

- #MICROSOFT OFFICE 365 PASSWORD RESET FOR NON AZURE USERS HOW TO#
- #MICROSOFT OFFICE 365 PASSWORD RESET FOR NON AZURE USERS FREE#
We would like to thank Microsoft for sharing this abnormal behavior and associated IOCs. We hope this tool will assist organizations around the world. We have made this tool available to the community in our CrowdStrike github repository. We recommend that all Azure AD administrators review their Azure AD configuration to help determine if they have been impacted and take steps to prevent intrusions. We have detailed steps below enabling you to view this critical information manually in the Microsoft 365 admin center this is also documented in the CRT readme. Of note, due to the lack of documentation of Microsoft API capabilities, CRT does not pull critical information regarding partner tenant permissions, which includes delegated admin access. This includes delegated permissions and application permissions, Federation configurations, Federation trusts, mail forwarding rules, Service Principals, objects with Ke圜redentials, and more. In our role supporting organizations impacted by the SUNBURST incident, the CrowdStrike Services team has created a community tool called CrowdStrike Reporting Tool for Azure (CRT) to quickly and easily pull up these excessive permissions and other important information about your Azure AD environment.

Key information should be easily accessible. We found it particularly challenging that many of the steps required to investigate are not documented, there was an inability to audit via API, and there is the requirement for global admin rights to view important information which we found to be excessive.
#MICROSOFT OFFICE 365 PASSWORD RESET FOR NON AZURE USERS HOW TO#
Throughout our analysis, we experienced first hand the difficulties customers face in managing Azure’s administrative tools to know what relationships and permissions exist within Azure tenants, particularly with third-party partner/resellers, and how to quickly enumerate them. The information shared by Microsoft reinforced our conclusion that CrowdStrike suffered no impact. As part of our secure IT architecture, CrowdStrike does not use Office 365 email.ĬrowdStrike conducted a thorough review into not only our Azure environment, but all of our infrastructure for the indicators shared by Microsoft.

There was an attempt to read email, which failed as confirmed by Microsoft. Specifically, they identified a reseller’s Microsoft Azure account used for managing CrowdStrike’s Microsoft Office licenses was observed making abnormal calls to Microsoft cloud APIs during a 17-hour period several months ago. Whilst doing our review, CrowdStrike was contacted by the Microsoft Threat Intelligence Center on December 15, 2020.

We have conducted an extensive review of our production and internal environments and found no impact. Customer security and transparency are CrowdStrike’s top priority. The motivations and true extent of how far reaching this campaign has been will be better understood by the security industry and authorities in weeks, maybe months to come. This is clearly a sophisticated operation carried out over a long period of time.
#MICROSOFT OFFICE 365 PASSWORD RESET FOR NON AZURE USERS FREE#
CrowdStrike launches CrowdStrike Reporting Tool for Azure (CRT), a free community tool that will help organizations quickly and easily review excessive permissions in their Azure AD environments, help determine configuration weaknesses, and provide advice to mitigate risk.
