Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1 licenses: session token protection.
In Part 1, we’ll explain what session token theft is, why it’s a growing threat, and how organizations can protect against it. We’ll also highlight Microsoft’s significant move to include this feature in P1 licenses—previously reserved for E5 and Entra ID P2 users.
Then in Part 2 (coming in two weeks), we’ll shift focus to practical implementation tips for MSPs, showing how to roll out this critical security feature across clients using standard processes.
Token session theft, also known as token theft or session hijacking, occurs when attackers steal session tokens from authenticated users (often via phishing or malware) and use them to impersonate the users, bypassing authentication controls like passwords and MFA.
Why It’s Gaining Popularity
Token Protection, sometimes called token binding, is a Conditional Access (CA) feature in Microsoft Entra ID that cryptographically ties session tokens (like PRTs or refresh tokens) to the specific device where they were issued. The result: even if a token is stolen, it can only be used on the original device.
Key Requirements and Mechanisms:
Other Defense Layers:
Entra ID P1 (Microsoft 365 Business Premium, M365 E3, or standalone P1)
Entra ID P2 or Entra Suite
| License Tier | Token Protection (CA) | Risk-Based Access (ID Protection) |
| Entra ID P1 (incl. M365 E3 / SMB Business Premium) | ✅ Yes (preview, device‑bound) | ❌ No |
| Entra ID P2 / Entra Suite | ✅ Yes | ✅ Yes |
Token-based attacks have grown rapidly because they bypass traditional MFA and steal access entirely. Microsoft’s Token Protection (included with Entra ID P1) securely ties tokens to devices via Conditional Access, blocking token reuse on unauthorized machines. For full identity risk detection and automated remediation, upgrading to Entra ID P2 or the Entra Suite brings in identity protection, CAE, and deeper risk policies. Together, these layered defenses dramatically reduce Business Email Compromise (BEC) and token replay threats.
Stay Tuned
In two weeks, we’ll publish Part 2 of this series, where we dive into implementation advice for MSPs. We’ll walk through how to configure Token Protection in Entra ID P1, what pitfalls to avoid, and how to make this a standard part of your client security stack. Don’t miss it, this is where policy meets practice.
Sources and Additional Reading:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Your inbox sees dozens of emails every day that look completely routine. A DocuSign notification fits right in. A...
Read more
And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....
Read more
Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
