This blog is all about Azure AD Identity Protection alerts (referred to provider name ”IPC” later on the blog post) in the Microsoft cloud ecosystem.
If you want to read how IPC works I encourage you to read my blog post or navigate straight to docs.microsoft.com.
IPC is an Azure AD P2 feature that has been in general availability mode for approx. three years. Earlier this year Microsoft did ”refresh” for IPC and added new detection capabilities and enhanced UI. Azure AD P2 feature means that it’s available in most expensive license packages.
You will get a taste of its features even with a free Azure AD license but all the cool features are included in AAD P2. Practically, IPC calculates user risk (online/offline) based on Machine Learning & AI and makes decisions based on policies, is user login approved, is MFA or password change needed or is user sign-in blocked.
Gimme The Alerts – Where are Those?
Azure AD Identity Protection (IPC) is a provider for multiple security solutions which means that alerts triggered in IPC can be found from multiple places (list below). Let’s have a closer look.
- Azure AD Identity Protection blade
- Intelligent Security Graph (ISG)
- Azure Sentinel
- Cloud App Security (MCAS)
- Azure Security Center
- Microsoft Threat Protection suite (MTP)
- PowerShell for management
Azure AD – Identity Protection Blade
Identity Protection UI resides in Azure AD where investigation and mitigations can be done. Btw, check my demo environment Identity Secure Score, 237 out of 265. Quite impressive even I say it myself 🙂
If a risk is detected admins (or dedicated email distribution list) will receive an alert as seen below. When a link is clicked, the person who received the email will land to the Identity Protection portal in Azure AD.
Intelligent Security Graph (ISG) aka Microsoft Security Graph
Identity Provider is one of the ISG providers, the full list of available providers at the time of writing can be found here. In pictures below are ISG high-level architecture and export from ISG alert from my tenant. In the latter one, you can see the provider highlighted with yellow color.
If you are using Azure Sentinel (a cloud-native SIEM which is a hot topic right now) and you have configured data connectors, and activated rule properly you will get IPC alerts to Azure Sentinel as incidents.
Azure Sentinel Identity Protection template rule basically raises an incident if an alert is generated in IPC.
Microsoft Cloud App Security
The IPC alert is also found from MCAS. As you can see from the picture below MCAS adds information to the alert and makes it more useful for the investigation. Btw, MCAS is the best solution in the Microsoft ecosystem to investigate internal user suspicious activity and behavior. If you are using it, I highly encourage you to get familiar with it and especially to UEBA capabilities.
I’m sold to it, totally:) But, I’m looking it only from the technical perspective, not from a financial perspective.
Azure Security Center (ASC)
IPC alerts are also found from Azure Security Center. ASC also provides a geolocation map which can be very useful to get a bigger picture of the attack.
Microsoft Threat Protection Suite (MTP)
MTP was just launched to public preview. Unfortunately, I don’t have such an environment available where it’s enabled. In a nutshell, it is a pre -and post-breach enterprise defense suite that natively integrates across endpoints, protecting:
- Endpoints with Microsoft Defender ATP
- Email and collaboration with Office 365 ATP
- Identities with Azure ATP and Azure AD Identity Protection
- Applications with Microsoft Cloud App security
More information from here and here.
This has slipped out of my radar totally. Microsoft released the PowerShell module for Microsoft Security Graph in April 2019. You can read more about it from here. In a nutshell, you need to do the following:
- PowerShell v5 or above
- Register App to Azure AD
- User this URI: urn:ietf:wg:oauth:2.0:oob, it’s needed for desktop app redirect to work
- Configure permissions to the App ( SecurityEvents.ReadWrite.All )
- Grant Admin consent to the App
- Install the module
- Run and enjoy 🙂
In the Technet blog, there are multiple questions about App registration guidance. My 2cents:
- When registering the App, grant API permissions for delegated mode (interactive login is used)
- Grant SecurityEvents.Read.All & SecurityEvents.ReadWrite.All permissions to the App
- Grant admin consent
- When running the PowerShell – use you userprincipalName as username and AppID as password.
Using the module
Login with userPrincipalName + App ID. After the initial login, the modern authentication prompt appears (it’s encrypted by Finnish) and interactive login is processed together with Conditional Access policies.
Managing the Alerts
MicrosoftGraphSecurity module has following available commands
With Get-GraphSecurityAlert you can get all alerts from the ISG with Identity Protection alerts included.
Secure Score information is also available with Get-GraphSecuritySecureScore command.
Set ISG Alert
ISG alerts can be managed via PowerShell with Set-MicrosoftGraphSecurity cmdlet. Extremely useful if the alerts are sent to SIEM. The downside is that there isn’t any integration to the backends (providers).
Note: This means that even you update the alert status in ISG it will remain open in the ISG providers (Identity Protection, Cloud App Security etc.)
The Microsoft cloud ecosystem is huge and organizations have multiple security solutions available by default. Keep in mind that most of the advanced tools (including IPC, MCAS) require E5/A5, G5, P2 license. As seen above, synergy advantages are obvious.
What solutions to use is more a matter of cloud logging and monitoring strategy. From which sources you want to have an audit trail & events sent and to where? Where are you processing all the alerts, in SIEM or directly in Security solutions? And lastly, how operations are built around the solutions.
Until next time!
Paluuviite: Azure AD Identity Protection Deep Diver – Part 2 – Sam's Corner