Information
This recommendation ensures that issued tokens are only issued to the intended device.
When properly configured, conditional access can aid in preventing attacks involving token theft, via hijacking or reply, as part of the attack flow. Although currently considered a rare event, the impact from token impersonation can be severe.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Remediate from Azure Portal
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Protection > Conditional Access > Policies.
- Select New policy.
- Give your policy a name.
- Under Assignments, select Users or workload identities.
- Under Include, select the users or groups to apply this policy.
- Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts (if applicable).
- Under Target resources > Resources > Include > Select resources
- Under Select, select the following applications:
- Office 365 Exchange Online
- Office 365 SharePoint Online
- Choose Select
- Under Conditions :
- Under Device platforms
- Set Configure to Yes.
- Include > Select device platforms > Windows.
- Select Done.
- Under Client apps :
- Set Configure to Yes
- Under Modern authentication clients, only select Mobile apps and desktop clients.
- Select Done
- Under Access controls > Session, select Require token protection for sign-in sessions and select Select.
- Confirm your settings and set Enable policy to On.
- Select Create to enable your policy.
Impact:
A Microsoft Entra ID P1 or P2 license is required.
Start with a Conditional Access policy in "Report Only" mode prior to enforcing for all users.