Skip to content

Commit bd3e775

Browse files
Windows MDM Fix Manual Detection (#17721)
#15565 Replace the use of the isFederated registry key with a keys that check for AAD (Azure Active Directory, now Entra ID) Federated enrollment (`isFederated`) seems to be when windows uses a Discovery MDM endpoint to get its policy and management endpoint configuration. This is always the case when a client is enrolled with fleet, so installations always show up as automatic. It's being replaced by a different key, `AADResourceID`, which appears to identify the resource that controls the automated deployment. In my tests it only appears to be populated when the computer is enrolled through automated deployments. This key appears on both Windows 10 and 11. There is a similar key, `AADTenantID`, which appears to identify the client (tenant) to the Azure cloud. I haven't seen this ID in our systems, so it is likely exclusively used in Azure. Both this key and `AADResourceID` seem to always be set at the same time, so we only check for the `AADResourceID`. I've also added documentation on the registry keys I've analyzed for future reference.
1 parent 8ed8f3d commit bd3e775

File tree

6 files changed

+108
-25
lines changed

6 files changed

+108
-25
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
- Fix a bug where all Windows MDM enrollments were detected as automatic

cmd/osquery-perf/agent.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -1514,12 +1514,12 @@ func (a *agent) mdmWindows() []map[string]string {
15141514
if !a.mdmEnrolled() {
15151515
return []map[string]string{
15161516
// empty service url means not enrolled
1517-
{"is_federated": "0", "discovery_service_url": "", "provider_id": "", "installation_type": "Client"},
1517+
{"aad_resource_id": "", "discovery_service_url": "", "provider_id": "", "installation_type": "Client"},
15181518
}
15191519
}
15201520
return []map[string]string{
15211521
{
1522-
"is_federated": "0",
1522+
"aad_resource_id": "",
15231523
"discovery_service_url": a.serverAddress,
15241524
"provider_id": fleet.WellKnownMDMFleet,
15251525
"installation_type": "Client",

docs/Contributing/windows-mdm-glossary-and-protocol.md

+85-3
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,88 @@ The certificate created through the WSTEP process is used to authenticate mTLS b
5757

5858
https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-mdm/33769a92-ac31-47ef-ae7b-dc8501f7104f
5959

60-
61-
62-
<meta name="pageOrderInSection" value="2900">
60+
## MDM Device Registration Summary
61+
62+
https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-dvrd/296ebf70-bd4b-489e-a531-460d8ef7519b
63+
64+
# Registry
65+
66+
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Enrollments\`
67+
Each enrollment gets its own subdirectory with a UUID as a key,
68+
inside each directory is a set of keys associated with that enrollment
69+
- `CurCryptoProvider`
70+
Often `Microsoft Software Key Storage Provider`
71+
Cryptographic Key storage provider
72+
- `CurKeyContainer`
73+
Key within key provider
74+
- `DiscoveryServiceFullURL`
75+
MDM Discovery service URL
76+
- `DMPCertThumbPrint`
77+
According to [this blog post](https://call4cloud.nl/2022/10/fullmetal-certificate-the-revenge-of-renewal/), this is the thumbprint of your MDM device certificate
78+
- `EnrollmentFlags`
79+
See [this link](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-xcep/cd22d3a0-f469-4a44-95ed-d10ce4dc2063) for details
80+
81+
| Integer value | Meaning |
82+
|---------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
83+
| 0x00000001 | Instructs the client and CA to include an S/MIME extension, as specified in [RFC4262]. |
84+
| 0x00000008 | Instructs the CA to append the issued certificate to the userCertificate attribute, on the user object in Active Directory. |
85+
| 0x00000010 | Instructs the CA to check the user's userCertificate attribute in Active Directory, as specified in [RFC4523], for valid certificates that match the template enrolled for. |
86+
| 0x00000040 | This flag instructs clients to sign the renewal request using the private key of the existing certificate. For more information, see [MS-WCCE] section 3.2.2.6.2.1.4.5.6. This flag also instructs the CA to process the renewal requests as specified in [MS-WCCE] section 3.2.2.6.2.1.4.5.6. |
87+
| 0x00000100 | Instructs the client to get a user's consent before attempting to enroll for a certificate based on the specified template. |
88+
| 0x00000400 | Instructs the client to delete any expired, revoked, or renewed certificate from the user's certificate stores. |
89+
| 0x00002000 | This flag instructs the client to reuse the private key for a smart card–based certificate renewal if it is unable to create a new private key on the card. |
90+
- `EnrollmentState`
91+
The best documentation we can find is [here](https://learn.microsoft.com/en-us/graph/api/resources/intune-shared-enrollmentstate?view=graph-rest-beta)
92+
93+
| Member | Value | Description |
94+
|--------------|-------|--------------------------------------------------------------------------------------------------------------------|
95+
| unknown | 0 | Device enrollment state is unknown |
96+
| enrolled | 1 | Device is Enrolled. |
97+
| pendingReset | 2 | Enrolled but it's enrolled via enrollment profile and the enrolled profile is different from the assigned profile. |
98+
| failed | 3 | Not enrolled and there is enrollment failure record. |
99+
| notContacted | 4 | Device is imported but not enrolled. |
100+
| blocked | 5 | Device is enrolled as userless, but is blocked from moving to user enrollment because the app failed to install. |
101+
102+
- `EnrollmentType`
103+
According to [this PDF](https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-MDE2/%5BMS-MDE2%5D.pdf) it can have three different values.
104+
105+
Device, Full, and AppManaged
106+
107+
From what I've seen, value 6 on AAD, 1 on manual
108+
- `isFederated`
109+
According to [this web page](https://learn.microsoft.com/en-us/windows/client-management/federated-authentication-device-enrollment), being federated means that the MDM
110+
endpoints and details were fetched from a Discovery endpoint,
111+
instead of being manually installed. The page does not make mention
112+
of the specific registry key, but we are making an assumption that
113+
it means the same thing.
114+
- `ProviderID`
115+
Set during enrollment. In our case it's the word "Fleet".
116+
- `RenewalPeriod`
117+
Set during enrollment. Period to renew WSTEP certificate.
118+
- `RenewErrorCode`
119+
Presumably set if there is an error renewing WSTEP certificate.
120+
- `RenewROBOSupport`
121+
According to [this post](https://call4cloud.nl/2022/10/fullmetal-certificate-the-revenge-of-renewal/) this means "Request On Behalf Of".
122+
It seems to have to do with automatic certificate renewal
123+
- `RenewStatus`
124+
Status of the renewal
125+
- `RenewTimestamp`
126+
Presumably the timestamp of the last renewal
127+
- `RootCertThumbPrint`
128+
The thumbprint of the WSTEP root certificate
129+
- `SID`
130+
Security Identifier
131+
- `UPN`
132+
User Principal Name of the user that enrolled the device
133+
- `AADResourceID`
134+
Appears to be the domain of the server managing the enrollment,
135+
always appears to be present on machines enrolled through Microsoft
136+
Entra (Azure Active Directory)
137+
- `AADTenantID`
138+
Also related to Azure Active Directory, and also appears to be
139+
present at the same time as AADResourceID.
140+
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Provisioning\Diagnostics\AutoPilot`
141+
Autopilot provisioning diagnostic data
142+
143+
144+
<meta name="pageOrderInSection" value="2900">

docs/Using Fleet/Understanding-host-vitals.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -176,10 +176,10 @@ WITH registry_keys AS (
176176
enrollment_info AS (
177177
SELECT
178178
MAX(CASE WHEN name = 'UPN' THEN data END) AS upn,
179-
MAX(CASE WHEN name = 'IsFederated' THEN data END) AS is_federated,
180179
MAX(CASE WHEN name = 'DiscoveryServiceFullURL' THEN data END) AS discovery_service_url,
181180
MAX(CASE WHEN name = 'ProviderID' THEN data END) AS provider_id,
182-
MAX(CASE WHEN name = 'EnrollmentState' THEN data END) AS state
181+
MAX(CASE WHEN name = 'EnrollmentState' THEN data END) AS state,
182+
MAX(CASE WHEN name = 'AADResourceID' THEN data END) AS aad_resource_id
183183
FROM registry_keys
184184
GROUP BY key
185185
),
@@ -190,7 +190,7 @@ WITH registry_keys AS (
190190
LIMIT 1
191191
)
192192
SELECT
193-
e.is_federated,
193+
e.aad_resource_id,
194194
e.discovery_service_url,
195195
e.provider_id,
196196
i.installation_type
@@ -374,7 +374,7 @@ SELECT * FROM os_version LIMIT 1
374374
- Query:
375375
```sql
376376
SELECT os.name, r.data as display_version, k.version
377-
FROM
377+
FROM
378378
registry r,
379379
os_version os,
380380
kernel_info k

server/service/osquery_utils/queries.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -473,10 +473,10 @@ var extraDetailQueries = map[string]DetailQuery{
473473
enrollment_info AS (
474474
SELECT
475475
MAX(CASE WHEN name = 'UPN' THEN data END) AS upn,
476-
MAX(CASE WHEN name = 'IsFederated' THEN data END) AS is_federated,
477476
MAX(CASE WHEN name = 'DiscoveryServiceFullURL' THEN data END) AS discovery_service_url,
478477
MAX(CASE WHEN name = 'ProviderID' THEN data END) AS provider_id,
479-
MAX(CASE WHEN name = 'EnrollmentState' THEN data END) AS state
478+
MAX(CASE WHEN name = 'EnrollmentState' THEN data END) AS state,
479+
MAX(CASE WHEN name = 'AADResourceID' THEN data END) AS aad_resource_id
480480
FROM registry_keys
481481
GROUP BY key
482482
),
@@ -487,7 +487,7 @@ var extraDetailQueries = map[string]DetailQuery{
487487
LIMIT 1
488488
)
489489
SELECT
490-
e.is_federated,
490+
e.aad_resource_id,
491491
e.discovery_service_url,
492492
e.provider_id,
493493
i.installation_type
@@ -1612,7 +1612,7 @@ func directIngestMDMWindows(ctx context.Context, logger log.Logger, host *fleet.
16121612
serverURL := data["discovery_service_url"]
16131613
if serverURL != "" {
16141614
enrolled = true
1615-
if isFederated := data["is_federated"]; isFederated == "1" {
1615+
if data["aad_resource_id"] != "" {
16161616
// NOTE: We intentionally nest this condition to eliminate `enrolled == false && automatic == true`
16171617
// as a possible status for Windows hosts (which would be otherwise be categorized as
16181618
// "Pending"). Currently, the "Pending" status is supported only for macOS hosts.

server/service/osquery_utils/queries_test.go

+12-12
Original file line numberDiff line numberDiff line change
@@ -692,7 +692,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
692692
data: []map[string]string{
693693
{
694694
"discovery_service_url": "",
695-
"is_federated": "1",
695+
"aad_resource_id": "https://example.com",
696696
"provider_id": "Some_ID",
697697
"installation_type": "Client",
698698
},
@@ -703,7 +703,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
703703
wantServerURL: "",
704704
},
705705
{
706-
name: "off missing is_federated and server url",
706+
name: "off missing aad_resource_id and server url",
707707
data: []map[string]string{
708708
{
709709
"provider_id": "Some_ID",
@@ -728,7 +728,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
728728
data: []map[string]string{
729729
{
730730
"discovery_service_url": "https://example.com",
731-
"is_federated": "1",
731+
"aad_resource_id": "https://example.com",
732732
"provider_id": "Some_ID",
733733
"installation_type": "Client",
734734
},
@@ -743,7 +743,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
743743
data: []map[string]string{
744744
{
745745
"discovery_service_url": "https://example.com",
746-
"is_federated": "0",
746+
"aad_resource_id": "",
747747
"provider_id": "Local_Management",
748748
"installation_type": "Client",
749749
},
@@ -754,7 +754,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
754754
wantServerURL: "https://example.com",
755755
},
756756
{
757-
name: "on manual missing is_federated",
757+
name: "on manual missing aad_resource_id",
758758
data: []map[string]string{
759759
{
760760
"discovery_service_url": "https://example.com",
@@ -772,7 +772,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
772772
data: []map[string]string{
773773
{
774774
"discovery_service_url": "https://example.com",
775-
"is_federated": "1",
775+
"aad_resource_id": "https://example.com",
776776
"provider_id": "Some_ID",
777777
"installation_type": "Windows SeRvEr 99.9",
778778
},
@@ -790,7 +790,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
790790
data: []map[string]string{
791791
{
792792
"discovery_service_url": "https://jumpcloud.com",
793-
"is_federated": "0",
793+
"aad_resource_id": "",
794794
"provider_id": "Local_Management",
795795
"installation_type": "Client",
796796
},
@@ -806,7 +806,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
806806
data: []map[string]string{
807807
{
808808
"discovery_service_url": "https://airwatch.com",
809-
"is_federated": "0",
809+
"aad_resource_id": "",
810810
"provider_id": "Local_Management",
811811
"installation_type": "Client",
812812
},
@@ -822,7 +822,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
822822
data: []map[string]string{
823823
{
824824
"discovery_service_url": "https://awmdm.com",
825-
"is_federated": "0",
825+
"aad_resource_id": "",
826826
"provider_id": "Local_Management",
827827
"installation_type": "Client",
828828
},
@@ -838,7 +838,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
838838
data: []map[string]string{
839839
{
840840
"discovery_service_url": "https://microsoft.com",
841-
"is_federated": "0",
841+
"aad_resource_id": "",
842842
"provider_id": "Local_Management",
843843
"installation_type": "Client",
844844
},
@@ -854,7 +854,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
854854
data: []map[string]string{
855855
{
856856
"discovery_service_url": "https://fleetdm.com",
857-
"is_federated": "0",
857+
"aad_resource_id": "",
858858
"provider_id": "Local_Management",
859859
"installation_type": "Client",
860860
},
@@ -871,7 +871,7 @@ func TestDirectIngestMDMWindows(t *testing.T) {
871871
data: []map[string]string{
872872
{
873873
"discovery_service_url": "https://myinstall.local",
874-
"is_federated": "0",
874+
"aad_resource_id": "",
875875
"provider_id": "Fleet",
876876
"installation_type": "Client",
877877
},

0 commit comments

Comments
 (0)