Source URL: https://it.slashdot.org/story/25/06/19/2046206/microsoft-365-brings-the-shutters-down-on-legacy-protocols?utm_source=rss1.0mainlinkanon&utm_medium=feed
Source: Slashdot
Title: Microsoft 365 Brings the Shutters Down On Legacy Protocols
Feedly Summary:
AI Summary and Description: Yes
**Summary:** Microsoft 365 is set to enhance security by blocking legacy authentication protocols starting July 2025 as part of its “Secure by Default” initiative. This move aims to mitigate risks associated with vulnerable legacy protocols, although it may potentially disrupt user workflows.
**Detailed Description:** In an effort to bolster security within Microsoft 365, Microsoft will cease support for legacy authentication protocols beginning mid-July 2025. This decision is part of the company’s broader “Secure by Default” initiative, focusing on reducing unauthorized data exposure.
Key Points:
– **Blocking Legacy Protocols:**
– Microsoft will block legacy authentication methods, including Remote PowerShell (RPS) and FrontPage RPC, which are identified as vulnerable to brute-force and phishing attacks due to non-modern authentication methods.
– Legacy browser authentication to SharePoint and OneDrive will also be discontinued.
– **Threat Landscape:**
– Legacy protocols like RPS and RPC have been deemed “more susceptible to compromise,” prompting Microsoft to take action to protect its users and clients.
– **Concerns Over Workflow Disruption:**
– Users relying on third-party applications for accessing files and sites will be affected as administrator consent will now be mandatory.
– This shift means that users can no longer grant permissions themselves, potentially leading to workflow disruptions as they may have to wait for admin consent.
– **Impact on Third-Party Applications:**
– Microsoft advocates that requiring explicit admin consent for third-party app access could significantly reduce the risk of overexposing organizational content.
– The default setting will prevent users from consenting to such access, compelling them to seek approvals from their administrators.
This initiative indicates a strong pivot towards more secure practices in cloud computing, reflecting the growing need for enhanced security measures in digital infrastructures. Security professionals and compliance officers within organizations using Microsoft 365 should prepare for these changes, ensuring that workflows are adjusted accordingly to accommodate the new consent procedures and understand the implications of relying on legacy systems.