Gathering all this information into one place was a feat unto itself. We had to do it twice for two different data sets. Then we had to correlate the data sets together, and then look at suppression technology.<\/p>\n
\u2014Vincent Bersagol, senior software engineer, Microsoft<\/p>\n<\/blockquote>\n
An engineering team within Microsoft Digital Employee Experience (MDEE), the organization that powers, protects, and transforms our internal technology, took on the challenge of identifying and removing rogue devices.<\/p>\n
Finding rogue APs posed a substantial engineering challenge. Potentially thousands of devices from a wide range of manufacturers might be on the loose in the corporate network\u2014all using different wireless protocols.<\/p>\n
\u201cGathering all this information into one place was a feat unto itself,\u201d says Vincent Bersagol, a senior software engineer for Microsoft. \u201cAnd we had to do it twice for two different data sets. Then we had to correlate the data sets together, and then look at suppression technology.\u201d<\/p>\n
Microsoft\u2019s data tools, such as Microsoft Power BI, Microsoft Azure Data Lake, and Microsoft Azure Synapse, played a key role in collecting and correlating the data. \u201cThat was a great way to visualize all this data for folks to have a look at it,\u201d Bersagol says.<\/p>\n
Our expertise in machine learning also proved helpful for finding rogue APs. We used it to sort through the correlations between wired and wireless devices.<\/p>\n
\u201cWe used a clustering algorithm that allowed us to tease out all the media access control (MAC) addresses that were statistically related to each other in a way that humans couldn\u2019t see,\u201d Bersagol says.<\/p>\n
Many access points have commonly identifiable designs we can determine by looking at multiple sets of network telemetry, including the MAC addresses. Finding these identifiable designs began with a manual examination of the rogue APs we\u2019d already discovered. We recognized that requiring a sample of every type of rogue AP to generate a manual identification to find new patterns would present problems as the project scaled.<\/p>\n
But collecting all the wired and wireless telemetry to hunt for new rogue AP designs wasn\u2019t enough. \u201cThat\u2019s too much data for humans to sift through,\u201d Bersagol says.<\/p>\n
Instead, we ran a script that matched the two telemetry sets across all machines encountered. If the script found any correlated wireless and wired data, the odds were very high that they came from the same device\u2014a rogue AP. We gained further confidence that we\u2019d found a rogue AP when the correlated addresses came from within the same building.<\/p>\n
So far, so good.<\/p>\n
But some devices have designs that elude direct correlation using the existing telemetry. By using additional telemetry sources, we\u2019ve been able to unearth devices that are more difficult to detect.<\/p>\n
Still, even finding the simpler devices yields an impressive collection.<\/p>\n
In the early stages of the project in October 2019, a sweep of about 100 buildings on the Microsoft campus unearthed more than 1,000 rogue APs.<\/p>\n
COVID-19 plays a role (of course)<\/h2>\n The COVID-19 pandemic had several impacts on the team tasked with finding rogue access points. Many rogue devices disappeared from the network because their owners were working from home.<\/p>\n
The disruption also challenged some of the engineers working on the problem.<\/p>\n
Blaze Kotsenburg, a software engineer, began work on the project in June 2020\u2014his first month as a Microsoft employee. But onboarding, meeting new team members, and getting up to speed on the rogue AP project all took place over Microsoft Teams.<\/p>\n
\u201cI couldn\u2019t go to my mentor Vincent and ask him for a 15-minute whiteboard,\u201d Kotsenburg says. \u201cI\u2019d work on something for a few hours, then ping him and say, \u2018Hey, I need some help.\u2019\u201d<\/p>\n
In spite of these challenges, the entire team found new ways to collaborate and recreate the in-office dynamic. Diego Baccino, a principal software engineering manager, shares that the virtual work environment helped create a single team, rather than one team led by Fortman and one by Baccino.<\/p>\n
\u201cWorking with two teams in parallel worked even better because of the remote situation,\u201d Baccino says. \u201cIf I were to do this over again, I\u2019d put even more emphasis on communication between everyone involved.\u201d<\/p>\n
This strong collaborative stance has remained as employees have transitioned from fully remote to hybrid work.<\/p>\n
Pulling the plug<\/h2>\n It\u2019s possible to take a very fine-grained approach to finding rogue access points and booting them off a network, such as assigning traffic through their ports to a virtual local area network (VLAN), or by blocking the devices\u2019 MAC addresses.<\/p>\n
In this case, we opted for a more blanket approach: shutting down any port connected to a rogue AP. This technique proved simple and effective, and safer than trying gentler approaches.<\/p>\n
There\u2019s what Fortman calls \u201ccollateral damage\u201d because when a port is shut down, its user might lose network connectivity for other devices in their office, and Microsoft loses visibility to anything connected to that port.<\/p>\n
\u201cShutting down a port is a basic capability of wired access\u201d Fortman says. “As more Zero Trust networking capabilities become available on the infrastructure, we’re leveraging them to proactively prevent some devices from connecting and to enact more precise rogue AP suppression through automated remediation.”<\/p>\n
While our earlier work was about identifying, cataloging, and remediating accumulated rogue AP issues, we\u2019ve now developed a more real-time approach. We\u2019re using Azure EventHub and Data Explorer to handle real-time telemetry to help improve the security response time.<\/p>\n
That set the stage for automated remediation. Now, when our systems detect a rogue AP, we can automatically suppress it through an automation platform that turns off the associated ports\u2014no human intervention required.<\/p>\n
Extending the lessons of rogue AP suppression<\/h2>\n MDEE\u2019s work tracking down and remediating rogue APs has been so successful that they\u2019re preparing slices of that data to provide to Azure datacenter teams. They\u2019ll use the lessons learned to enact their own rogue AP detection to fulfill regulatory requirements across different geographies throughout the world.<\/p>\n
Finally, these capabilities are spawning other abilities across teams as well. MDEE is actively looking for opportunities to apply the platform they\u2019ve created throughout Microsoft. That might eventually lead to a self-serve platform that other business groups within Microsoft can access for their own AP security needs.<\/p>\n
As new threats emerge and old ones find new ways to cause problems, security is a constant challenge. At Microsoft, preventing unwanted intruders is a top priority, and digital sleuthing has helped us close off one more avenue that bad actors might use.<\/p>\n
<\/p>\n
\nUnpack implementing a Zero Trust security model at Microsoft.<\/a><\/li>\nDiscover running on VPN: How Microsoft is keeping its remote workforce connected.<\/a><\/li>\nExplore how Microsoft ensures security with Windows Hello for Business.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"Finding rogue access points on Microsoft\u2019s network is an important mission for our IT teams. Networked devices have come to dominate the IT world, and their prevalence has led to more complex and vulnerable gateways. As a result, employees within Microsoft and many other large organizations regularly bring in their own wireless devices. Using a […]<\/p>\n","protected":false},"author":88,"featured_media":6447,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[407,689,419],"coauthors":[489],"class_list":["post-6445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-enterprise-mobility-and-security","tag-network-security","tag-zero-trust","program-ms-digital-stories","m-blog-post"],"jetpack_publicize_connections":[],"yoast_head":"\n
Finding and remediating rogue access points on the Microsoft corporate network - Inside Track Blog<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n\t \n\t \n\t \n