{"id":388,"date":"2021-06-01T18:59:31","date_gmt":"2021-06-01T18:59:31","guid":{"rendered":"https:\/\/thecloudmarathoner.com\/?p=388"},"modified":"2021-06-18T19:05:16","modified_gmt":"2021-06-18T19:05:16","slug":"protecting-against-compromised-user-devices-with-zero-trust-access-control","status":"publish","type":"post","link":"https:\/\/thecloudmarathoner.com\/index.php\/2021\/06\/01\/protecting-against-compromised-user-devices-with-zero-trust-access-control\/","title":{"rendered":"Protecting against compromised user devices with Zero Trust Access Control?"},"content":{"rendered":"\n<p>Hello Cloud Marathoners,<\/p>\n\n\n\n<p>I have been asked to expand upon set of available Microsoft Azure services that could help with compromised user devices. One way to deal with such scenarios is to temporarily suspend user access until endpoint is cleaned.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"417\" src=\"\/wp-content\/uploads\/2021\/06\/protect-against-compromised-user-device-1024x417.jpg\" alt=\"\" class=\"wp-image-389\" srcset=\"\/wp-content\/uploads\/2021\/06\/protect-against-compromised-user-device-1024x417.jpg 1024w, \/wp-content\/uploads\/2021\/06\/protect-against-compromised-user-device-300x122.jpg 300w, \/wp-content\/uploads\/2021\/06\/protect-against-compromised-user-device-768x313.jpg 768w, \/wp-content\/uploads\/2021\/06\/protect-against-compromised-user-device-1200x489.jpg 1200w, \/wp-content\/uploads\/2021\/06\/protect-against-compromised-user-device.jpg 1455w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Taking into account that your user&#8217;s device is compromized, you can automate response either to restric or restore the access to the endpoint.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Option#1 &#8211; Retrict Access<\/h3>\n\n\n\n<p>To help with this scenarious you could use the Azure AD&#8217;s Conditional Access features. The <strong>Conditional Access<\/strong> knows about the device risks because Microsoft Defender for Endpoint (MDE) notified Intune, who then updated the compliance status of the device in Azure AD. <br><br>During this period, the user is restricted from accessing corporate resources. These applies to all new resource requests and will block any current access to resources that support continuous access evaluation (CAE). <br><br>Your user will still be able to do general internet productivity and research (like Wikipedia, external web resources and anything else that doesn\u2019t require corporate authentication), but won\u2019t have access to corporate resources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Option#2 &#8211; Restore Access<\/h3>\n\n\n\n<p>The second option (illustrated on infographic) mitigates the &#8220;Access restored&#8221; scenariou. This correspondce to sceanriou wher threat has been remediated and cleaned up, MDE triggers Intune to update Azure AD and Conditional Access restores the user\u2019s access to corporate resources.<\/p>\n\n\n\n<p>Described two scenarious above, mitigate the risk to the organization by ensuring attackers who may be in control of these devices cannot access corporate resources, while minimizing the impact on user productivity to minimize disruption of business processes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is next?<\/h3>\n\n\n\n<p>Check this interesting references on Microsoft docs and learn about <a rel=\"noreferrer noopener\" href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/conditional-access\/concept-continuous-access-evaluation\" target=\"_blank\">Continue Access Evaluation (CAE)<\/a> &#8211; and other Common Conditional Access policies.<\/p>\n\n\n\n<p>F\u1d0f\u029f\u029f\u1d0f\u1d21 \u1d0d\u1d07 \ud83c\udfaf \u1d00\u0274\u1d05 become \u1d00&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cloudmarathoner&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6811340334384132096\">#cloudmarathoner<\/a>&nbsp;\u26c5\ud83c\udfc3\u200d\u2642\ufe0f\ud83c\udfc3\u200d\u2640\ufe0f &#8211; \ud835\udc0b\ud835\udc04\ud835\udc13&#8217;\ud835\udc12 \ud835\udc02\ud835\udc0e\ud835\udc0d\ud835\udc0d\ud835\udc04\ud835\udc02\ud835\udc13 \ud83d\udc4d<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=microsoftazure&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6811340334384132096\">#microsoftazure<\/a>&nbsp;<br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=free&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6811340334384132096\">#conditionalaccess<\/a>&nbsp;<br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cloudskills&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6811340334384132096\">#compromiseduser<\/a><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=continuouslearning&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6811340334384132096\">#continuouslearning<\/a><\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_388\" class=\"pvc_stats all  \" data-element-id=\"388\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hello Cloud Marathoners, I have been asked to expand upon set of available Microsoft Azure services that could help with compromised user devices. One way to deal with such scenarios is to temporarily suspend user access until endpoint is cleaned. Taking into account that your user&#8217;s device is compromized, you can automate response either to &hellip; <a href=\"https:\/\/thecloudmarathoner.com\/index.php\/2021\/06\/01\/protecting-against-compromised-user-devices-with-zero-trust-access-control\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Protecting against compromised user devices with Zero Trust Access Control?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,15],"tags":[],"class_list":["post-388","post","type-post","status-publish","format-standard","hentry","category-microsoft-learn","category-security-governance"],"_links":{"self":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":4,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/388\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}