top of page

The dashboard still shows MFA enabled. The box is still checked. And the gap is still there.

  • Writer: ForgeNorth Brief
    ForgeNorth Brief
  • 6 days ago
  • 2 min read

When Device Enrollment Becomes the Attack Path


Most Microsoft 365 security discussions focus on identity, email, and Conditional Access. Fewer examine Intune enrollment: who can enroll a device, from what, and under what conditions.


That gap matters.


The incident


An attacker gained access to a standard user account. No admin rights. No elevated privileges.


In many environments, that’s a contained issue: reset the password, revoke sessions, move on.


That didn’t happen here.


Intune allowed open enrollment (a common scenario). A valid user account with a valid credential and Microsoft license could enroll on any device without additional verification.


The attacker spun up a virtual machine and enrolled it using the compromised credentials.


From Intune’s perspective, the device was legitimate. Enrollment succeeded.


Within minutes, the virtual machine received device configuration profiles including the corporate VPN client and its settings. The attacker connected and gained internal network access.


No MFA during enrollment. No device trust requirement. No restriction on unmanaged or virtual devices.


A single compromised password was enough.


Why this works


MFA is not enforced during enrollment by default


Authentication occurs, but Conditional Access policies often don’t apply to enrollment unless explicitly configured.*


Enrollment accepts nearly any device by default


Physical or virtual. Corporate or personal. Known or unknown. Without restrictions, Intune treats them the same.


Together, these create a path that bypasses controls organizations assume are in place.


What this means


Device enrollment is a gateway into your environment.


It doesn’t just register a device, it provisions it:


  • Applications

  • Certificates

  • Configuration & security settings

  • VPN access


If that process trusts only a username and password, then anyone with those credentials can step through that gateway.


Controls that bridge the gap


Require MFA for Intune enrollment


Apply Conditional Access to the Microsoft Intune Enrollment cloud app to require MFA during enrollment. *In real environments, this is often unreliable or operationally disruptive - particularly with Autopilot or technician-led builds—and is not a substitute for enforcing device trust.


Restrict enrollment to Autopilot devices

Allow only devices pre-registered as an Autopilot device. This means that unregistered devices, including virtual machines, cannot enroll.


Block personal device enrollment

Limit enrollment to corporate-owned devices across all platforms. An Autopilot registered device constitutes as a corporate-owned device and prevents unmanaged devices from entering the environment.


Require compliance before access

Use Conditional Access to block access until devices meet security standards. Ensure Intune device compliance policies adequately capture the necessary security controls.


Monitor enrollment activity


Review logs for:


  • Unexpected device types

  • Virtual machines

  • Off-hours enrollment activity


Without monitoring, this activity is silent.


In conclusion


Intune enrollment is a trusted provisioning system. When configured correctly, it delivers access to the right devices and the right users. When misconfigured, it does the same for threat actors. A verified user is not the same as a trusted device. That’s the gap.

 
 
 

Recent Posts

See All
MFA Is On. That Doesn't Mean You're Protected.

Why MFA Coverage Is Not the Same as MFA Protection Most small businesses that have deployed multi-factor authentication believe they've solved the authentication problem. In most IT conversations, MFA

 
 
 
The 'We Just Use Email' Security Myth

“We only use email — no Teams, no OneDrive, no SharePoint. Nothing to worry about… right?” That assumption is exactly what attackers count on. You don’t need a full Microsoft 365 environment to have r

 
 
 

Comments


bottom of page