Forum Discussion
Marek_Belan
Dec 08, 2021Brass Contributor
Where find account with leaked password
Hi we setup password has sync and all about azure ad assword protection in audit mode. Now where i find account with leaked password? When i try chenge password do som leaked pass like asdf1234567...
BilalelHadd
Iron Contributor
Marek_Belan,
Did you already read the Microsoft documentation about this feature? I assume not. Your suggestion would be a great feature request but isn't available at the moment.
--
When a user changes or resets their password, the new password is checked for strength and complexity by validating it against the combined list of terms from the global and custom banned password lists.
Even if a user's password contains a banned password, the password may be accepted if the overall password is otherwise strong enough. A newly configured password goes through the following steps to assess its overall strength to determine if it should be accepted or rejected:
--
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-premises-operations
Did you already read the Microsoft documentation about this feature? I assume not. Your suggestion would be a great feature request but isn't available at the moment.
--
When a user changes or resets their password, the new password is checked for strength and complexity by validating it against the combined list of terms from the global and custom banned password lists.
Even if a user's password contains a banned password, the password may be accepted if the overall password is otherwise strong enough. A newly configured password goes through the following steps to assess its overall strength to determine if it should be accepted or rejected:
--
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-premises-operations
Marek_Belan
Dec 09, 2021Brass Contributor
Password hash synchronization
Risk detections like leaked credentials require the presence of password hashes for detection to occur. For more information about password hash synchronization, see the article, Implement password hash synchronization with Azure AD Connect sync.
So where is the risk? We setup hash sync, user has leaked pasword, where i see rising risk of this user?
Risk detections like leaked credentials require the presence of password hashes for detection to occur. For more information about password hash synchronization, see the article, Implement password hash synchronization with Azure AD Connect sync.
So where is the risk? We setup hash sync, user has leaked pasword, where i see rising risk of this user?
- BilalelHaddDec 09, 2021Iron ContributorIf you want to see a current overview of the Risky sign-ins or Risky users, you must have an Azure AD Premium P2 license. I have written a blog about Azure AD Password Protection that might help you.
https://www.bilalelhaddouchi.nl/index.php/2020/04/24/azure-ad-password-protection/
I would recommend you read the license requirements.- Marek_BelanDec 09, 2021Brass ContributorWe have on all users Microsoft 365 E5 Security....
- BilalelHaddDec 09, 2021Iron ContributorIn that case, see the following article which gives you insights on how to, e.g., investigate risks within your tenant. But, again, I don't want to sound rude, but these kinds of things can be found on Google easily.
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk
I hope this helps and good luck!