You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/recover-from-identity-compromise.md
+9-102Lines changed: 9 additions & 102 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
2
2
---
3
3
title: Use Microsoft and Azure security resources to help recover from systemic identity compromise | Microsoft Docs
4
-
description: Learn how to use Microsoft and Azure security resources, such as Microsoft 365 Defender, Microsoft Sentinel, and Azure Active Directory, and Microsoft Defender for Cloud, and Microsoft recommendations to secure your system against systemic-identity compromises similar to the Nobelium attack (Solorigate) of December 2020.
4
+
description: Learn how to use Microsoft and Azure security resources, such as Microsoft 365 Defender, Microsoft Sentinel, Azure Active Directory, Microsoft Defender for Cloud, and Microsoft Defender for IoT and Microsoft recommendations to secure your system against systemic-identity compromises.
5
5
services: sentinel
6
6
documentationcenter: na
7
7
author: batamig
@@ -19,7 +19,7 @@ ms.author: bagol
19
19
20
20
# Recovering from systemic identity compromise
21
21
22
-
This article describes Microsoft resources and recommendations for recovering from a systemic identity compromise attack against your organization, such as the [Nobelium](https://aka.ms/solorigate) attack of December 2020.
22
+
This article describes Microsoft resources and recommendations for recovering from a systemic identity compromise attack against your organization.
23
23
24
24
The content in this article is based on guidance provided by Microsoft's Detection and Response Team (DART), which works to respond to compromises and help customers become cyber-resilient. For more guidance from the DART team, see their [Microsoft security blog series](https://www.microsoft.com/security/blog/microsoft-detection-and-response-team-dart-blog-series/).
25
25
@@ -236,7 +236,7 @@ We recommend the following actions to ensure your general security posture:
236
236
237
237
-**Review [Microsoft Secure Score](/microsoft-365/security/mtp/microsoft-secure-score)** for security fundamentals recommendations customized for the Microsoft products and services you consume.
238
238
239
-
-**Ensure that your organization has EDR and SIEM solutions in place**, such as [Microsoft 365 Defender for Endpoint](/microsoft-365/security/defender/microsoft-365-defender) and [Microsoft Sentinel](../../sentinel/overview.md).
239
+
-**Ensure that your organization has extended detection and response (XDR) and security information and event management (SIEM) solutions in place**, such as [Microsoft 365 Defender for Endpoint](/microsoft-365/security/defender/microsoft-365-defender), [Microsoft Sentinel](../../sentinel/overview.md), and [Microsoft Defender for IoT](../../defender-for-iot/organizations).
@@ -250,14 +250,6 @@ We recommend the following actions to ensure identity-related security posture:
250
250
251
251
-**Eliminate your organization’s use of legacy authentication**, if systems or applications still require it. For more information, see [Block legacy authentication to Azure AD with Conditional Access](../../active-directory/conditional-access/block-legacy-authentication.md).
252
252
253
-
> [!NOTE]
254
-
> The Exchange Team is planning to [disable Basic Authentication for the EAS, EWS, POP, IMAP, and RPS protocols](https://developer.microsoft.com/en-us/office/blogs/deferred-end-of-support-date-for-basic-authentication-in-exchange-online/) in the second half of 2021.
255
-
>
256
-
> As a point of clarity, Security Defaults and Authentication Policies are separate but provide complementary features.
257
-
>
258
-
> We recommend that customers use Authentication Policies to turn off Basic Authentication for a subset of Exchange Online protocols or to gradually turn off Basic Authentication across a large organization.
259
-
>
260
-
261
253
-**Treat your ADFS infrastructure and AD Connect infrastructure as a Tier 0 asset**.
262
254
263
255
-**Restrict local administrative access to the system**, including the account that is used to run the ADFS service.
@@ -272,13 +264,7 @@ We recommend the following actions to ensure identity-related security posture:
272
264
273
265
- If you are using a Service Account and your environment supports it, **migrate from a Service Account to a group-Managed Service Account (gMSA)**. If you cannot move to a gMSA, rotate the password on the Service Account to a complex password.
274
266
275
-
-**Ensure Verbose logging is enabled on your ADFS systems**. For example, run the following commands:
-**Ensure Verbose logging is enabled on your ADFS systems**.
282
268
283
269
## Remediate and retain administrative control
284
270
@@ -310,96 +296,17 @@ If your organization decides *not* to [remove trust](#remove-trust-on-your-curre
310
296
311
297
Rotating the token-signing certificate a single time still allows the previous token-signing certificate to work. Continuing to allow previous certificates to work is a built-in functionality for normal certificate rotations, which permits a grace period for organizations to update any relying party trusts before the certificate expires.
312
298
313
-
If there was an attack, you don't want the attacker to retain access at all. Make sure to use the following steps to ensure that the attacker doesn't maintain the ability to forge tokens for your domain.
314
-
315
-
> [!CAUTION]
316
-
> The last step in this procedure logs users out of their phones, current webmail sessions, and any other items that are using the associated tokens and refresh tokens.
317
-
>
318
-
319
-
> [!TIP]
320
-
> Performing these steps in your ADFS environment creates both a primary and secondary certificate, and automatically promotes the secondary certificate to primary after a default period of 5 days.
321
-
>
322
-
> If you have Relying Party Trusts, this may have effects 5 days after the initial ADFS environment change, and should be accounted for in your plan. You can also resolve this by replacing the primary certificate a third time, using the **Urgent** flag again, and removing the secondary certificate or turning off automatic certificate rotation.
323
-
>
324
-
325
-
**To fully rotate the token-signing certificate, and prevent new token forging by an attacker**
326
-
327
-
1. Check to make sure that your **AutoCertificateRollover** parameter is set to **True**:
328
-
329
-
``` powershell
330
-
Get-AdfsProperties | FL AutoCert*, Certificate*
331
-
```
332
-
If **AutoCertificateRollover** isn't set to **True**, set the value as follows:
333
-
334
-
``` powershell
335
-
Set-ADFSProperties -AutoCertificateRollover $true
336
-
```
337
-
338
-
1. Connect to the Microsoft Online Service:
339
-
340
-
``` powershell
341
-
Connect-MsolService
342
-
```
343
-
344
-
1. Run the following command and make a note of your on-premises and cloud token signing certificate thumbprint and expiration dates:
345
-
346
-
``` powershell
347
-
Get-MsolFederationProperty -DomainName <domain>
348
-
```
299
+
If there was an attack, you don't want the attacker to retain access at all. Make sure that the attacker doesn't retain the ability to forge tokens for your domain.
349
300
350
-
For example:
351
-
352
-
```powershell
353
-
...
354
-
[Not Before]
355
-
12/9/2020 7:57:13 PM
356
-
357
-
[Not After]
358
-
12/9/2021 7:57:13 PM
359
-
360
-
[Thumbprint]
361
-
3UD1JG5MEFHSBW7HEPF6D98EI8AHNTY22XPQWJFK6
362
-
```
363
-
364
-
1. Replace the primary token signing certificate using the **Urgent** switch. This command causes ADFS to replace the primary certificate immediately, without making it a secondary certificate:
1. Create a secondary Token Signing certificate, without the **Urgent** switch. This command allows for two on-premises token signing certificates before synching with Azure Cloud.
1. Update the cloud environment with both the primary and secondary certificates on-premises to immediately remove the cloud published token signing certificate.
377
-
378
-
```powershell
379
-
Update-MsolFederatedDomain -DomainName <domain>
380
-
```
381
-
382
-
> [!IMPORTANT]
383
-
> If this step is not performed using this method, the old token signing certificate may still be able to authenticate users.
384
-
385
-
1. To ensure that these steps have been performed correctly, verify that the certificate displayed before in step 3 is now removed:
386
-
387
-
```powershell
388
-
Get-MsolFederationProperty -DomainName <domain>
389
-
```
390
-
391
-
1. Revoke your refresh tokens via PowerShell, to prevent access with the old tokens.
392
-
393
-
For more information, see:
394
-
395
-
- [Revoke user access in Azure Active Directory](../../active-directory/enterprise-users/users-revoke-access.md)
If, instead of [rotating your SAML token-signing certificate](#rotate-your-saml-token-signing-certificate), you decide to replace the ADFS servers with clean systems, you'll need to remove the existing ADFS from your environment, and then build a new one.
309
+
If, instead of rotating your SAML token-signing certificate, you decide to replace the ADFS servers with clean systems, you'll need to remove the existing ADFS from your environment, and then build a new one.
403
310
404
311
For more information, see [Remove a configuration](../../active-directory/cloud-sync/how-to-configure.md#remove-a-configuration).
0 commit comments