Better together: Conditional Access with Azure MFA (Multifactor Authentication)

7 min read
March 13, 2019

As enabling multifactor authentication is the number one security recommendation to improve your Microsoft Secure Score, let’s take a look at why it's better to deploy Conditional Access with Azure MFA together. We'll walk through deploying Azure MFA for all of your users in a single day and most users won’t even notice!

Isn’t Office 365 already secure? Why do I need to enable Conditional Access with Azure MFA?

When your Exchange server was running on-premises, you probably required your users to VPN into the network using certificate authentication before they could access their email. While not a one-time token, this was a form of MFA: you needed a company-issued certificate, a successful connection to a VPN, and your account credentials.

Now that Exchange is running in the cloud, it’s important to keep in mind the shared responsibility for cloud computing to keep your data secure. Sure, Microsoft has armed guards protecting their datacenters, but it’s still up to you to limit the ways your users can access data.

 

Chart shows varying levels of shared responsibility between cloud services providers and customers, based on service model.

 

As noted in a previous blog, here is an example of login attempts from around the world for a US based company with less than 10 employees:

 

Conditional Access with Azure MFA Access Map

 

Microsoft filters out most of this noise as botnet attacks. However, if we know these are malicious attacks, let’s just move forward with targeting some conditional access policies to block them.

Overview

To deploy MFA with Azure AD, Infused Innovations recommends following these steps:

  1. Populate Azure Active Directory (AAD) with all your users
    • For this blog, I’m assuming this step is already completed using Azure Active Directory Connect
  2. License your users with a SKU that includes at least Azure AD Premium 1 services
    • Infused Innovations Recommends Microsoft 365 Business for organizations under 300 users or Microsoft 365 E3 with Identity Threat Protection for larger companies
  3. Configure Azure Multifactor Authentication (MFA) response challenges
  4. Configure Named Locations
  5. Create an Azure AD group for exempt users
  6. Create Risk-Based Conditional Access with Azure MFA policies
  7. Define a Conditional Access with Azure MFA break glass policy
  8. Configure Company Branding
  9. Create a custom banned password list
  10. For AAD P2 licensed users, configure Azure AD Identity Protection
  11. Create an email campaign for your users to enroll with Azure MFA
  12. Create additional conditional access policies to secure your environment

Configure Azure MFA Response Challenges

End users can configure Azure MFA and Self Service Password Reset at the same time in a single management portal. Prior to enforcing user registration, Infused Innovations recommends setting the following configurations for Authentication Methods:

 

Conditional Access with Azure MFA Challenge Options

 

  1. Require 2 response challenges to reset a password
  2. Allow the following challenge types:
  • Mobile App Notification
  • Mobile App Code
  • Email
  • Mobile Phone

Infused Innovations discourages the mobile phone option as text previews are often displayed on the lock screen of a phone. As a result of social media making it easier to discover security question answers, we don't recommend this option either.

Configure Named Locations for Conditional Access with Azure MFA

Named locations help the Azure MFA service target conditional access policies, as well as reduce false positives for risky sign-in behavior. Infused Innovations recommends creating at least the following three locations:

 

Conditional Access with Azure MFA Named Locations

 

  1. Offices (The public IP addresses of your offices. Mark these as trusted locations.)
  2. Safe Countries (Typically the United States and any other countries that your staff travels to frequently)
  3. Blocked Countries (Typically Russia, China, North Korea, Iran, Nigeria, and unknown locations)

Create an Azure AD Group for Exempt Users

Inevitably, you will have a service account or a contractor from Moscow that will need to be exempted from some of these rules. If you would like to deploy Azure MFA in user batches, then you would probably start with the following security groups:

  1. All Users
  2. Exceptions - Travel Users
  3. Exceptions - Service Accounts

The Travel Users group could be used to allow users in foreign countries to login only from corporate-owned and compliant devices without having to respond to an MFA token challenge.

Create Risk-Based Conditional Access with Azure MFA Policies

For details on how to draft a conditional access policy, you can review the following Microsoft literature:

In a nutshell, conditional access is simply:

Conditional Access Concept.

For our first rule, let’s create a rule named Block High Risk Countries to block those high risk countries:

Condition Value
Users and Groups All Users; Except for Conditional Access Exceptions
Cloud Apps All Cloud applications
Risk Levels Recommendation: Target all risk profiles
Platforms Recommendation: Target all platforms
Location Blocked Countries
App Type Recommendation: Target all app types
Device State Recommendation: Target all device states
Grant Block (or Require ALL MFA challenge types to be completed)

Now let’s create a second rule named MFA in Foreign Countries to require an MFA challenge if a login is outside of your usual geography:

Condition Value
Users and Groups All Users; Except for Conditional Access Exceptions
Cloud Apps All Cloud applications
Risk Levels Recommendation: Target all risk profiles
Platforms Recommendation: Target all platforms
Location Exclude: Safe Countries and Offices
App Type Recommendation: Target all app types
Device State Recommendation: Target all device states
Grant Require one: MFA, Compliant Device, Hybrid AAD Joined Device

You can optionally exclude the Travel Users group from this rule, and create a duplicate rule, but set the grant value to Require All instead of Require One.

And it’s that simple! You’ve just enabled Conditional Access with Azure MFA for all your users, and most of them should not have even noticed.

Create a Conditional Access with Azure MFA Break Glass Policy

In the fall of 2018, you may have heard that the Azure MFA service went offline for several hours and users were unable to login. In the event that this ever happens again, you should consider having a break glass policy—a global admin account that does not use Azure MFA so that it can disable Azure MFA during the outage.

One possible solution is to have a single account that uses Duo or AuthAnvil for an MFA challenge.

Another solution is to have a disabled Active Directory account that is a global admin but exempt from conditional access. To disable MFA, you would enable the account in AD, and force a sync with Azure AD Connect to enable the account for login to your tenant. Creating a monitoring alert that notifies all administrators if this account becomes active is highly recommended. Be sure to restrict interactive logins to a single privileged access workstation as well as a single public IP address.

Our final recommendation requires you to purchase your Office licensing from Infused Innovations. By signing of for Microsoft 365 CSP, we can work with you to use our secured tenant access to disable Conditional Access with Azure MFA in your environment during the outage.

Configure Azure AD Company Branding

This may seem like a very non-technical task, but configuring company branding in your portal can help prevent your users from falling for a phishing attack. The attacker would have to use your custom configuration instead of the generic Microsoft login page to perform the attack.

Follow this Microsoft guide to configure your portal.

Create a custom banned password list in Azure AD

Azure AD allows you to ban 1,000 custom passwords for cloud users for free. Infused Innovations recommends starting with this list of common passwords available on GitHub then add your organization’s name, and any common terms used in your industry to the list.

For Azure AD P2 licensed users, configure Azure AD Identity Protection

A future blog post will cover this topic more in-depth. For now, navigate over to the Azure Marketplace and enable Azure AD Identity Protection:

 

B2P9.png

 

Turning this feature on will enable risk reporting for your tenant. Infused Innovations recommends configuring the User Risk Policy to force a password reset for any high-risk users.

The high-risk classification means that Microsoft is confident that the account has been breached. For instance, if Microsoft finds the user’s credentials on the dark web.

Create an email campaign for your users to enroll Conditional Access with Azure MFA

Now that you’ve enabled Conditional Access with Azure MFA for all your users in a handful of risky scenarios, the next step is enrolling your users. Consider customizing the Microsoft Fast Track rollout materials that are available here: https://www.microsoft.com/en-us/download/details.aspx?id=56768

Once your users are finished enrolling with Azure MFA, we suggest making more aggressive conditional access policies. For instance, always requiring Azure MFA for OWA logins or requiring Azure MFA on non-corporate owned devices.

One final thought: avoid using App Passwords. If you have an application that doesn’t support two-factor authentication, try to upgrade or replace that application.

Be sure to check out our other top suggestions to secure your Microsoft 365 environment. We also have an article on troubleshooting code challenges and SQL with Azure app insights.

Stay connected. Join the Infused Innovations email list!

No Comments Yet

Let us know what you think