In this episode Chris asks “To block or not to block?” as he looks at geo blocking in Conditional Access, while Koos explores the human element in cybersecurity.




Geo Blocking in Conditional Access

Geo blocking in Entra Conditional Access is all about controlling access to Microsoft 365 or Entra-integrated apps based on the geographic location of a sign-in attempt. Geo blocking helps reduce risk from regions where an organization doesn’t operate or where malicious activity is common. If you’ve ever looked at your sign-in logs in Entra, you’ve likely seen something like this:

failed

Many organizations are familiar with network locations in Entra Conditional Access as a way to relax security requirements for connections from ‘trusted’ locations such as local office IPs, etc. With the geo blocking approach you can completely block geographic regions. Geo blocking is particularly effective at reducing the attack surface and enforcing compliance requirements, but as always there are some important considerations:

It’s Conditional Access so you have a lot of flexibility - for example: Only allow access from trusted devices inside your approved geographies, otherwise block or enforce MFA. Personally, I usually advise customers to block access from what we deem to be ‘high-risk’ countries - this list will usually different from organization to organization and may even be different by industry. A good place to start is to look at your sign-in logs and build a list from there. Another strategy is to look at the list of Office of Foreign Assets Control (OFAC) or similar sanctioned countries or the Top 10 cyber threat countries:

It is important to understand that geo blocking by itself isn’t a comprehensive strategy, it will reduce your attack surface and keep script kiddies away but it should form part of a layered security approach that makes it more difficult and/or expensive for bad actors to target you.

The simplest way to implement a geo blocking policy:

  1. Go to Entra admin center > Security > Conditional Access > Named locations.
  2. Create a Named location and select the countries/regions to allow or block - call it ‘Risky Countries’
  3. Create a new Conditional Access policy:

The Human element in cybersecurity

So yes, the human factor in cybersecurity. “The human is usually the weakest link” a statement that is often thrown around casually. But I don’t agree with it.

This topic came to me after I visited the hak5 booth at DEFCON actually. I picked up an O.MG cable there and starting tinkering with it and tried to answer the question “Could I protect end users from this?”. And I think we can’t.

For people who don’t know an O.MG cable looks like a regular USB cable but can inject keystrokes, exfiltrate data, and/or create backdoors. If you want to know more go listen one of the recent episodes of Darknet Diaries. This episode was actually the first time I heard about this. I feel a bit stupid for saying this but I’m not into red teaming, I’m no pentester, I wasn’t aware of half the catalog hak5 was selling at DEFCON. And it made me think: if I wasn’t aware of this cable, how can I expect my colleagues from HR or Marketing to know about it?!

Because this malicious USB device acts like a keyboard, I’m not sure how to prevent it from working except for blocking all USB ports altogether.

So, “Could I protect end users from this?” well perhaps, but not with tools but by training people. Humans are not the weakest link against these types of attacks, they might actually be the last line of defense.

This was also made clear to me when visiting the Social Engineering Village at DEFCON where I watched a “vishing” contest. A vishing contest is a live competition where participants use phone calls and social engineering tactics to trick real companies into revealing sensitive information. I was both pleasantly surprised to hear the people who picked up the phone mostly had some form of security awareness training, and weren’t handing out information for the get go. But unfortunately the skills of the social engineering experts were better in a lot of cases and with all kinds of flair and persuasion they still managed to get some valuable information about the systems they were using, how people enter the building etc.

Why Humans Matter in Modern Security

Ways for building a “Human Firewall”

So how do we strengthen that human layer? Not with simulated phishing campaigns alone I think. Whenever I’m at a party and explain to people what I do for a living, most people get started about the ridiculously fake phishing e-mails they receive within the company, and the boring video training they have to complete.

For those unaware; a rogue access point can passively listen for “probe requests” that your device sends out when looking to reconnect to known networks. These probes contain the SSIDs of networks your device has previously connected to. By mimicking a SSID your devices recognizes it tricks your device into auto-connecting (without any user interaction) and enables for various man-in-the-middle attacks.

But Technology can still help as well!

DeviceInfo
| where OnboardingStatus != "Onboarded"
| summarize count() by DeviceName, DeviceType, IPAddress

Community Project

EntraOps and SentinelEnrichment

EntraOps was made by German Security MVP Thomas Naunheim and he together with Fabian Bader (also Security MVP from Germany) worked together on SentinelEnrichment.

SentinelEnrichment caught my eye first because this PowerShell module will make your life creating/updating Microsoft Sentinel Watchlists a lot easier!

Download the module from PSGallery

Only then I’ve noticed that Thomas incorporated SentinelEnrichment into EntraOps:

EntraOps is a research project to show capabilities for automated management of Microsoft Entra ID tenant at scale by using DevOps-approach

Key features


Experts Live US

Experts Live is a global network that brings together Microsoft executives, MVPs, subject matter experts, and community members through regional and country events to share knowledge and expertise about Microsoft technologies.

Held on October 10th for the very first time in the United States at the Microsoft office at Times Square in New York City. The lineup of speakers looks to be amazing and tickets are only $ 15,- !! Will we see you there??

Experts Live US is proud to support STEM Kids NYC, helping them bring technical classes, materials and support to kids in the New York City area. All proceeds from our attendee registration will be donated to STEM Kids NYC!

Check out the Experts Live US website for more information