Hi All,
I had the “pleasure” again this week to Document the Azure AD Policies.
Making several Screenshots in the Azure AD Portal seemed not the best way.
MSGraph: List Conditional Access policies So tried to use the Microsoft Graph Explorer
You need the Permission:
Policy.Read.All https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies
While using the JSON could be one way. It’s not very good if you have to Document it in a Word Document right.
Hi All,
I recently had a case where i needed to access the AzureAD Signin Logs with PowerShell.
I’ve started at the Azure AD Signin Logs and filtered by UPN
Next step was Graph Explorer where i found the needed Permissions
############################################################################### # Graph Explorer ############################################################################### #Go to [https://aka.ms/ge](https://aka.ms/ge) https://graph.microsoft.com/v1.0/auditLogs/signIns https://graph.microsoft.com/v1.0/auditLogs/signIns?&$filter=startsWith(userPrincipalName,'a.bohren@icewolf.ch') Let’s connect with these Permissions (they need Admin Consent and i already have that)
#Import-Module and Connect to Microsoft Graph Import-Module Microsoft.
Hi All,
In January 2024, the legacy multifactor authentication and self-service password reset policies will be deprecated and you’ll manage all authentication methods here in the authentication methods policy. Use this control to manage your migration from the legacy policies to the new unified policy.
How to migrate MFA and SSPR policy settings to the Authentication methods policy for Azure AD (preview) First review current Policies:
MFA policy SSPR policy (if used) Authentication methods policy (if used) Enable “Allow use of Microsoft Authenticator OTP”
Hi All,
New opt-in endpoint for POP3/IMAP4 clients that need legacy TLS
Exchange Online ended support for TLS1.0 and TLS1.1 in October 2020. This year, we plan to disable these older TLS versions for POP3/IMAP4 clients to secure our customers and meet compliance requirements. However, we know that there is still significant usage of POP3/IMAP4 clients that don�t support TLS 1.2, so we�ve created an opt-in endpoint for these clients so they can use TLS1.
Hi All,
Do you know the Certification Authority Authorization (CAA) DNS Records?
With these Records you can control what CA can issue Certificates for your domain.
DNS Certification Authority Authorization CAA implementation mandatory for all certificate authorities by September 2017.
RFC 8659 DNS Certification Authority Authorization (CAA) Resource Record That Record means no CA is allowed to issue Certificates and Wildcard Certifcates for that Domain
domain.tld. IN CAA 0 issue ";" domain.
Hi All, Recently i came across an interessting Project. Now i had some Time to check it out.
Microsoft Azure AD Assessment
https://github.com/AzureAD/AzureADAssessment ## Install Module
Install-Module AzureADAssessment
## Authenticate using a Global Admin or Global Reader account.
Connect-AADAssessment
## Export data to "C:\AzureADAssessment" into a single output package.
Invoke-AADAssessmentDataCollection
It's important to say, that you have to use PowerShell 7. Seems to be that you need to have an Azure Active Directory P2 License to gather all the Logs.
Hi All, I've seen some Posts about the new Microsoft Authenticator settings in AzureAD. Here is how you get there. Go to the Azure Active Directory Portal https://aad.portal.azure.com and select "Security"
On the Security Page open "Authentication methods"
On Authentication methods select "Microsoft Authenticator"
On Microsoft Authenticator Settings select "Configure"
Here you can change some settings that are already available quite for a while, but now you have a GUI to it.
Hi All,
VMware has released a Security Advisory to address the CVE-2022-31676. You need to upgrade to VMware Tools 12.1.0 to fix the Issue.
VMSA-2022-0024.html VMware Tools 12.1.0 Download After you have downloaded the ZIP file mount the vmwaretools.iso and run the Setup64.exe (or setup.exe on x86 Processors)
On my Server i had to restart and relaunch the Setup
Looks good after the Reboot and again launched setup64.exe
Let’s check in VCSA
Hi All,
With the August 2022 Updates for ExchangeServer 2013/2016/2019 there is a new Feature called Windows Server Extended Protection. This will help against authentication relay or “man in the middle” (MitM) attacks.
Exchange Server Support for Windows Extended Protection Restrictions
does not work with hybrid servers using Modern Hybrid configuration SSL Offloading scenarios are not supported Automated Archiving with Archive Policy is not suported TLS configuration must be consistent across all Exchange servers Access to Public Folders on Exchange 2013 not supported The newest version of HealthChecker.
Hi All, The M365 Defender for Office Safe Links Block list have been moved to Tenant Allow Block List (TABL) If you click on "Global Settings"
https://security.microsoft.com/safelinksv2
you can see that the Block List have been Migrated
Let's check the Tenant Allow/Block List https://security.microsoft.com/tenantAllowBlockList
You can view the TenantAllowBlockList Items with the following Exchange command
Get-TenantAllowBlockListItems
https://docs.microsoft.com/en-us/powershell/module/exchange/get-tenantallowblocklistitems?view=exchange-ps
Get-TenantAllowBlockListItems -ListType URL Get-TenantAllowBlockListItems -ListType URL | where {$_.Notes -match "Migrated"}
I came across the "