Skip to content

Commit 09209b0

Browse files
committed
removing legacy points
1 parent f24e71e commit 09209b0

File tree

1 file changed

+9
-102
lines changed

1 file changed

+9
-102
lines changed

articles/security/fundamentals/recover-from-identity-compromise.md

Lines changed: 9 additions & 102 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

22
---
33
title: Use Microsoft and Azure security resources to help recover from systemic identity compromise | Microsoft Docs
4-
description: Learn how to use Microsoft and Azure security resources, such as Microsoft 365 Defender, Microsoft Sentinel, and Azure Active Directory, and Microsoft Defender for Cloud, and Microsoft recommendations to secure your system against systemic-identity compromises similar to the Nobelium attack (Solorigate) of December 2020.
4+
description: Learn how to use Microsoft and Azure security resources, such as Microsoft 365 Defender, Microsoft Sentinel, Azure Active Directory, Microsoft Defender for Cloud, and Microsoft Defender for IoT and Microsoft recommendations to secure your system against systemic-identity compromises.
55
services: sentinel
66
documentationcenter: na
77
author: batamig
@@ -19,7 +19,7 @@ ms.author: bagol
1919

2020
# Recovering from systemic identity compromise
2121

22-
This article describes Microsoft resources and recommendations for recovering from a systemic identity compromise attack against your organization, such as the [Nobelium](https://aka.ms/solorigate) attack of December 2020.
22+
This article describes Microsoft resources and recommendations for recovering from a systemic identity compromise attack against your organization.
2323

2424
The content in this article is based on guidance provided by Microsoft's Detection and Response Team (DART), which works to respond to compromises and help customers become cyber-resilient. For more guidance from the DART team, see their [Microsoft security blog series](https://www.microsoft.com/security/blog/microsoft-detection-and-response-team-dart-blog-series/).
2525

@@ -236,7 +236,7 @@ We recommend the following actions to ensure your general security posture:
236236

237237
- **Review [Microsoft Secure Score](/microsoft-365/security/mtp/microsoft-secure-score)** for security fundamentals recommendations customized for the Microsoft products and services you consume.
238238

239-
- **Ensure that your organization has EDR and SIEM solutions in place**, such as [Microsoft 365 Defender for Endpoint](/microsoft-365/security/defender/microsoft-365-defender) and [Microsoft Sentinel](../../sentinel/overview.md).
239+
- **Ensure that your organization has extended detection and response (XDR) and security information and event management (SIEM) solutions in place**, such as [Microsoft 365 Defender for Endpoint](/microsoft-365/security/defender/microsoft-365-defender), [Microsoft Sentinel](../../sentinel/overview.md), and [Microsoft Defender for IoT](../../defender-for-iot/organizations).
240240

241241
- **Review Microsoft’s [Enterprise access model](/security/compass/privileged-access-access-model)**.
242242

@@ -250,14 +250,6 @@ We recommend the following actions to ensure identity-related security posture:
250250

251251
- **Eliminate your organization’s use of legacy authentication**, if systems or applications still require it. For more information, see [Block legacy authentication to Azure AD with Conditional Access](../../active-directory/conditional-access/block-legacy-authentication.md).
252252

253-
> [!NOTE]
254-
> The Exchange Team is planning to [disable Basic Authentication for the EAS, EWS, POP, IMAP, and RPS protocols](https://developer.microsoft.com/en-us/office/blogs/deferred-end-of-support-date-for-basic-authentication-in-exchange-online/) in the second half of 2021.
255-
>
256-
> As a point of clarity, Security Defaults and Authentication Policies are separate but provide complementary features.
257-
>
258-
> We recommend that customers use Authentication Policies to turn off Basic Authentication for a subset of Exchange Online protocols or to gradually turn off Basic Authentication across a large organization.
259-
>
260-
261253
- **Treat your ADFS infrastructure and AD Connect infrastructure as a Tier 0 asset**.
262254

263255
- **Restrict local administrative access to the system**, including the account that is used to run the ADFS service.
@@ -272,13 +264,7 @@ We recommend the following actions to ensure identity-related security posture:
272264

273265
- If you are using a Service Account and your environment supports it, **migrate from a Service Account to a group-Managed Service Account (gMSA)**. If you cannot move to a gMSA, rotate the password on the Service Account to a complex password.
274266

275-
- **Ensure Verbose logging is enabled on your ADFS systems**. For example, run the following commands:
276-
277-
```powershell
278-
Set-AdfsProperties -AuditLevel verbose
279-
Restart-Service -Name adfssrv
280-
Auditpol.exe /set /subcategory:”Application Generated” /failure:enable /success:enable
281-
```
267+
- **Ensure Verbose logging is enabled on your ADFS systems**.
282268

283269
## Remediate and retain administrative control
284270

@@ -310,96 +296,17 @@ If your organization decides *not* to [remove trust](#remove-trust-on-your-curre
310296

311297
Rotating the token-signing certificate a single time still allows the previous token-signing certificate to work. Continuing to allow previous certificates to work is a built-in functionality for normal certificate rotations, which permits a grace period for organizations to update any relying party trusts before the certificate expires.
312298

313-
If there was an attack, you don't want the attacker to retain access at all. Make sure to use the following steps to ensure that the attacker doesn't maintain the ability to forge tokens for your domain.
314-
315-
> [!CAUTION]
316-
> The last step in this procedure logs users out of their phones, current webmail sessions, and any other items that are using the associated tokens and refresh tokens.
317-
>
318-
319-
> [!TIP]
320-
> Performing these steps in your ADFS environment creates both a primary and secondary certificate, and automatically promotes the secondary certificate to primary after a default period of 5 days.
321-
>
322-
> If you have Relying Party Trusts, this may have effects 5 days after the initial ADFS environment change, and should be accounted for in your plan. You can also resolve this by replacing the primary certificate a third time, using the **Urgent** flag again, and removing the secondary certificate or turning off automatic certificate rotation.
323-
>
324-
325-
**To fully rotate the token-signing certificate, and prevent new token forging by an attacker**
326-
327-
1. Check to make sure that your **AutoCertificateRollover** parameter is set to **True**:
328-
329-
``` powershell
330-
Get-AdfsProperties | FL AutoCert*, Certificate*
331-
```
332-
If **AutoCertificateRollover** isn't set to **True**, set the value as follows:
333-
334-
``` powershell
335-
Set-ADFSProperties -AutoCertificateRollover $true
336-
```
337-
338-
1. Connect to the Microsoft Online Service:
339-
340-
``` powershell
341-
Connect-MsolService
342-
```
343-
344-
1. Run the following command and make a note of your on-premises and cloud token signing certificate thumbprint and expiration dates:
345-
346-
``` powershell
347-
Get-MsolFederationProperty -DomainName <domain>
348-
```
299+
If there was an attack, you don't want the attacker to retain access at all. Make sure that the attacker doesn't retain the ability to forge tokens for your domain.
349300

350-
For example:
351-
352-
```powershell
353-
...
354-
[Not Before]
355-
12/9/2020 7:57:13 PM
356-
357-
[Not After]
358-
12/9/2021 7:57:13 PM
359-
360-
[Thumbprint]
361-
3UD1JG5MEFHSBW7HEPF6D98EI8AHNTY22XPQWJFK6
362-
```
363-
364-
1. Replace the primary token signing certificate using the **Urgent** switch. This command causes ADFS to replace the primary certificate immediately, without making it a secondary certificate:
365-
366-
```powershell
367-
Update-AdfsCertificate -CertificateType Token-Signing -Urgent
368-
```
369-
370-
1. Create a secondary Token Signing certificate, without the **Urgent** switch. This command allows for two on-premises token signing certificates before synching with Azure Cloud.
371-
372-
```powershell
373-
Update-AdfsCertificate -CertificateType Token-Signing
374-
```
375-
376-
1. Update the cloud environment with both the primary and secondary certificates on-premises to immediately remove the cloud published token signing certificate.
377-
378-
```powershell
379-
Update-MsolFederatedDomain -DomainName <domain>
380-
```
381-
382-
> [!IMPORTANT]
383-
> If this step is not performed using this method, the old token signing certificate may still be able to authenticate users.
384-
385-
1. To ensure that these steps have been performed correctly, verify that the certificate displayed before in step 3 is now removed:
386-
387-
```powershell
388-
Get-MsolFederationProperty -DomainName <domain>
389-
```
390-
391-
1. Revoke your refresh tokens via PowerShell, to prevent access with the old tokens.
392-
393-
For more information, see:
394-
395-
- [Revoke user access in Azure Active Directory](../../active-directory/enterprise-users/users-revoke-access.md)
396-
- [Revoke-AzureADUserAllRefreshToken PowerShell docs](/powershell/module/azuread/revoke-azureaduserallrefreshtoken)
301+
For more information, see:
397302

303+
- [Revoke user access in Azure Active Directory](../../active-directory/enterprise-users/users-revoke-access.md)
304+
- [Revoke-AzureADUserAllRefreshToken PowerShell docs](/powershell/module/azuread/revoke-azureaduserallrefreshtoken)
398305

399306

400307
### Replace your ADFS servers
401308

402-
If, instead of [rotating your SAML token-signing certificate](#rotate-your-saml-token-signing-certificate), you decide to replace the ADFS servers with clean systems, you'll need to remove the existing ADFS from your environment, and then build a new one.
309+
If, instead of rotating your SAML token-signing certificate, you decide to replace the ADFS servers with clean systems, you'll need to remove the existing ADFS from your environment, and then build a new one.
403310

404311
For more information, see [Remove a configuration](../../active-directory/cloud-sync/how-to-configure.md#remove-a-configuration).
405312

0 commit comments

Comments
 (0)