Home > Threat Directory > Missing Conditional Access Policies for blocking legacy authentication

Missing Conditional Access Policies for blocking legacy authentication

Cayosoft Threat Definition CTD-000170

Protect Your Active Directory

Tune into Guardians of the Directory Podcast.

Guardians of the Directory

Like This Article?​

Subscribe to our LinkedIn Newsletter to receive more educational content

Risk Summary

The absence of Conditional Access Policies to block legacy authentication poses a significant security vulnerability. Legacy protocols (POP/IMAP/SMTP, basic auth) bypass modern controls like MFA and are frequently abused for credential stuffing, brute force, and phishing.
  • Severity: High
  • Platform: Entra ID
  • Category: Account protection, Tenant-wide
  • MITRE ATT&CK Tactics: Persistence, Defense Evasion, Credential Access
  • MITRE D3FEND Tactics: D3-APA (Access Policy Administration)

Description

The absence of Conditional Access Policies to block legacy authentication poses a significant security vulnerability. Legacy authentication protocols like POP, IMAP, and SMTP do not support modern authentication methods such as multifactor authentication (MFA). These protocols are frequently exploited by threat actors for credential stuffing, brute force, and phishing attacks. Enforcing a block on legacy authentication greatly diminishes the risk of unauthorized access and enhances the overall security posture.

Cayosoft Guardian Protector™

Real-World Scenario

A phished mailbox still receives IMAP connections from a residential proxy network. Because legacy auth isn’t blocked, the attacker keeps harvesting mail, sets server-side forwarding, and periodically authenticates via SMTP to send convincing internal phishing. Even after the user resets their password and enrolls MFA, the attacker’s basic-auth sessions continue to succeed. Cayosoft Guardian flags that the tenant lacks a block legacy authentication Conditional Access (CA) control so responders can close the gap.

Stop Privilege Escalation—Then Undo It with Cayosoft Guardian

Real-time alerts across AD & Entra ID with one-click rollback.

How to Detect (Cayosoft Guardian)

1.) Sign in to Cayosoft Guardian Threat Detection Dashboard.

2.) View All Alerts and search for CTD-000170 or Missing Conditional Access Policies for blocking legacy authentication.

3.) Open any alert and Click for details (from Raise Threat Alert action).

4.) Evidence:

  • Microsoft Entra tenant
  • Details (list)
  • Blocked Legacy Authentication (Yes/No)
  • Existing CAP Details (list)
  • Recommended CAP for Blocking Legacy Auth

Remediation Steps

Using the remediation advice in Cayosoft Guardian, follow these steps to remove the vulnerability:
  1. ) Review sign-in logs in Entra ID to identify users and applications relying on legacy authentication.
  2. ) Navigate to Entra ID > Sign-ins and filter for Legacy Authentication Clients
  1. ) To create Conditional Access Policy, go to Entra ID > Security > Conditional Access.
  2. ) Configure a new policy with the following Assignments:
    1. ) Users: All users or specific groups
    2. ) Applications: All cloud apps or specific critical apps
  3. ) Configure a new policy with the following Conditions:
    1. ) Client Apps: Select Other clients and check legacy authentication protocols (e.g., POP, IMAP, SMTP)
    2. ) Controls: Block access
  4. ) Navigate to Entra ID > Security > Authentication Methods > Modern Authentication.
  5. ) Turn off legacy authentication protocols where feasible.
  6. ) Notify affected users and provide guidance for transitioning to modern authentication.
  7. ) Continuously monitor authentication logs to ensure compliance.
  8. ) Deploy in a phased manner to minimize disruption to critical services.

How to Prevent It

Cayosoft Guardian can proactively detect and alert on missing Conditional Access policies for blocking legacy authentication. It continuously monitors Active Directory, Entra ID, Microsoft 365, and Intune for over 200 misconfigurations, providing early warning before attackers can exploit them.

FAQ

Without a policy to block legacy authentication, attackers can exploit outdated protocols like POP, IMAP, and SMTP. These protocols do not support multifactor authentication (MFA) and are frequently abused for credential stuffing, brute force, and phishing attacks. Even if a user resets their password and enables MFA, legacy auth sessions can still succeed, leaving the environment exposed.

Tools such as Cayosoft Guardian can identify when a tenant is missing this control. To remediate, administrators should create a Conditional Access policy in Entra ID that blocks legacy authentication for all users and apps, with tightly controlled exclusions only for break-glass or critical accounts. Additionally, they should review sign-in logs to detect active use of legacy protocols, migrate affected services to modern authentication, and continuously monitor for residual attempts.

The recommended approach is to first run the policy in Report-only mode or target a pilot group to assess impact. Once validated, enforce the policy tenant-wide with a “Block access” grant. If any legacy clients are still required, replace them with modern clients wherever possible, or use a temporary, time-limited exception that is closely monitored.

Final Thought

Proactive monitoring and timely remediation of configuration risks is essential to maintaining a secure Active Directory and Microsoft 365 environment. By addressing issues like Missing Conditional Access Policies for blocking legacy authentication, you reduce attack surfaces and strengthen your organization’s overall security posture.