Microsoft Azure AD security defaults notifications

Microsoft sent out mails to Microsoft 365 technical contacts saying that you should enable Azure AD security defaults to “adopt security best practices” if you aren’t utilizing it. Since some time, all newly created Microsoft 365 tenants have it enabled by default. Older tenants could have it disabled because this was the previous default setting. However, due to the fact that cybercrimes and cyberattacks are rising – as also stated in the mail – it is more important than ever to have your IT infrastructure (including all cloud services) secured with common technology measurements. Also, users should be aware of the risks and trained to adopt a “secure IT behavior”.

Source: https://pixabay.com/de/illustrations/sicherheit-sichern-gesperrt-2168233/
Source: https://pixabay.com/de/illustrations/sicherheit-sichern-gesperrt-2168233/

Microsoft will inform Azure AD administrators with a message, starting from October 17, 2022, that you should enable security defaults in order to apply security best practices on your Azure AD and Microsoft 365 to secure your Azure AD identities.

Enable security defaults

If this is turned off, you can manually enable it but users should be informed before.

  1. Azure portal 
  2. Azure Active Directory
  3. Properties
  4. Manage security defaults
  5. Enable security defaults -> Yes
  6. Save
  7. That’s it!

Enabling it will primarily do the following:

  • “Global Administrators will be asked to register for multifactor authentication using the Microsoft Authenticator app and your phone number.”
  • “Everyone else in your organization will be asked to register with the Microsoft Authenticator app for multifactor authentication.”

Conclusion, opinion and summary

You can find more details on security defaults in the documentation, here including how you enable it, impacts etc. Companies requiring more flexibility should consider using conditional access. Security defaults do not add extra costs, do not require extra licenses and provide a quick way to keep your Azure AD identities and Microsoft 365 more secure than without it, especially if you still do not use multi-factor authentication (MFA) for admins and users accounts. Just using username and password is very dangerous, not to say careless and it might just be a matter of time until an account is compromised and following the complete tenant and company is affected. In the worst case it is not noticed soon enough, and data is exfiltrated, encrypted, subject to ransom, sold, published and/or else.

Additional resources

Comment / Kommentar verfassen

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.