Skip to content

Commit fb80a0f

Browse files
committed
[AzureADDS] Freshness updates on securing domain
1 parent 26b2669 commit fb80a0f

File tree

1 file changed

+53
-32
lines changed

1 file changed

+53
-32
lines changed
Lines changed: 53 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,66 +1,87 @@
11
---
2-
title: 'Secure your Azure Active Directory Domain Services managed domain | Microsoft Docs'
3-
description: Secure your managed domain
2+
title: Secure Azure AD Domain Services | Microsoft Docs'
3+
description: Learn how to disable weak ciphers, old protocols, and NTLM password hash synchronization for an Azure Active Directory Domain Services managed domain.
44
services: active-directory-ds
5-
documentationcenter: ''
65
author: iainfoulds
76
manager: daveba
8-
editor: curtand
97

108
ms.assetid: 6b4665b5-4324-42ab-82c5-d36c01192c2a
119
ms.service: active-directory
1210
ms.subservice: domain-services
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
1612
ms.topic: article
17-
ms.date: 06/28/2019
13+
ms.date: 09/09/2019
1814
ms.author: iainfou
1915

2016
---
17+
# Disable weak ciphers and password hash synchronization to secure an Azure AD Domain Services managed domain
2118

22-
# Secure your Azure AD Domain Services managed domain
23-
This article helps you secure your managed domain. You can turn off the usage of weak cipher suites and disable NTLM credential hash synchronization.
19+
By default, Azure Active Directory Domain Services (Azure AD DS) enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be required for some legacy applications, but are considered weak and can be disabled if you don't need them. If you have on-premises hybrid connectivity using Azure AD Connect, you can also disable the synchronization of NTLM password hashes.
2420

25-
## Install the required PowerShell modules
21+
This article shows you how to disable NTLM v1 and TLS v1 ciphers and disable NTLM password hash synchronization.
2622

27-
### Install and configure Azure AD PowerShell
28-
Follow the instructions in the article to [install the Azure AD PowerShell module and connect to Azure AD](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?toc=%2fazure%2factive-directory-domain-services%2ftoc.json).
23+
## Prerequisites
2924

30-
### Install and configure Azure PowerShell
31-
Follow the instructions in the article to [install the Azure PowerShell module and connect to your Azure subscription](https://docs.microsoft.com/powershell/azure/install-az-ps?toc=%2fazure%2factive-directory-domain-services%2ftoc.json).
25+
To complete this article, you need the following resources:
3226

27+
* An active Azure subscription.
28+
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29+
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
30+
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31+
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32+
* If needed, [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33+
* Install and configure Azure PowerShell.
34+
* If needed, follow the instructions to [install the Azure PowerShell module and connect to your Azure subscription](/powershell/azure/install-az-ps).
35+
* Make sure that you sign in to your Azure subscription using the [Connect-AzAccount][Connect-AzAccount] cmdlet.
36+
* Install and configure Azure AD PowerShell.
37+
* If needed, follow the instructions to [install the Azure AD PowerShell module and connect to Azure AD](/powershell/azure/active-directory/install-adv2).
38+
* Make sure that you sign in to your Azure AD tenant using the [Connect-AzureAD][Connect-AzureAD] cmdlet.
3339

34-
## Disable weak cipher suites and NTLM credential hash synchronization
35-
Use the following PowerShell script to:
40+
## Disable weak ciphers and NTLM password hash sync
3641

37-
1. Disable NTLM v1 support on the managed domain.
38-
2. Disable the synchronization of NTLM password hashes from your on-premises AD.
39-
3. Disable TLS v1 on the managed domain.
42+
To disable weak cipher suites and NTLM credential hash synchronization, sign in to your Azure account, then get the Azure AD DS resource using the [Get-AzResource][Get-AzResource] cmdlet:
4043

41-
If you receive an error with the `Get-AzResource` command that the *Microsoft.AAD/DomainServices* resource doesn't exist, [elevate your access to manage all Azure subscriptions and management groups](../role-based-access-control/elevate-access-global-admin.md).
44+
> [!TIP]
45+
> If you receive an error using the [Get-AzResource][Get-AzResource] command that the *Microsoft.AAD/DomainServices* resource doesn't exist, [elevate your access to manage all Azure subscriptions and management groups][global-admin].
4246
4347
```powershell
44-
// Login to your Azure AD tenant
4548
Login-AzAccount
4649
47-
// Retrieve the Azure AD Domain Services resource.
4850
$DomainServicesResource = Get-AzResource -ResourceType "Microsoft.AAD/DomainServices"
51+
```
52+
53+
Next, define *DomainSecuritySettings* to configure the following security options:
54+
55+
1. Disable NTLM v1 support.
56+
2. Disable the synchronization of NTLM password hashes from your on-premises AD.
57+
3. Disable TLS v1.
58+
59+
> [!IMPORTANT]
60+
> Users and service accounts can't perform LDAP simple binds if you disable NTLM password hash synchronization in the Azure AD DS managed domain. If you need to perform LDAP simple binds, don't set the *"SyncNtlmPasswords"="Disabled";* security configuration option in the following command.
4961
50-
// 1. Disable NTLM v1 support on the managed domain.
51-
// 2. Disable the synchronization of NTLM password hashes from
52-
// on-premises AD to Azure AD and Azure AD Domain Services
53-
// 3. Disable TLS v1 on the managed domain.
62+
```powershell
5463
$securitySettings = @{"DomainSecuritySettings"=@{"NtlmV1"="Disabled";"SyncNtlmPasswords"="Disabled";"TlsV1"="Disabled"}}
64+
```
65+
66+
Finally, apply the defined security settings to the Azure AD DS managed domain using the [Set-AzResource][Set-AzResource] cmdlet. Specify the Azure AD DS resource from the first step, and the security settings from the previous step.
5567

56-
// Apply the settings to the managed domain.
68+
```powershell
5769
Set-AzResource -Id $DomainServicesResource.ResourceId -Properties $securitySettings -Verbose -Force
5870
```
5971

60-
> [!IMPORTANT]
61-
> Users (and service accounts) cannot perform LDAP simple binds if you have disabled NTLM password hash synchronization on your Azure AD Domain Services instance. For more information on disabling NTLM password hash synchronization, read [Secure your Azure AD DOmain Services managed domain](secure-your-domain.md).
62-
>
63-
>
72+
It takes a few moments for the security settings to be applied to the Azure AD DS managed domain.
6473

6574
## Next steps
66-
* [Understand synchronization in Azure AD Domain Services](synchronization.md)
75+
76+
To learn more about the synchronization process, see [How objects and credentials are synchronized in an Azure AD DS managed domain][synchronization].
77+
78+
<!-- INTERNAL LINKS -->
79+
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
80+
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
81+
[create-azure-ad-ds-instance]: tutorial-create-instance.md
82+
[global-admin]: ../role-based-access-control/elevate-access-global-admin.md
83+
[synchronization]: synchronization.md
84+
85+
<!-- EXTERNAL LINKS -->
86+
[Get-AzResource]: /powershell/module/az.resources/Get-AzResource
87+
[Set-AzResource]: /powershell/module/Az.Resources/Set-AzResource

0 commit comments

Comments
 (0)