.%20To%20access%20this%20workbook%20(after%20you%20have%20integrated%20your%20sign-in%20logs%20with%20Azure%20Monitor)%2C%20navigate%20to%20the%20Workbook%20blade%20and%20select%20%3CSTRONG%3EConditional%20Access%20Insights%3C%2FSTRONG%3E.%20Clicking%20on%20a%20tile%20such%20as%20Failure%20will%20filter%20the%20dashboard%20by%20those%20users%20that%20would%20be%20blocked%20by%20the%20policy.%20Create%20an%20exclusion%20group%20and%20add%20any%20users%20for%20whom%20you%20are%20not%20quite%20ready%20to%20block%20legacy%20authentication.%3C%2FP%3E%0A%3CP%20style%3D%22margin-bottom%3A%203.0pt%3B%20line-height%3A%20normal%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin-bottom%3A%203.0pt%3B%20line-height%3A%20normal%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22legauth9.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176635i8B395336B582826F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22legauth9.png%22%20alt%3D%22legauth9.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-bottom%3A%203.0pt%3B%20line-height%3A%20normal%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%20id%3D%22toc-hId--1812168688%22%3EStep%203%3A%20Blocking%20legacy%20authentication%20in%20your%20organization%3C%2FH4%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EBlocking%20legacy%20authentication%20using%20Azure%20AD%20Conditional%20Access%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOnce%20you%20have%20monitored%20your%20policy%20in%20report-only%20mode%20for%20a%20few%20days%20and%20you%20understand%20the%20impact%20of%20the%20policy%2C%20you%E2%80%99re%20ready%20to%20start%20blocking%20legacy%20authentication.%20The%20easiest%20approach%20is%20changing%20the%20state%20of%20the%20policy%20from%20%3CSTRONG%3EReport-only%3C%2FSTRONG%3E%20to%20%3CSTRONG%3EOn%3C%2FSTRONG%3E.%20Alternatively%2C%20if%20you%20want%20to%20continue%20monitoring%20the%20impact%20of%20blocking%20legacy%20authentication%20in%20report-only%20mode%20for%20users%20that%20aren%E2%80%99t%20ready%20yet%2C%20you%20can%20create%20a%20separate%20Conditional%20Access%20policy%20that%20enforces%20blocking%20legacy%20authentication%20for%20the%20users%20that%20you%20identified%20in%20Step%202.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EBlocking%20legacy%20authentication%20service-side%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20addition%20to%20Conditional%20Access%2C%20you%20can%20also%20block%20legacy%20authentication%20service-side%20or%20resource-side%20(versus%20at%20the%20authentication%20platform).%20For%20example%2C%20in%20Exchange%20Online%2C%20you%20could%20disable%20POP3%20or%20IMAP4%20for%20the%20user.%20The%20problem%20with%20this%20is%20you%20do%20not%20want%20to%20block%20protocols%20that%20can%20do%20legacy%20and%20modern%20authentication%20(i.e.%20EWS%2C%20MAPI)%20as%20you%20may%20still%20need%20them.%20To%20help%20with%20this%2C%20Exchange%20Online%20released%20a%20feature%20called%20authentication%20policies%2C%20which%20you%20can%20use%20to%20block%20legacy%20authentication%20per%20protocol%20for%20specific%20users%20or%20for%20the%20entire%20organization.%20The%20protocol%20connection%20is%20denied%20before%20checking%20credentials%20against%20Azure%20AD%20or%20ADFS%2C%20so%20the%20enforcement%20is%20done%20pre-authentication.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHopefully%2C%20this%20blog%20post%20has%20given%20you%20all%20the%20information%20you%20need%20to%20get%20started%20with%20blocking%20legacy%20authentication%20in%20your%20organization.%20For%20any%20questions%2C%20you%20can%20reply%20to%20this%20blog%20post%20in%20the%20comments%20below%2C%20send%20an%20email%20to%20our%20team%20(%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3E%3CA%20href%3D%22mailto%3Aintelligentaccesspm%40microsoft.com%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eintelligentaccesspm%40microsoft.com%3C%2FA%3E)%2C%20or%3C%2FSPAN%3E%20reach%20out%20to%20Alex%20(%3CA%20href%3D%22http%3A%2F%2Ftwitter.com%2Falex_t_weinert%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40alex_t_weinert%3C%2FA%3E)%20and%20me%20(%3CA%20href%3D%22http%3A%2F%2Ftwitter.com%2Fdaniel_e_wood%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40daniel_e_wood)%3C%2FA%3E%20on%20Twitter.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks!%3C%2FP%3E%0A%3CP%3EDaniel%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1225302%22%20slang%3D%22en-US%22%3E%3CP%3EA%20step-by-step%20guide%20to%20blocking%20legacy%20authentication%20in%20Azure%20AD%20using%20new%20tools.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1225302%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EBest%20Practices%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1230259%22%20slang%3D%22en-US%22%3ERe%3A%20New%20tools%20to%20block%20legacy%20authentication%20in%20your%20organization%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1230259%22%20slang%3D%22en-US%22%3E%3CP%3EHy%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F221690%22%20target%3D%22_blank%22%3E%40Alex%20Weinert%3C%2FA%3E%26nbsp%3B%20thanks%20for%20this%20Post.%20In%20my%20opinion%20one%20authentication%20type%20is%20missing%20in%20the%20aggregated%20report%2C%20its%20%22Exchange%20Active%20Sync%22.%20Also%20in%20your%20Step1%20picture%20the%20protocol%20is%20not%20filtered.%20Isn't%20it%20that%20EAS%20also%20used%20basic%20authentication%20and%20needs%20to%20be%20disabled%20by%20using%20Outlook%20App%20or%20for%20example%20Apples%20native%20iOS%20App%20%26gt%3B%2011.0%20which%20uses%20modern%20Authentication%20by%20oAuth%202.0%20support.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1236134%22%20slang%3D%22en-US%22%3ERe%3A%20New%20tools%20to%20block%20legacy%20authentication%20in%20your%20organization%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1236134%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F173440%22%20target%3D%22_blank%22%3E%40Daniel%20Nitz%3C%2FA%3E%2C%26nbsp%3Bthanks%20for%20reading%20and%20I'm%20happy%20to%20address%20your%20comments%20to%20the%20blog%20post.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20aggregated%20report%20shows%20all%20legacy%20auth%20protocols%20used%2C%20including%20Exchange%20ActiveSync%2C%20but%20a%20protocol%20does%20not%20get%20listed%20if%20there%20are%20no%20sign-ins%20of%20that%20type.%20Since%20there%20were%20no%20sign-ins%20using%20Exchange%20ActiveSync%20in%20the%20time%20range%20specified%20(14%20days)%2C%20Exchange%20ActiveSync%20does%20not%20appear%20in%20the%26nbsp%3B%3CEM%3ESign-ins%20using%20Legacy%20Auth%26nbsp%3B%3C%2FEM%3Eworkbook.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20screenshot%20in%20Step%201%20is%20filtered%20to%20include%2014%20client%20apps.%20You%20can%20see%20whether%20a%20filter%20is%20applied%20where%20it%20says%26nbsp%3B%3CEM%3EClient%20app%3A%2014%20selected.%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20the%20blog%20mentions%2C%20there%20are%20two%20ways%20you%20can%20block%20legacy%20authentication.%20The%20first%20way%20is%20via%20Conditional%20Access%2C%20and%20the%20second%20way%20(which%20you%20mention%20in%20your%20comment)%20is%20to%20disable%20the%20protocol%20at%20the%20service%20level.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%2C%3C%2FP%3E%0A%3CP%3EDaniel%20Wood%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1239509%22%20slang%3D%22en-US%22%3ERe%3A%20New%20tools%20to%20block%20legacy%20authentication%20in%20your%20organization%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1239509%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EHi%20Daniel%2C%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3Emany%20thanks%20for%20your%20response!!%20I%20noticed%20that%20even%20if%20I%20have%20many%20Exchange%20Active%20Sync%20logons%2C%20this%20logon%20type%20does%20not%20come%20up.%20For%20example%20in%20a%20customer%26nbsp%3Btenant%20I%20have%20following%20situation.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20can%20see%20lot%20of%20sign%20ins%20using%20EAS%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222020-03-19_20-10-38.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F178231i4AB339FDE17FABCA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%222020-03-19_20-10-38.png%22%20alt%3D%222020-03-19_20-10-38.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBut%20the%20Report%20doesn't%20show%20the%20Active%20Sync%20Protocol.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222020-03-19_20-12-03.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F178232iDB5A8C1526F67DB9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%222020-03-19_20-12-03.png%22%20alt%3D%222020-03-19_20-12-03.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EThe%20query%20shows%20me%20that%20Exchange%20Active%20Sync%20is%20filtered%20out%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222020-03-19_20-16-41.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F178233iA07940957471451D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%222020-03-19_20-16-41.png%22%20alt%3D%222020-03-19_20-16-41.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20a%20problem%20in%20the%20query%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1239581%22%20slang%3D%22en-US%22%3ERe%3A%20New%20tools%20to%20block%20legacy%20authentication%20in%20your%20organization%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1239581%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F173440%22%20target%3D%22_blank%22%3E%40Daniel%20Nitz%3C%2FA%3E--thanks%20for%20your%20observation.%20Indeed%20you%20are%20correct--we%20were%20inadvertently%20filtering%20out%20Exchange%20ActiveSync%20in%20the%20workbook%20query.%20That%20will%20be%20corrected%20soon.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Hey folks,

 

If you’re a regular reader of this blog series, you know we’ve been advocating for admins to enable multi-factor authentication (MFA) for a while. In one of my previous posts, Your Pa$$word doesn’t matter, I showed how vulnerable passwords are to attack and why enabling MFA reduces the likelihood of being compromised by more than 99.9 percent.

 

For MFA to be effective, you also need to block legacy authentication. This is because legacy authentication protocols like POP, SMTP, IMAP, and MAPI can’t enforce MFA, making them preferred entry points for adversaries attacking your organization. In September 2019, Exchange Online announced the deprecation of legacy authentication prior to its removal on October 13, 2020. For more on the impact of legacy auth, and how we weaned Microsoft users off of it, check out the talk Lee Walker and I gave at RSA a few weeks ago.

 

The numbers on legacy authentication from an analysis of Azure Active Directory (Azure AD) traffic are stark:

  • More than 99 percent of password spray attacks use legacy authentication protocols
  • More than 97 percent of credential stuffing attacks use legacy authentication
  • Azure AD accounts in organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled

LegacyAuth.jpg

 

Disabling legacy authentication for users is a must-do on your identity security checklist. In this blog post, I’ve asked Daniel Wood, a PM on the Identity Protection team, to walk through all the steps you need to take to secure your organization and introduce three changes we’ve made in Azure AD to make your job easier.

 

As always, we’d love to hear your thoughts! Ping me on Twitter (@alex_t_weinert) and stay safe out there.

 

Hey everyone!

 

As one of the PMs on the Identity Protection team, I’m going to walk you through a step-by-step guide to blocking legacy authentication in your organization. But first, I’m excited to announce three new capabilities our team has released to make the job easier.

 

  1. The sign-in logs are now available in the Azure portal to all tenants for 7 days
  2. The sign-in logs now include the user agent used to sign in
    blog1.png
  3.  The sign-in logs client apps filter now includes all legacy Exchange Online protocols
    blog2.PNG

Blocking legacy authentication in your organization requires the right data. We worked with our customers and built the tools they asked for to give them the insights they need. The changes we’re announcing today will give all of you even more data about legacy authentication usage in your organization, so you can turn it off systematically and get the full benefits of protecting your organization with MFA.

 

Step 1: Understanding legacy authentication usage in your organization

The first place to look when identifying legacy authentication usage in your organization is the Azure AD Sign-ins page, which is now available in the Azure portal to all tenants for 7 days. The sign-in logs provide a wealth of information, including user, application, client app, device—and now—user agent. Filtering by client app will let you identify sign-ins by modern and legacy authentication. Client apps, including Browser or Mobile Apps and Desktop clients, are considered modern authentication, while the others, such as IMAP, POP, and MAPI are considered legacy authentication. 

 

legauth3.JPG

 

Larger customers will need to aggregate this data into a report or analyze the data using queries to fully understand patterns of legacy authentication usage. There are many ways to do this using Azure Monitor (with Azure AD Workbooks or Log Analytics), Excel, Microsoft Graph API, or a SIEM system.

 

Aggregating reports in Azure AD Workbooks and Log Analytics using Azure Monitor

We recommend streaming your sign-ins to Azure Monitor for real-time reporting and aggregation using Azure AD Workbooks and Log Analytics. Azure Monitor makes it easy to set the retention period and even set a daily cap on the amount of data stored.

 

Once your sign-ins are streaming to Azure Monitor, navigate to the Workbooks tab in Azure AD and open the new Sign-ins using Legacy Auth workbook. Here you will see information about which client apps are being used in your organization.

 

legauth4.png

 

Using Kusto Query Language (KQL), you can write your own queries to create custom reports using Azure Log Analytics. In Azure AD, simply click Logs to begin writing your own queries.

 

legauth5.png

 

Downloading sign-ins to Excel in JSON or CSV format

To download the sign-ins to JSON or CSV format, click on the Download button at the top of the Sign-ins page. If you filter the sign-ins by certain client apps, your download will be based on the filter selections you’ve made. We recommend downloading to JSON because this format includes all the sign-in details, including user agent. The CSV format will only show the top-level information in each row of the sign-in logs.

 

legauth6.png

 

You can then open a JSON file in Excel using the Get Data function.

legauth7.png

 

Using the Microsoft Graph API to get sign-ins

If you need to download more than 250,000 sign-in records, you can do so using the audit logs API in Microsoft Graph.

 

Step 2: Create Conditional Access policies in report-only mode

Once you’ve identified legacy authentication usage patterns in your organization, it’s time to start blocking legacy authentication. In most organizations, you can’t block legacy authentication for everyone right away. We recommend starting by blocking legacy authentication for only the group of users that don’t use it. As you make progress upgrading to modern authentication and disabling legacy authentication, you can expand the list of users in the group.

 

The easiest way to monitor the impact of blocking legacy authentication without disrupting users is using Conditional Access report-only mode. Policies in report-only mode are evaluated at sign-in, but the grant controls are not enforced, so you can see who is using legacy authentication in real time without blocking them. Start by creating a report-only policy that blocks legacy authentication for everyone in your organization. Remember that Conditional Access policies do not apply to legacy authentication clients by default, so you need to explicitly scope your policy to block client apps that are not Browser or Modern authentication clients (i.e. legacy authentication clients). Let the policy run for a few days to get the most accurate reflection of legacy authentication usage in your organization.

 

legauth8.png

 

You can determine how many users will be blocked by the policy by using the new Conditional Access Insights workbook and selecting your policy in the Conditional Access policy filter. To access this workbook (after you have integrated your sign-in logs with Azure Monitor), navigate to the Workbook blade and select Conditional Access Insights. Clicking on a tile such as Failure will filter the dashboard by those users that would be blocked by the policy. Create an exclusion group and add any users for whom you are not quite ready to block legacy authentication.

 

legauth9.png

 

Step 3: Blocking legacy authentication in your organization

 

Blocking legacy authentication using Azure AD Conditional Access

Once you have monitored your policy in report-only mode for a few days and you understand the impact of the policy, you’re ready to start blocking legacy authentication. The easiest approach is changing the state of the policy from Report-only to On. Alternatively, if you want to continue monitoring the impact of blocking legacy authentication in report-only mode for users that aren’t ready yet, you can create a separate Conditional Access policy that enforces blocking legacy authentication for the users that you identified in Step 2.

 

Blocking legacy authentication service-side

In addition to Conditional Access, you can also block legacy authentication service-side or resource-side (versus at the authentication platform). For example, in Exchange Online, you could disable POP3 or IMAP4 for the user. The problem with this is you do not want to block protocols that can do legacy and modern authentication (i.e. EWS, MAPI) as you may still need them. To help with this, Exchange Online released a feature called authentication policies, which you can use to block legacy authentication per protocol for specific users or for the entire organization. The protocol connection is denied before checking credentials against Azure AD or ADFS, so the enforcement is done pre-authentication.

 

Hopefully, this blog post has given you all the information you need to get started with blocking legacy authentication in your organization. For any questions, you can reply to this blog post in the comments below, send an email to our team (intelligentaccesspm@microsoft.com), or reach out to Alex (@alex_t_weinert) and me (@daniel_e_wood) on Twitter.

 

Thanks!

Daniel

 

4 Comments
Senior Member

Hy @Alex Weinert  thanks for this Post. In my opinion one authentication type is missing in the aggregated report, its "Exchange Active Sync". Also in your Step1 picture the protocol is not filtered. Isn't it that EAS also used basic authentication and needs to be disabled by using Outlook App or for example Apples native iOS App > 11.0 which uses modern Authentication by oAuth 2.0 support.

Microsoft

Hi @Daniel Nitz, thanks for reading and I'm happy to address your comments to the blog post. 

 

The aggregated report shows all legacy auth protocols used, including Exchange ActiveSync, but a protocol does not get listed if there are no sign-ins of that type. Since there were no sign-ins using Exchange ActiveSync in the time range specified (14 days), Exchange ActiveSync does not appear in the Sign-ins using Legacy Auth workbook. 

 

The screenshot in Step 1 is filtered to include 14 client apps. You can see whether a filter is applied where it says Client app: 14 selected. 

 

As the blog mentions, there are two ways you can block legacy authentication. The first way is via Conditional Access, and the second way (which you mention in your comment) is to disable the protocol at the service level. 

 

Thanks,

Daniel Wood

Senior Member

Hi Daniel,

 

many thanks for your response!! I noticed that even if I have many Exchange Active Sync logons, this logon type does not come up. For example in a customer tenant I have following situation. 

I can see lot of sign ins using EAS

 

2020-03-19_20-10-38.png

 

But the Report doesn't show the Active Sync Protocol.

 

2020-03-19_20-12-03.png

 

The query shows me that Exchange Active Sync is filtered out

 

2020-03-19_20-16-41.png

 

So a problem in the query?

Microsoft

Hi @Daniel Nitz--thanks for your observation. Indeed you are correct--we were inadvertently filtering out Exchange ActiveSync in the workbook query. That will be corrected soon.