{"id":14636,"date":"2025-08-19T07:06:23","date_gmt":"2025-08-19T07:06:23","guid":{"rendered":"https:\/\/newestek.com\/?p=14636"},"modified":"2025-08-19T07:06:23","modified_gmt":"2025-08-19T07:06:23","slug":"microsoft-entra-private-access-brings-conditional-access-to-on-prem-active-directory","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14636","title":{"rendered":"Microsoft Entra Private Access brings conditional access to on-prem Active Directory"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Attackers are increasingly targeting cloud resources, but that doesn\u2019t mean they no longer see our on-premises Active Directory installations as excellent targets for gaining access to our networks. Government entities, for example, often rely on lots of on-premises servers as well as traditional desktops that make for juicy targets.<\/p>\n<p>As a result, Microsoft last year began testing how to add Microsoft Entra\u2019s increased access control capabilities to on-premises systems as a means for enabling organizations to establish conditional access and multi-factor authentication (MFA) options for these resources. Initially the rollout included <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-entra-blog\/microsoft-entra-private-access-for-on-prem-users\/3905450\">support for connecting to resources<\/a> such as Active Directory domain controllers using Entra\u2019s identity-centric Zero Trust Network Access (ZTNA) framework.<\/p>\n<p>In July the <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/global-secure-access\/how-to-configure-domain-controllers\">official Microsoft documentation<\/a> included details about configuring what the company calls \u201cEntra Private Access for Active Directory Domain Controllers,\u201d indicating that these features are in mainstream release and available for production use.<\/p>\n<p>There is one major hurdle to overcome before you can roll out this capability: You will need to ensure your network is NTLM free and only supports Kerberos authentication with your domain controllers. The goal for Entra Private Access is to take the place of legacy VPNs and internal Active Directory resources.<\/p>\n<h2 class=\"wp-block-heading\" id=\"prepping-your-systems-for-entra-private-access\">Prepping your systems for Entra Private Access<\/h2>\n<p>While Entra Private Access has been generally available since November 2024, full Active Directory domain controller integration and documentation has only been available as of last month.<\/p>\n<p>To set up the service you must have the Global Secure Access Administrator role in Microsoft Entra ID. The product also requires licensing, but you can use trial licenses to test the deployment in a proof of concept.<\/p>\n<p>You must also ensure that client machines run Windows 10 or higher and that they are Microsoft Entra joined or hybrid joined devices. Client machines must also have line of sight to the private resources and domain controller. In other words, the user must be within the corporate network, accessing on-premises resources.<\/p>\n<p>For firewall rules, you must open inbound TCP port 1337 in the Windows Firewall on the domain controllers. You must also identify the Service Principal Names (SPNs) of the private apps you want to protect and add them to the Private Access Sensors policy installed on the domain controllers.<\/p>\n<p>Microsoft recommends testing this functionality with your private app first. You can enforce MFA to the domain controller by using the private app\u2019s SPN, but doing so at a later stage may help you avoid any admin lockout issues, Microsoft reports.<\/p>\n<p>As with many deployments, issues often start with troubleshooting the various parts needed for installation. I would recommend you review the <a href=\"https:\/\/microsoft.github.io\/GlobalSecureAccess\/\">resources at the Global Secure Access community resources hub<\/a> and set up a proof of concept.<\/p>\n<p>At this time, clients that can be protected include Windows 10 and 11 and Android. Windows on Arm, macOS, and iOS are in preview at this time.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<figure class=\"wp-block-image size-full\"><\/figure>\n<p class=\"imageCredit\">Susan Bradley \/ CSO<\/p>\n<\/div>\n<h2 class=\"wp-block-heading\" id=\"putting-entra-private-access-to-work\">Putting Entra Private Access to work<\/h2>\n<p>Before you can roll out these additional security settings, you need to be well on your way toward removing NTLM from your network. First you\u2019ll need to audit your environment to identify where NTLM is being used.<\/p>\n<p>To do so, navigate to Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesSecurity Options.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<figure class=\"wp-block-image size-full\"><\/figure>\n<p class=\"imageCredit\">Susan Bradley \/ CSO<\/p>\n<\/div>\n<p>The deepest level of auditing, including workgroup and domain authentication attempts that use NTLM, can be achieved by setting:<\/p>\n<ul class=\"wp-block-list\">\n<li>Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers = Audit All<\/li>\n<li>Network security: Restrict NTLM: Audit NTLM authentication in this domain = Enable all<\/li>\n<li>Network security: Restrict NTLM: Audit Incoming NTLM Traffic = Enable auditing for all accounts<\/li>\n<\/ul>\n<p>Note that the setting of \u201cAudit NTLM authentication in this domain\u201d should be set for domain controllers only.\u00a0 Auditing of \u201cOutgoing NTLM traffic to remote servers\u201d and \u201cAudit Incoming NTLM Traffic\u201d should be set on all computers.<\/p>\n<p>Now sit back and review your log files located in Event Viewer (Local)Applications And Services LogsMicrosoftWindowsNTLMOperational.<\/p>\n<p>Identify the applications and processes that are communicating over <a href=\"https:\/\/www.csoonline.com\/article\/2097636\/ridding-your-network-of-ntlm.html\">a very insecure protocol<\/a>. Even if you don\u2019t deploy Entra Private Access, take the time to audit use of NTLM in your network, as it will assist you as well in <a href=\"https:\/\/www.csoonline.com\/article\/4031659\/windows-tips-for-reducing-the-ransomware-threat.html\">defending against ransomware attacks<\/a>.<\/p>\n<p>Once you have identified NTLM use in your applications and processes, you\u2019ll want to block NTLM v1 and begin the transition to enforce and restrict NTLM v2 by setting the following policy:<\/p>\n<ul class=\"wp-block-list\">\n<li>Go to Computer Configuration &gt; Policies &gt; Windows Settings &gt; Security Settings &gt; Local Policies &gt; Security Options.<\/li>\n<li>Find Network Security: LAN Manager Authentication Level and set it to Send NTLMv2 response only. Refuse LM &amp; NTLM. This enforces use of Kerberos and only allows NTLMv2 as a fallback where absolutely necessary.<\/li>\n<\/ul>\n<p>Once again, review the results and determine which applications and network segments are impacted. For applications that are deeply impacted, you may want to evaluate your options, as some applications may need to be retired or updated to newer versions to phase out NTLM.<\/p>\n<p>If you are no longer reliant on NTLM, you can safely block its use in the domain.<\/p>\n<p>To do so, under Group Policy, configure Network Security by selecting the policies: \u201cRestrict NTLM: NTLM authentication in this domain.\u201d You can choose from \u201cDeny for domain accounts to domain servers\u201d to \u201cDeny All\u201d for total blocking.<\/p>\n<p>For any applications in your network, <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/windows-itpro-blog\/the-evolution-of-windows-authentication\/3926848\">review<\/a> to ensure they are not hardcoded for NTLM.\u00a0 Specifically check for the following:<\/p>\n<ul class=\"wp-block-list\">\n<li>Calls to the <code>AcquireCredentialsHandle<\/code> function that are passing in the hardcoded string <code>ntlm<\/code> \u2014 replace these instances with <code>negotiate<\/code><\/li>\n<li>Calls to the <code>RpcBindingSetAuthInfo<\/code> function \u2014 replace <code>RPC_C_AUTHN_DEFAULT<\/code> with <code>RPC_C_AUTHN_GSS_NEGOTIATE<\/code>.<\/li>\n<\/ul>\n<p>Removing NTLM from your network is not impossible, but it can be challenging. Take the time and resources to review your options so you can add more cloud security techniques and embed them into your local Active Directory.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Attackers are increasingly targeting cloud resources, but that doesn\u2019t mean they no longer see our on-premises Active Directory installations as excellent targets for gaining access to our networks. Government entities, for example, often rely on lots of on-premises servers as well as traditional desktops that make for juicy targets. As a result, Microsoft last year began testing how to add Microsoft Entra\u2019s increased access control&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14636\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14636","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14636"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14636\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}