Introduction

Microsoft Intune experienced major public interest through cyberattacks related with US Organization Stryker and Iran war.

The core issue is a "Living-off-the-Land" (LotL) technique where attackers use a company's own management software against them.

The attackers gained privileged access through hijacked Administrator accounts and abused Intune to wipe out approximately 200'000 devices.

These events highlight the critical importance of securing Microsoft 365 infrastructure, specifically by treating identity as the primary perimeter and reinforcing the security of endpoint management (MDM) platforms.


Key takeaways and caveats

  • Identity attacks are the most common way adversaries get access to victims, therefore identity should be the key security perimeter
  • Privileged accounts and Intune admin roles can severely impact your endpoint infrastructure
    • Intune allows attackers to remotely wiping devices, installing harmful applications, or running malicious scripts
  • Intune does not have a recycle bin or restore options for deleted devices
  • Intune is not designed for managing mission-critical endpoints - as a cloud-based MDM, its primary purpose is to support standardized digital workplaces that can be redeployed at any time without causing significant business disruption

More on Intune


How to protect your infrastructure

1. Protect admin accounts with phishing-resistant MFA

Every privileged account should be enforced with phishing-resistant MFA. This includes Passkeys and FIDO2 security keys.

Enforce every authentication to sensible workloads with Conditional Access and an Authentication Strength to only permit phishing-resistant methods.

Entra Authentication Overview
Introduction Microsoft Entra is a cloud-based identity provider (IdP) that powers every authentication and many authorization processes in the Microsoft cloud ecosystem. To verify your identity, you need to provide a secret, which only you * know (a password credential) * have (a physical item) * are (biometrics) to authenticate with Microsoft Entra.

2. Use just-in-time and just-enough access for critical operations

No admin should ever be assigned with permanent Global Administrator access. Most accounts in the wild are over-privileged for their use case.

Set up Privileged Identity Management (PIM) to grant only just-in-time and just-enough access.

Privileged Identity Management (PIM) concept + setup
Introduction Privileged Identity Management (PIM) is no longer a hidden gem in the Microsoft cloud ecosystem. It was originally released almost 10 years ago! I know there is already a lot of great content out there on it, but this blog post will be my personal summary. What to expect

Also consider Intunes own RBAC system to granularly give permissions on different tasks in Intune, such as policy manipulation or remote actions like delete or wipe.

Additionally, anytime you assign any privileges to a group in Entra ID, enable the immutable switch "roles can be assigned to this group". With that, only Global Admins and Privileged Role Admins can add members to such a group. This prevents privilege escalation.

Intune RBAC permissions
Introduction Intune role-based access control allows administrators to control the level of access to the Intune portal and its resources. It works by assigning roles to users or groups of users. Each role defines a set of permissions throughout Intune or device management such as Device configuration, remote tasks, security

3. Leverage Multi Admin Approval

Multi Admin Approval has been in Intune for years, but flying under the radar. Essentially, it is a dual-control system, so applying admin configurations requires approval from a secondary admin before getting effective.

4. Level up Conditional Access policies with Authentication Contexts

Conditional Access should be in place for every Microsoft 365 tenant. But only few organizations use it effectively to secure critical operations such as admin interaction with management portals. Authentication Context in combination with Protected Actions and PIM should be considered!

Advanced Conditional Access
Introduction Conditional Access is the heart of identity security in every Microsoft tenant. In my previous blog post I explained fundamental concepts and how to get started with it: Conditional Access - The ultimate starter guideIntroduction In today’s world, workforce is more distributed and the security landscape keeps evolving.

5. Proactively Log & Monitor your infrastructure

Last, but not least, keep in mind that Entra ID logs and Intune logs are only collected for 30 days by default. Furthermore, analyzation and visualization capabilities remain limited.

In my opinion, storing logs in a Log Analytics Workspace for at least 180 days should be mandatory. Especially, in the case of a breach logs are the primary source to reconstruct the attack and understand impact.

Log analytics: the basics
Azure log analytics workspace is a product for data collection storage. Connect other cloud services with diagnostic settings or install an agent to upload data. What is it for? Well, logs are the foundation of nearby everything. Knowledge is power. We have the ability to store the information and data

Bonus:

This Azure Workbook from me provides a centralized solution for monitoring and analyzing audit logs to maintain full visibility over your Microsoft Intune environment. By grouping disparate event data into a single pane of glass, it enables administrators to easily track configuration changes, device operations, and identity assignments. Learn more:

Intune change tracking (Azure Workbook)
What is it? Intune offers a variety of configurations and functionalities, namely talking about configuration profiles, applications, scripts and also operational tasks like managing a device. (enroll, sync, delete etc.) It can be quite a challenge to keep track of all the changes and operations, and the audit logs don’t

powered by Oceanleaf

Oceanleaf
Technology blog on Microsoft Cloud. Learn about cutting edge tech, explained simply & straightforward in quality focused blog posts.
You’ve successfully subscribed to Oceanleaf
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.