Skip to content

Latest commit

 

History

History
89 lines (66 loc) · 4.95 KB

secure-your-domain.md

File metadata and controls

89 lines (66 loc) · 4.95 KB
title description services author manager ms.assetid ms.service ms.subservice ms.workload ms.topic ms.date ms.author
Secure Azure AD Domain Services | Microsoft Docs'
Learn how to disable weak ciphers, old protocols, and NTLM password hash synchronization for an Azure Active Directory Domain Services managed domain.
active-directory-ds
iainfoulds
daveba
6b4665b5-4324-42ab-82c5-d36c01192c2a
active-directory
domain-services
identity
article
09/09/2019
iainfou

Disable weak ciphers and password hash synchronization to secure an Azure AD Domain Services managed domain

By default, Azure Active Directory Domain Services (Azure AD DS) enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be required for some legacy applications, but are considered weak and can be disabled if you don't need them. If you have on-premises hybrid connectivity using Azure AD Connect, you can also disable the synchronization of NTLM password hashes.

This article shows you how to disable NTLM v1 and TLS v1 ciphers and disable NTLM password hash synchronization.

Prerequisites

To complete this article, you need the following resources:

Disable weak ciphers and NTLM password hash sync

To disable weak cipher suites and NTLM credential hash synchronization, sign in to your Azure account, then get the Azure AD DS resource using the Get-AzResource cmdlet:

Tip

If you receive an error using the Get-AzResource command that the Microsoft.AAD/DomainServices resource doesn't exist, elevate your access to manage all Azure subscriptions and management groups.

Login-AzAccount

$DomainServicesResource = Get-AzResource -ResourceType "Microsoft.AAD/DomainServices"

Next, define DomainSecuritySettings to configure the following security options:

  1. Disable NTLM v1 support.
  2. Disable the synchronization of NTLM password hashes from your on-premises AD.
  3. Disable TLS v1.

Important

Users and service accounts can't perform LDAP simple binds if you disable NTLM password hash synchronization in the Azure AD DS managed domain. If you need to perform LDAP simple binds, don't set the "SyncNtlmPasswords"="Disabled"; security configuration option in the following command.

$securitySettings = @{"DomainSecuritySettings"=@{"NtlmV1"="Disabled";"SyncNtlmPasswords"="Disabled";"TlsV1"="Disabled"}}

Finally, apply the defined security settings to the Azure AD DS managed domain using the Set-AzResource cmdlet. Specify the Azure AD DS resource from the first step, and the security settings from the previous step.

Set-AzResource -Id $DomainServicesResource.ResourceId -Properties $securitySettings -Verbose -Force

It takes a few moments for the security settings to be applied to the Azure AD DS managed domain.

Next steps

To learn more about the synchronization process, see How objects and credentials are synchronized in an Azure AD DS managed domain.