Forsyte IT Solutions
Forsyte IT Solutions
  • Why Guardian 365

Security Trends and Threat Intelligence

Attackers can bypass MDO protections in Teams for guest users using an unprotected tenant. The protections used in Teams messages are determined by the host tenant; therefore, if a guest account is invited to a Teams chat in an unprotected tenant, then an attacker can send them malicious URLs and attachments that are not scanned by MDO.

Share This Post

MDO Teams Threat

The Problem

Attackers can bypass MDO protections in Teams for guest users using an unprotected tenant. The protections used in Teams messages are determined by the host tenant; therefore, if a guest account is invited to a Teams chat in an unprotected tenant, then an attacker can send them malicious URLs and attachments that are not scanned by MDO.

Full Scenario

An attacker spins up a tenant with minimal licensing, specifically with no security
licensing. Using normal guest invitation procedures or the new Microsoft “Chat with people not using Teams” feature, a guest is invited to a Teams chat. If the victim accepts, the attacker sends them malicious links and/or attachments. Since the MDO protections are determined by the hosting tenant of the chat (the attacker’s tenant in this scenario), the links and attachments are not scanned by MDO Safe Links and Safe Attachments.

How Can We Mitigate the Risk?

Here are a few options to mitigate or reduce the risk of this scenario:

    • Set the allowed/blocked external domains for Teams in the Global settings
      This setting gives you control over the domains a user is allowed to contact via TeamsYou can define this setting to:
      • Allow only a specific set of external domains (recommended)
      • Allow all external domains (not recommended)
      • Block a specific set of recommended domains (not recommended)
      • Block all external domains (recommended)
    • This setting can prevent your user accounts from accepting the malicious invites and joining the malicious chats, but it will not protect their personal emails from being invited and joining Education and awareness are the only ways to help prevent compromise from personal account usage.

Set the allowed/blocked external domains for Teams using a user-based policy. The settings configured are the same as above; however, you can choose to apply a Teams external access policy to a set of users that will take precedence over the global org settings.

  • If you cannot block external domains for the whole org, you can use a policy to block external domains for admins, high-risk accounts, or others that have a large blast radius should they be compromised.

Sentinel Data Lake

What is the Sentinel Data Lake?

The Sentinel Data Lake is a long-term, cold storage solution separate from a log analytics workspace. This new data lake allows you to store more data for longer at a lower cost. Previously, you had 3 options for data storage in log analytics: the analytics tier, basic logs, and auxiliary logs. Now, you still have the same analytics tier, which is not changing, and you have the new cold storage data lake tier, which allows cold storage for up to 12 years. Pricing for the data lake tier can be found here.

Should you enable the Sentinel Data Lake?

Yes. The Sentinel Data Lake is a cheaper alternative to basic logs and auxiliary
logs. Additionally, the data lake tier provides cheaper and more extensive options for querying data in cold storage. This has not been confirmed by Microsoft; however, it would make sense that they are going to build additional Sentinel features that utilize the Sentinel Data Lake; therefore, you would need to enable the Sentinel Data Lake to make use of these future features.

How to enable the Sentinel Data Lake?

Enabling the Sentinel Data Lake is very simple. Go to the Security Center > Settings >Microsoft Sentinel > Data Lake. Once you start the process, you only need to enter a subscription and resource group for billing purposes. Required prerequisites can be found here.

More To Explore

Schedule a Pen Test

The Guardian 365 Pen Test assesses your systems by simulating cyberattacks on internal resources, external resources, and web apps.

See identify configuration issues and vulnerabilities that external and internal attackers could use to exploit your systems. Sign up for a Guardian 365 Pen Test to enhance your security today!

Contact - Schedule a Pen Test
Name
Name
First
Last

EDUCATION LEADERS TALK SECURITY

You’re in the right place! Complete the form to hear the latest Guardian 365 security discussion featuring IT leaders from Spelman College and Spring Grove Area School District. You won’t want to miss this!

Guardian 365: Education Leaders Talk Security
Name
Name
First
Last

Cybersecurity Insurance Audit

Let us help you save money on your Cybersecurity Insurance by providing an audit of your current environment, and provide recommendations on how to reduce the cost of your insurance policy,

Contact - Cybersecurity Insurance
Name
Name
First
Last

Request a Demo

At Forsyte Guardian 365, we believe in transparency and hands-on experiences. Complete the form to request your personalized demo. Remember, security is not a luxury. It’s a necessity. Let’s empower your team with Guardian 365! 

Request a Demo

At Forsyte Guardian 365, we believe in transparency and hands-on experiences. Complete the form to request your personalized demo. Remember, security is not a luxury. It's a necessity. Let's empower your team with Guardian 365! 

Request A Demo
Name
Name
First
Last

Get Started

If you are experiencing a security breach or have detected suspicious activity, get help now.

Contact - Talk to an Expert
Name
Name
First
Last

Expert Recovery Services for Security Breaches

If you are experiencing a security breach or have detected suspicious activity, get help now.

Contact - Recovery Services
Name
Name
First
Last