diff --git a/PowerShell/ScubaGear/Modules/Support/Support.psm1 b/PowerShell/ScubaGear/Modules/Support/Support.psm1 index 23a854b644..de01ee6b4f 100644 --- a/PowerShell/ScubaGear/Modules/Support/Support.psm1 +++ b/PowerShell/ScubaGear/Modules/Support/Support.psm1 @@ -861,7 +861,6 @@ function New-SCuBAConfig { "MS.AAD.2.3v1", "MS.AAD.3.1v1", "MS.AAD.3.2v1", - "MS.AAD.3.3v1", "MS.AAD.3.6v1", "MS.AAD.3.7v1", "MS.AAD.3.8v1" diff --git a/PowerShell/ScubaGear/baselines/aad.md b/PowerShell/ScubaGear/baselines/aad.md index eb35d2cc4c..75251cad40 100644 --- a/PowerShell/ScubaGear/baselines/aad.md +++ b/PowerShell/ScubaGear/baselines/aad.md @@ -229,11 +229,11 @@ If phishing-resistant MFA has not been enforced, an alternative MFA method SHALL - [T1110.003: Password Spraying](https://attack.mitre.org/techniques/T1110/003/) #### MS.AAD.3.3v1 -If phishing-resistant MFA has not been enforced and Microsoft Authenticator is enabled, it SHALL be configured to show login context information. +If Microsoft Authenticator is enabled, it SHALL be configured to show login context information. -- _Rationale:_ This stopgap security policy helps protect the tenant when phishing-resistant MFA has not been enforced and Microsoft Authenticator is used. This policy helps improve the security of Microsoft Authenticator by showing user context information, which helps reduce MFA phishing compromises. -- _Last modified:_ June 2023 +- _Rationale:_ This policy helps protect the tenant when Microsoft Authenticator is used by showing user context information, which helps reduce MFA phishing compromises. +- _Last modified:_ February 2025 - _MITRE ATT&CK TTP Mapping:_ - [T1110: Brute Force](https://attack.mitre.org/techniques/T1110/) - [T1110.001: Password Guessing](https://attack.mitre.org/techniques/T1110/001/)