More Info:

Ensure that your Microsoft Azure virtual machines (VMs) are configured to use Azure Active Directory (AAD) credentials for secure SSH/RDP access. Once enabled, you can use your corporate Active Directory credentials to log in to your virtual machines, enforce Multi-Factor Authentication (MFA), or enable access via RBAC roles.

Risk Level

Medium

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration “Enable Virtual Machine Access using Active Directory Authentication” in Azure using the Azure console, follow the below steps:

  1. Login to the Azure portal (https://portal.azure.com/).
  2. Navigate to the Virtual Machine for which you want to enable Active Directory authentication.
  3. Click on the “Networking” tab in the left-hand menu.
  4. Scroll down to the “Inbound port rules” section and click on “Add inbound port rule”.
  5. In the “Add inbound security rule” window, provide the following details:
    • Name: Enter a name for the rule.
    • Priority: Enter a priority value for the rule. This value should be lower than any other existing rules.
    • Source: Select “Any” or specify the IP address range from where the traffic should be allowed.
    • Service: Select “RDP” or “SSH” depending on the protocol you want to enable.
    • Destination port ranges: Enter the port number for RDP or SSH.
    • Action: Select “Allow”.
    • Protocol: Select “TCP”.
    • Virtual machine: Select the virtual machine for which you want to enable Active Directory authentication.
    • NIC: Select the network interface card associated with the virtual machine.
    • Authentication type: Select “Azure Active Directory”.
  6. Click on “Add” to create the inbound security rule.

Once the above steps are completed, you have successfully enabled Virtual Machine Access using Active Directory Authentication for the selected Virtual Machine in Azure.