Skip to content

Commit c8b33d4

Browse files
authored
Merge pull request #178861 from MarkusVi/workbook01
Workbook01
2 parents 4458e6b + 5c9d465 commit c8b33d4

File tree

8 files changed

+258
-0
lines changed

8 files changed

+258
-0
lines changed
Loading
9.74 KB
Loading
3.82 KB
Loading
4.43 KB
Loading
14.4 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -117,3 +117,9 @@
117117
href: reports-faq.yml
118118
- name: Sign-in log schema
119119
href: reference-azure-monitor-sign-ins-log-schema.md
120+
- name: Workbooks
121+
items:
122+
- name: Conditional access gap analyzer
123+
href: workbook-conditional-access-gap-analyzer.md
124+
- name: Sensitive Operations Report
125+
href: workbook-sensitive-operations-report.md
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
3+
title: Conditional access gap analyzer workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the conditional access gap analyzer workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 11/05/2021
16+
ms.author: markvi
17+
ms.reviewer: sarbar
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Conditional access gap analyzer workbook
23+
24+
In Azure AD, you can protect access to your resources by configuring conditional access policies.
25+
As an IT administrator, you want to ensure that your conditional access policies work as expected to ensure that your resources are properly protected. With the conditional access gap analyzer workbook, you can detect gaps in your conditional access implementation.
26+
27+
This article provides you with an overview of this workbook.
28+
29+
30+
## Description
31+
32+
![Workbook category](./media/workbook-conditional-access-gap-analyzer/workbook-category.png)
33+
34+
As an IT administrator, you want to make sure that only the right people can access your resources. Azure AD conditional access helps you to accomplish this goal.
35+
36+
The conditional access gap analyzer workbook helps you to verify that your conditional access policies work as expected.
37+
38+
**This workbook:**
39+
40+
- Highlights user sign-ins that have no conditional access policies applied to them.
41+
- Allows you to ensure that there are no users, applications, or locations that have been unintentionally excluded from conditional access policies.
42+
43+
44+
45+
## Sections
46+
47+
48+
The workbook has four sections:
49+
50+
- Users signing in using legacy authentication
51+
52+
- Number of sign-ins by applications that are not impacted by conditional access policies
53+
54+
- High risk sign-in events bypassing conditional access policies
55+
56+
- Number of sign-ins by location that were not affected by conditional access policies
57+
58+
59+
![Conditional access coverage by location](./media/workbook-conditional-access-gap-analyzer/conditianal-access-by-location.png)
60+
61+
Each of these trends offers a breakdown of sign-ins to the user level, so that you can see which users per scenario are bypassing conditional access.
62+
63+
## Filters
64+
65+
This workbook supports setting a time range filter.
66+
67+
![Time range filter](./media/workbook-conditional-access-gap-analyzer/time-range.png)
68+
69+
70+
71+
## Best practices
72+
73+
Use this workbook to ensure that your tenant is configured to the following Conditional Access best practices:
74+
75+
- Block all legacy authentication sign-ins
76+
77+
- Apply at least one Conditional Access Policy to every application
78+
79+
- Block all high risk sign-ins
80+
81+
- Block sign-ins from untrusted locations
82+
83+
84+
85+
86+
87+
88+
89+
## Next steps
90+
91+
- [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md)
Lines changed: 161 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,161 @@
1+
---
2+
3+
title: Sensitive operations report workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the sensitive operations report workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 11/05/2021
16+
ms.author: markvi
17+
ms.reviewer: sarbar
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Sensitive operations report workbook
23+
24+
As an It administrator, you need to be able to identify compromises in your environment to ensure that you can keep it in a healthy state.
25+
26+
The sensitive operations report workbook is intended to help identify suspicious application and service principal activity that may indicate compromises in your environment.
27+
28+
29+
This article provides you with an overview of this workbook.
30+
31+
32+
## Description
33+
34+
![Workbook category](./media/workbook-sensitive-operations-report/workbook-category.png)
35+
36+
This workbook identifies recent sensitive operations that have been performed in your tenant and which may service principal compromise.
37+
38+
If your organization is new to Azure monitor workbooks, you need to integrate your Azure AD sign-in and audit logs with Azure Monitor before accessing the workbook. This allows you to store, and query, and visualize your logs using workbooks for up to two years. Only sign-in and audit events created after Azure Monitor integration will be stored, so the workbook will not contain insights prior to that date. Learn more about the prerequisites to Azure Monitor workbooks for Azure Active Directory. If you have previously integrated your Azure AD sign-in and audit logs with Azure Monitor, you can use the workbook to assess past information.
39+
40+
41+
42+
## Sections
43+
44+
This workbook is split into four sections:
45+
46+
![Workbook sections](./media/workbook-sensitive-operations-report/workbook-sections.png)
47+
48+
49+
- **Modified application and service principal credentials/authentication methods** - This report flags actors who have recently changed many service principal credentials, as well as how many of each type of service principal credentials have been changed.
50+
51+
- **New permissions granted to service principals** - This workbook also highlights recently granted OAuth 2.0 permissions to service principals.
52+
53+
- **Directory role and group membership updates for service principals**
54+
55+
56+
57+
- **Modified federation settings** - This report highlights when a user or application modifies federation settings on a domain. For example, it reports when a new Active Directory Federated Service (ADFS) TrustedRealm object, such as a signing certificate, is added to the domain. Modification to domain federation settings should be rare.
58+
59+
60+
61+
62+
### Modified application and service principal credentials/authentication methods
63+
64+
One of the most common ways for attackers to gain persistence in the environment is by adding new credentials to existing applications and service principals. The credentials allow the attacker to authenticate as the target application or service principal, granting them access to all resources to which it has permissions.
65+
66+
This section includes the following data to help you detect:
67+
68+
- All new credentials added to apps and service principals, including the credential type
69+
70+
- Top actors and the amount of credentials modifications they performed
71+
72+
- A timeline for all credential changes
73+
74+
75+
76+
### New permissions granted to service principals
77+
78+
In cases where the attacker cannot find a service principal or an application with a high privilege set of permissions through which to gain access, they will often attempt to add the permissions to another service principal or app.
79+
80+
This section includes a breakdown of the AppOnly permissions grants to existing service principals. Admins should investigate any instances of excessive high permissions being granted, including, but not limited to, Exchange Online, Microsoft Graph and Azure AD Graph.
81+
82+
83+
### Directory role and group membership updates for service principals
84+
85+
Following the logic of the attacker adding new permissions to existing service principals and applications, another approach is adding them to existing directory roles or groups.
86+
87+
This section includes an overview of all changes made to service principal memberships and should be reviewed for any additions to high privilege roles and groups.
88+
89+
90+
91+
### Modified federation settings
92+
93+
Another common approach to gain a long-term foothold in the environment is to:
94+
95+
- Modify the tenant’s federated domain trusts.
96+
- Add an additional SAML IDP that is controlled by the attacker as a trusted authentication source.
97+
98+
This section includes the following data:
99+
100+
- Changes performed to existing domain federation trusts
101+
102+
- Addition of new domains and trusts
103+
104+
105+
106+
107+
108+
## Filters
109+
110+
This paragraph lists the supported filters for each section.
111+
112+
113+
### Modified Application and Service Principal Credentials/Authentication Methods
114+
115+
- Time range
116+
- Operation name
117+
- Credential
118+
- Actor
119+
- Exclude actor
120+
121+
122+
### New permissions granted to service principals
123+
124+
- Time range
125+
- Client app
126+
- Resource
127+
128+
### Directory role and group membership updates to service principals
129+
130+
- Time range
131+
- Operation
132+
- Initiating user or app
133+
134+
### Modified federation settings
135+
136+
- Time range
137+
- Operation
138+
- Initiating user or app
139+
140+
141+
142+
143+
## Best practices
144+
145+
146+
**Use:**
147+
148+
- **Modified application and service principal credentials** to look out for credentials being added to service principals that are not frequently used in your organization. Use the filters present in this section to further investigate any of the suspicious actors or service principals that were modified.
149+
150+
151+
- **New permissions granted to service principals** to look out for broad or excessive permissions being added to service principals by actors that may be compromised.
152+
153+
- **Modified federation settings** section to confirm that the added or modified target domain/URL is a legitimate admin behavior. Actions that modify or add domain federation trusts are rare and should be treated as high fidelity to be investigated as soon as possible.
154+
155+
156+
157+
158+
159+
## Next steps
160+
161+
- [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md)

0 commit comments

Comments
 (0)