Month: July 2014

#AADSync Beta2 available on Connect #FIM2010

Source: MS Connect announcement by the AADSync product group

 

Microsoft announced the the availability of AADSync Beta2 on Connect.

You can download it here : AAD Sync Beta2 (https://connect.microsoft.com/site433/Downloads/DownloadDetails.aspx?DownloadID=53831)

 

With Beta 2 there are some new features frequently requested:

–       Select only required services/attributes to synchronize to AAD

–       Exchange hybrid deployments

–       Password write-back for multiple-forests (AAD Premium preview feature)

 

Good news: the AADSync product group is looking for customers who are interested in using Beta2 in production. If you are interested, then do the following:

–       Download the updated build from Connect and read the documentation on http://go.microsoft.com/fwlink/?LinkID=393942 for the latest information.

–       Install and verify the scenarios you plan for production use. You do not need permissions from Microsoft to start evaluating AADSync.

–       If you find any issues or need help, submit feedback through Connect. This is also the fastest way to get access to our beta support team.

–       When you have completed the verification and all issues have been resolved, send an email to “Azure AD Sync Service Feedback”AADSyncFB@microsoft.com with information which scenarios you plan to use and have verified are working. Also provide contact information. The team will respond back with information on how to get call-in support during the preview phase.

Thank you for helping us make AADSync a better product,

 

Find more information on AADSync on TechNet Wiki: http://aka.ms/AADSYnc.

Note-to-self: Update – New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks

Source: http://microsoft.com/pth

New blog post at : http://blogs.technet.com/b/security/archive/2014/07/08/new-strategies-and-features-to-help-organizations-better-protect-against-pass-the-hash-attacks.aspx

Posted by Matt Thomlinson, Vice President, Microsoft Security

Microsoft released new guidance to help our customers address credential theft, called Mitigating Pass-the-Hash and Other Credential Theft, version 2.

“The paper encourages IT professionals to “assume breach” to highlight the need for the use of holistic planning strategies and features in Microsoft Windows to become more resilient against credential theft attacks. This paper builds on our previously released guidance and mitigations for Pass-the-Hash (PtH) attacks. 

Given that organizations must continue to operate after a breach, it is critical for them to have a plan to minimize the impact of successful attacks on their ongoing operations. Adopting an approach that assumes a breach will occur, ensures that organizations have a holistic plan in place before an attack occurs. A planned approach enables defenders to close the seams that attackers are aiming to exploit.

The guidance also underscores another important point – that technical features alone may not prevent lateral movement and privilege escalation. In order to substantially reduce credential theft attacks, organizations should consider the attacker mindset and use strategies such as identifying key assets, implementing detection mechanisms, and having a breach recovery plan. These strategies can be implemented in combination with Windows features to provide a more effective defensive approach, and are aligned to the well-known National Institute of Standards and Technology (NIST) Cybersecurity Framework.