835 votesAnonymous commented
A must :) !
390 votes12 comments · Office 365 Security & Compliance » Advanced Security Management · Flag idea as inappropriate… · Admin →
Thanks for taking the time to provide this feedback. We’ve updated the TechNet documentation (https://technet.microsoft.com/library/mt842508(v=exchg.150).aspx) to clear up confusion around which authentication type and protocol combinations are supported in CARs. Expanding support for more combinations could prevent bad actors with valid credentials from accessing mailbox content, but it wouldn’t help with scenarios like password spray attacks or malicious lockout attempts because CARs are evaluated post-authentication. There’s work underway on a solution that covers a broader array of basic authentication scenarios – we’ll share more details as soon as possible. In the interim, this blogpost (https://cloudblogs.microsoft.com/enterprisemobility/2018/03/05/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks/) outlines the recommended approach for forcing multi-factor authentication when using AAD and ADFS.
4 votesAnonymous shared this idea ·
421 votes19 comments · Office 365 Security & Compliance » Advanced Security Management · Flag idea as inappropriate… · Admin →Anonymous commented
This needs to be fixed urgently.
Please provide by any means, a way to search & kill all active sessions/token, the exipred user might still have on your end. It could be a view in Azure AD, an result from a PS command ...
PLEASE, DO IT AS WE LOVE YOUR PRODUCTS GIRLS & GUYS.