What is the application "Office 365 Management" (AppId 00b41c95-dab0-4487-9791-b9d2c32c80f2) and why is Conditional Access not applied to it?

Tilman Schmidt 20 Reputation points
2024-11-07T16:22:56.1666667+00:00

I am investigating a security incident and I have identified entries in the MS Sentinel SigninLogs table that might be related to the breach with the attributes:

AppDisplayName: Office 365 Management

AppId: 00b41c95-dab0-4487-9791-b9d2c32c80f2

AuthenticationRequirement: singleFactorAuthentication

ConditionalAccessStatus: notApplied

ResultType: 0

We have enabled mandatory multi-factor authentication for all our users via conditional access policy, and I am concerned very much that there is apparently a way to bypass this.

What is this application "Office 365 Management"?

Why is my conditional access policy not applied to it?

What could an attacker do with it?

Can she just use it to check whether her stolen credentials are working or can she actually do harm beyond that?

Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,195 questions
{count} votes

Accepted answer
  1. Raja Pothuraju 10,040 Reputation points Microsoft Vendor
    2024-12-18T20:52:37.2166667+00:00

    Hello @Tilman Schmidt,

    Thank you for your response.

    As you observed, there are no successful sign-in logs for "Office 365 Management" in the last 30 days. However, we noted 9 failed sign-in attempts, with the failure reason being "Invalid username or password" or "Invalid on-premises username or password."

    This error indicates that whoever attempted to log in to the application entered an incorrect password. Regarding Conditional Access, you might notice that its status shows as "Not Applied" for these attempts. This is because Conditional Access policies are enforced only after the first factor of authentication is successfully completed. In this scenario, the sign-in attempts failed at the first factor itself, so the Conditional Access policy was not triggered.

    If this type of attack were successful, and the user gained access to "Office 365 Management," they would be able to access users, groups, and licenses for all users in the tenant—provided that the user in question has the necessary roles and permissions assigned. However, if the user does not hold any elevated roles, such as Global Administrator, they would not be able to make changes to the tenant.

    Thanks,
    Raja Pothuraju.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.