When a user with MFA enabled loses his mobile phone then he wouldn’t be able to login to new devices or in the old devices where the token life time have expired.
Currently in this scenario the user have to report to help desk team. Unfortunately only the global admins can perform the force reset of MFA account for the user to reset his Strongauthenticationmethods value to null to clear the old lost device.
There is a work around which can be used until we get a delegated RBAC role for performing this action. With Azure Automation account, creating a flow, integrating with flow and delegating this action to helpdesk admins will reduce the load on global admins performing this action.
Create New Automation Accounts from azure portal. Azure subscription required.They provide 500 minutes free every month.
Create new Work Flow from global admin account.This action needs to be performed from global admin account.
Choose – Flow Button for Mobile , Flow Button for Mobile – manually trigger a Flow , Select AA- Type useremail as input flow.
Navigate to triggers – Select Manually trigger a flow.
Type UserEmail as input flow-Click on New Step – Add an Action
Click on Choose an action – Select Azure Automation – Create a Job – Provide the required credentials and subscription details.
Provide the required credentials and subscription details.
Now we will see the flow is connected to Azure automation account
Now Navigate to My Flows- Select the new flow – Click on – Run Now
We can see the flow will be successfully started and execute the requested operation of resetting the MFA value to null for the user.
We can run them on automation accounts and see them for verification and they will be successful.
From the global admin Flow login – Delegate this flow to helpdesk admins as manage run only user permission.
The actual operation is executed by the global admin account however the helpdesk team will be triggering this action through the delegated run only permissions assigned to them in created Microsoft flow.
We can enable and provide self service application access to end users.If an organization is using Office 365 applications and the user is licensed for them, then the Office 365 applications will appear on the user’s Access Panel.Microsoft and third-party applications configured with Federation-based SSO can be added into this access panel.
We can create multiple groups example like HR,Marketing and required apps both internal corporate apps and social media apps can be published.
In order to logon access panel we must be authenticated using organizational account in Azure AD.We can be authenticated to azure AD directly or federated authentication and consume this service.
For organizations that have deployed Office 365, applications assigned to users through Azure AD will also appear in the Office 365 portal
The azure access panel is a web based portal which provides user with below features:
1)View and launch cloud apps. 2)Configure self service password reset. 3)Self manage groups. 4)See account details. 5)Modify MFA settings.
IT admin can be benefited and reduce first level calls by enabling below features: 1)Provide easy portal for users. 2)Launch cloud based, federated onprem apps. 3)Links to URLs. 4)Control access to corporate application. 5)Restrict access to Users by Groups ,device and location.
Navigate to URL – Azure AD – Enterprise Applications – All applications.
Select the application which we need to add – In below case LinkedIn – Click on Self-Service.
Below are the options we have at this moment:
Select the option allow users to request access to this application. – By enabling this option end users can view and request access to this application.
To which group the users must be added:
Require approval before granting access to this application:
Who is allowed to approve access to this application:
To which role users should be assigned to this application:
We have these option to add an app:
App that your developing- Register an app you’re working on to integrate it with Azure AD.
On prem app (app proxy)- Configure Azure AD Application Proxy to enable secure remote access.
Non gallery app- Integrate any other application that you don’t find in the gallery
Add from the Gallery – There are close to 3000 apps in gallery which can be added.
Example below of when adding an application we have the following options:
In below case we are adding twitter from the gallery- Custom name can be provided for the application.
Single sign on mode-we have 2 options:
Federated SSO – Allow users to access apps with their organizational accounts applicable mostly for on premise apps published here, application you are developing and any application which is integrated with on premise IDP. Only one time login is required. After signing in, the user can launch applications from the Office 365 portal or the Azure AD MyApps access panel.
Password based Sign-on- Users must remember application-specific passwords and sign in to each application.
Hide application from end user:
This option can be used if we would like to hide application from end user.
We have below option to hide office 365 apps from the access panel. Doing this will allow end users to see office 365 apps only from office 365 portal.
Further more end user settings features for access panel can be managed:
For on premise applications we need to configure federated single sign on and add them on the access panel.
Navigate to Azure AD – Click Enterprise Applications – Click all Applications – Select the application that needs Single sign on configuration
We have the below options: SAML – Use SAML whenever possible. SAML works when apps are configured to use one of the SAML protocols.For SAML we need to provide the signon url, user attributes , claims , signing certificate
And then we need to provide the azure url in the application to link with azure AD. Here we are creating an relying party trust between the application and Azure AD for the SAML configuration to work.
Linked – Can be used for cloud and on premise apps.we can use this when the application have single sign-on implemented using another service such as Active Directory Federation Services or any other IDP solution.
Disabled – Use this option If your application is not ready and integrated for SSO. Users will need to enter the user name and password every time the application is launched.
The defaults office 365 apps will be shown if its not hidden.
After Clicking on Add app users can explore the apps added by admin from the admin portal. In our case it shows only LinkedIn since we added only LinkedIn.
If there is any approval process required as per admin config it goes for approval and post approval the application will be available for requested user.
As per the recent update Microsoft recommends to use In-tune Managed Browser My-apps integration for mobile scenarios. This integration supports lots of additional cool stuff like home screen bookmark integration, azure ad app proxy integration.
The access panel will definitely help end users to access all office and their corporate applications all in one place without any confusion and will reduce the burden on the front line first level end user access requests.
According to Embarcadero
Survey Report, 83% of respondents say that they have Microsoft SQL
database environment. The widespread adoption of SQL database is attributed to its growing application scope
and relevance in the modern enterprise IT setup. However, like other database applications, SQL Server also faces tuning and performance
issues despite the Database Administrators’ (DBAs) efforts to maintain optimal
Hardware and software issues turn SQL database inaccessible, which is due to the following reasons:
Network failure issue when
database is accessed by a user
Storage media corruption leading
to corrupt MDF files
Changes on SQL server account
Corruption in File Header and
Such cases of database
corruption can be resolved with the help of Microsoft suggested utilities like DBCC
CHECKDB. But these utilities are time taking, need more technical proficiency,
and may lead to data loss situations if not used properly.
Instead, using a database repair
software like Stellar Repair for MS SQL ensures a timely and secure recovery from almost all types of Microsoft SQL corruption
issues. The software repairs the corrupt MDF and NDF files, and recovers the
entire database as new or an existing DB.
Worldwide, Microsoft SQL server has the largest share – 23.8% in relational database management category, as per a survey conducted by iDatalabs, and the reason is Microsoft’s understanding of the Database Administrator’s needs – the flexibility to manage the database, effectively. Still the issues crop-up either due to an error in SQL database file or SQL server for example SQL Server Error 5172, where the file header for a MDF file is rendered incorrect;
server page level corruption in which corruption in a particular page leads to
corruption all over the database. Numerous such errors in SQL database leads to
corruption and Administrators perform DBCC check to check and resolve the
error. However, the limitations of the Microsoft inbuilt utility compel the DBAs
to search for an effective, more comprehensive solution to fix the MSSQL
issues. And amongst a few
good SQL recovery tools is a reliable software – Stellar Repair for MS SQL.
review the software features, its advantages and the disadvantages.
About the software: A Proven SQL Repair Solution:
Based on real used cases DBA admins find it easy to recover corrupt SQL server database with the help of this enterprise-grade database repair software – Stellar Repair for MS SQL. The software’s user-friendly interface and unique features are designed to repair the primary and secondary (MDF and NDF) database files, thus addressing almost all SQL database repair and recovery needs.
The Versions of Stellar Repair for MSSQL:
Stellar Repair for MS SQL is available in three editions:
Demo Edition: The Demo edition is available for download from Stellar’s SQL Recovery Software details page and is the best to evaluate the core functionality of the software. The Demo edition provides a free preview of all the recoverable components of MSSQL database. Users can view and verify database content. The Demo edition also offers a free Log Report.
Licensed Edition: The licensed software edition
allows to recover and save the entire MS SQL database in the available database
(beneath the original database) or as a new database at the specified location.
The paid version of the software repairs the corrupt or damaged database and
also helps to resolve the database errors.
The software should be
installed on the same system on which the corrupt database resides. The
minimum system requirements include Pentium class processor, 1 GB Memory, and
50 MB of Hard disk space.
As the software supports all Windows versions including
Windows 10 (32bit/64bit)/Windows 8.1 (32bit/64bit) / 8 (32bit/64bit)/Windows 7
(32bit/64bit)/Windows Vista (32bit/64bit)/Windows Server 2012 and Windows
Server 2008, it can be installed to repair SQL database of any size and
Server: 2016, 2014, 2012, 2008 and older versions
The Key Features of MSSQL Recovery Software:
A comprehensive solution to repair the corrupt and inaccessible MDF and NDF files and recover all database components including tables, triggers, keys, rules, stored procedures in recent as well as older versions. Besides, the software also recovers XML indexes and data types, column set property, sparse columns, and file stream data types.
Resolves SQL Database Corruption Issues and Database Errors:
The software helps resolve database corruption issues at the
time when Microsoft’s built-in utility DBCC CHECKDB fails. The software fixes SQL server database corruption errors
like 5171, 8942, 3414, and also fixes SQL
database issues like header file corruption, schema corruption, consistency
error, and recovers the SQL database when it is stuck due to the following
is in Suspect mode or Offline mode
or non-clustered index corruption
pending and database attachment issues
Transaction Log file in SQL server
of Deleted Records of SQL database
The repaired LDF file is available at the MDF-file saving location.
Provides Free Preview of Repaired and Recoverable Objects:
Stellar Repair for MS SQL scans the entire corrupt database,
repairs it, and displays the preview of recoverable items in a tree-like structure. DBAs can search for specific
entries, as the database is sorted before
display. The preview feature helps verify the original database with the
Recovers Selective components:
The software allows Administrators to select specific
objects from the recovered database and save them at a specified location. This is
particularly helpful in cases where the user doesn’t need to preserve all components of the database.
Recovers ROW and PAGE compressed data:
The software review shows that it recovers SQL Tables with
PAGE and ROW compression. Also, the software supports Standard Compression
Scheme for Unicode (SCSU) for SQL Server 2008 R2, and ensures recovery of the entire database without disrupting the original
Establishes connection automatically when disrupted:
The SQL Recovery Software establishes
the connection automatically, in case the connection is interrupted. This feature saves time and effort to start the
process all over again if the connection is
disrupted and the process is halted without complete recovery.
Saves Scanned Results:
Stellar Repair for MS SQL scans, repairs and saves the scanned results of repaired SQL database during
the repair process. DBAs save these repaired
files at a later stage in case there is time or space crunch.
Saves Log Report:
The product review also shows that the software saves a Log
Report of all the repair activities. Software users can verify the software
performance with the help of the Log
The advantages and disadvantages of using Stellar Repair for MS SQL software:
All MSSQL server and database related errors and maintains database integrity
corrupt and damaged SQL database files – MDF and NDF and also saves LDF files
repaired database as new Database to reduce further chances of corruption
all deleted records from SQL database
the repaired data in multiple formats – MS SQL, HTML, XLS, and CSV
to be installed on the same system on
which the corrupt MSSQL database resides.
An analysis of the software’s key features, advantages, and
disadvantages confirms that the software effectively repairs corrupt MS SQL
database files and recovers all components of the database. The capacity with
which the software resolves the database corruption errors where even the
Microsoft utility fails, makes it distinct. Its easy-to-use interface serves
both technical as well as non-technical users well. This SQL database recovery software
review shows that the product Stellar Repair for MS SQL provides all the
database repair and recovery solutions and never compromises on database
integrity. Considering how much a
downtime can cost such tools are great lifesavers. You can use this especially
if you do not have expert knowledge about database and recovery.
Following features can be enabled :
We have 4 options at this moment:
Now we need to select this option to Microsoft Intune device enrollment.
After this is enabled we can run the what if and see if its working for the targeted user. In our case we can see the policy that we enforced is getting applied below.
Client User Behavior- Android Device Enrollment through conditional access policy.
On expanding we can see that the term detail as per the company policy.
Its always better to roll out this policy to pilot users at the initial stage, verify the behavior and later plan this roll out in a phased approach for remaining users
The IT policy terms can be added for different languages as well based on the different geographic locations.
We have an option to review the users who have accepted the policy and rejected from the policy tab.
End user accounts consuming this service will require Azure AD Premium P1, P2, EMS E3, or EMS E5 subscription inorder to activate this service to them.
In this article we will have a look at enabling Azure AD password protection policy in On Premise Active Directory Server.
By Default this feature is enabled for cloud only users with a basic filter of Azure AD password protection with global banned password list.However if we still require Azure AD password protection with custom banned password list for Cloud only users then we would need to have at-least Azure AD Basic License the default value is below.
We have below options in password protection policies:
Lockout Threshold: How many failed sign-ins are allowed on an account before its first lockout. If the first sign-in after a lockout also fails, the account locks out again.
Lockout Duration in Seconds: The minimum length in seconds of each lockout. If an account locks repeatedly, this duration increases.
Enforce custom list: When enabled, the words in the list below are used in the banned password system to prevent easy-to-guess passwords.
Custom banned password list: A list of words, one per line, to prevent your users from using in their passwords. You should include words specific to your organization, such as your products, trademarks, industries, local cities and towns, and local sports teams. Your list can contain up to 1000 words. These are case insensitive, and common character substitutions (o for 0, etc) are automatically considered.
Enable Password protection on active directory: If set to Yes, password protection is turned on for Active Directory domain controllers when the appropriate agent is installed.
Mode: If set to Enforce, users will be prevented from setting banned passwords and the attempt will be logged. If set to Audit, the attempt will only be logged.
The Visual representation of how this process works is beautifully shown below from Microsoft technet Source
Below are the prerequisites for enabling the password protection on Active Directory:
For enabling this service on On Premise Active Directory it requires an Azure AD premium license.
A proxy service agent needs to be installed on a member server running windows server 2012 R2 or later.
Domain controllers where the Azure AD password protection DC agent service will be installed must be running Windows Server 2012 or later.
All servers running the azure AD components must be fully patched in-order to have Universal C runtime installed.
Network connectivity must be present between the Azure AD proxy server and one domain controller running Azure agent Service.
An Azure AD global administrator account is required to register and consume this service for On Premise AD in Azure AD.
A local domain admin privilege account is required to register windows server AD with Azure AD.
Domain running the DC agent service must use the DFSR replication type for SysVol Replication.
Azure AD password protection proxy service server must have access to the below Microsoft Protection Endpoints.
After download we will have 3 installers as below.
Azure AD Password Protection Proxy Service – It acts as a proxy agent which will forward outgoing requests from domain controllers to Azure AD and incoming requests from Azure AD to the on premise domain controller.
DC Agent password filter dll – Will receive all the password validation requests and forward them to the main component running in onpremise Domain Controller which is Azure AD password protection DC agent.
Azure AD password protection DC agent- Receives the password validation request from the filter agent and processes them with the currently present local password policy and returns the validation response Pass/Fail. This core services queries the Azure AD password protection proxy service to check and download the new versions of password policy.
First step we need to install the proxy agent on a member server which in the same domain.
Once installation is completed Import the Module –
Register the Proxy configuration on a static Port-
Below command can be run to make the proxy service communication and DC Agent Service to run on a static specific port. This option is preferred to keep a static single port communication from this proxy service server and the Domain Controller and not to have IP to IP communication between them.
Install the DC agent on the Domain Controller. After the installation is complete only a restart is required and no further configuration is required at this stage.
After this login to Azure AD and enabled the password protection on Windows server Active Directory. Always strictly recommended to start only in Audit mode to understand the current password security and user compliance from the logs.
Once enforced in audit mode we get the below confirmation message in Azure Password protection DC Agent Event logs.
We can verify the password protection agent settings by below commands
Its always better to start this operation by only keeping them in Audit mode since it will create a major impact in the environment without proper end user awareness about enforcing this password policy change.
Also we can monitor the logs in event viewer in below location
A user resetting the password with the compliant characters will get a successful log as below
If there was a non-complaint password reset by a help-desk operator it would be logged in the audit mode and mention it did not meet the compliant standards.
When the same password is provided to end user and when the end user resets them with non-compliant values then those entries also will be logged in the event viewer.
A Successful password policy update from Azure AD can be seen below from the Azure AD password protection proxy server.
We can also see that a separate Container is created in ADSI Edit and can see 2 certificates folder created with thumbprint name.
As a best practice its not recommended to go with enforce mode initially since the end users will have tough time adopting the password policy immediately.
Once the audit mode is enabled better to circulate email floaters about the upcoming password policy change which will create better awareness.
The custom banned password policy is capable of having 1000 entries. We can gradually increase the value which will make this roll out in a smoother way.
If we are updating the global banned password in the azure portal they are pushed down to the on premise agents in a polling interval of 1 hour time period.
To Register-AzureADPasswordProtectionForest cmdlet to succeed at least one Windows Server 2012 or later domain controller must be available in the proxy server’s domain.
Post July 2018 the mailbox audit will be enabled by default for all mailboxes in the cloud.
In a hybrid setup ,Once after the mailboxes are moved to the cloud the mailbox audit will be enabled after they are converted to mailboxes from mail enabled users.
Earlier we have to run the Set-Mailbox -AuditEnabled $True every time we add a new mailbox or a mailbox is migrated to the cloud so that mailbox Audit is turned on.
Once the mailbox audit logging is enabled for owner actions we might see lots of items getting occupied for user actions in audit folder. This Audit logs is stored individually on users mailboxes itself in Hidden audit folder.
This audit folder will not come under the user mailbox quota. It will consume the recoverable items quota for each user mailbox. In order to overcome this mailbox quota limit for these recoverable items the storage quota for the recoverable items folder is automatically increased from 30 GB to 100 GB when a hold is placed on a mailbox in Exchange Online.
Without hold the default value will be 30 GB
We can also see that the audit will be enabled by default in the organizational config.
To enable audit org level – Set-OrganizationConfig -AuditDisabled $false To disable audit orglevel – Set-OrganizationConfig -AuditDisabled $True
We can see the mailbox login which will record the client logins for the owner actions inclusive of protocols POP and IMAP. Apart from this we have for inbox rules and calendar delegation which will be definitely useful in terms of troubleshooting or investigation of an compromised account.
When your tenancy begins auditing all mailboxes by default, the per-mailbox AuditEnabled setting will be overridden. However, you may still choose to disable audits for a subset of your users if there is a business need. You can elect this option by configuring audit bypass associations on the identities you intend to ignore with the Set-MailboxAuditBypassAssociation cmdlet. We can also customize the audit logging entries based on our requirement using set-mailbox and -AuditOwner option.
Below command will bypass audit for the specified mailbox.
We can run a audit report from the security and compliance center to generate audit report during an investigation. We have export operation as well.
More filter options are available
Based on the monitored mailbox audit actions we can also create an alert and notify the information security team mailbox/group for these actions which are not meeting the organization compliance.
Over the next several months, Microsoft will enable the default-auditing configuration on all tenants with a steady ramp-up with all commercial customers to be covered by the end of the calendar year. So we can expect this to be covered for all tenants by the end of this calendar year.
Mailbox audits will be stored for all user mailboxes within the commercial service by default.
The default audit configuration will change and include more audit events.
In office 365 the search can be used to search in-place items from email, documents, Skype for business and Microsoft Teams.In this article we will look into the steps to search emails from mailboxes present in office 365.
The search and delete operation can be executed when an important confidential message is sent by mistake to unintended recipients, a suspicious message have been circulated to few users or it can be even a phishing email. Admin can run into any of the above scenario and can be requested to perform this action.
In office 365 we can use the native search-mailbox , compliance search or the content search available in the office 365 security and compliance center.
The search-mailbox is exactly similar to what we have in on premise.We have to be a member of Mailbox Search and Mailbox Import Export role group to execute the search and delete operation.
We need to establish PSSession to office 365 with below: