Skip to main content
Version: 2.1.0

MT.1052 - At least one Conditional Access policy is targeting the Device Code authentication flow.

Overview​

Checks if at least one policy is targeting the Device Code condition.

Organizations should block or limit device code flow because it can be exploited in phishing attacks, such as those conducted by the Storm-2372 group. Attackers leverage this authentication method to trick users into entering device codes on malicious websites, granting unauthorized access to accounts. Blocking or limiting this flow helps prevent exploitation by minimizing attack vectors, improving overall security posture, and safeguarding against compromised credentials through phishing techniques.

How to fix​

Configure a Conditional Access policy to block the Device Code authentication flow and limit access to only trusted users and devices or to specific named locations.

Learn more​

Test Metadata​

FieldValue
Test IDMT.1052
SeverityHigh
SuiteMaester
CategoryCA
PowerShell testTest-MtCaDeviceCodeFlow
TagsCA, Maester, MT.1052

Source​

  • Pester test: tests/Maester/Entra/Test-ConditionalAccessBaseline.Tests.ps1
  • PowerShell source: powershell/public/maester/entra/Test-MtCaDeviceCodeFlow.ps1