You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more popular. Security defaults make it easier to help protect your organization from these attacks with preconfigured security settings:
23
23
@@ -27,11 +27,13 @@ Managing security can be difficult with common identity-related attacks like pas
27
27
- Requiring users to do multi-factor authentication when necessary.
28
28
- Protecting privileged activities like access to the Azure portal.
29
29
30
-

31
-
32
-
More details on why security defaults are being made available can be found in Alex Weinert's blog post, [Introducing security defaults](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-security-defaults/ba-p/1061414).
30
+
## Why security defaults?
31
+
32
+
Quoting Alex Weinert, Director of Identity Security at Microsoft:
33
+
34
+
> ...our telemetry tells us that more than 99.9% of organization account compromise could be stopped by simply using MFA, and that disabling legacy authentication correlates to a 67% reduction in compromise risk (and completely stops password spray attacks, 100% of which come in via legacy authentication)...
33
35
34
-
## Availability
36
+
More details on why security defaults are being made available can be found in Alex Weinert's blog post, [Introducing security defaults](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-security-defaults/ba-p/1061414).
35
37
36
38
Microsoft is making security defaults available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You turn on security defaults in the Azure portal. If your tenant was created on or after October 22, 2019, security defaults may be enabled in your tenant. To protect all of our users, security defaults are being rolled out to new tenants at creation.
37
39
@@ -54,7 +56,7 @@ All users in your tenant must register for multi-factor authentication (MFA) in
54
56
55
57
### Protecting administrators
56
58
57
-
Users with privileged access have increased access to your environment. Because of the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication.
59
+
Users with privileged access have increased access to your environment. Because of the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication. We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
58
60
59
61
After registration with Azure AD Multi-Factor Authentication is finished, the following Azure AD administrator roles will be required to do extra authentication every time they sign in:
60
62
@@ -72,9 +74,6 @@ After registration with Azure AD Multi-Factor Authentication is finished, the fo
72
74
- SharePoint administrator
73
75
- User administrator
74
76
75
-
> [!WARNING]
76
-
> Ensure your directory has at least two accounts with global administrator privileges assigned to them. This will help in the case that one global administrator is locked out. For more detail see the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
77
-
78
77
### Protecting all users
79
78
80
79
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
@@ -123,6 +122,35 @@ After you enable security defaults in your tenant, any user who's accessing the
123
122
124
123
The following extra considerations are related to deployment of security defaults.
125
124
125
+
### Emergency access accounts
126
+
127
+
Every organization should have at least two emergency access account configured.
128
+
129
+
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
130
+
131
+
Emergency access accounts are:
132
+
133
+
- Assigned Global Administrator rights in Azure AD
134
+
- Aren't used on a daily basis
135
+
- Are protected with a long complex password
136
+
137
+
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
138
+
139
+
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
140
+
141
+
To create an emergency access account:
142
+
143
+
1. Sign in to the **Azure portal** as an existing Global Administrator.
144
+
1. Browse to **Azure Active Directory** > **Users**.
145
+
1. Select **New user**.
146
+
1. Select **Create user**.
147
+
1. Give the account a **User name**.
148
+
1. Give the account a **Name**.
149
+
1. Create a long and complex password for the account.
150
+
1. Under **Roles**, assign the **Global Administrator** role.
151
+
1. Under **Usage location**, select the appropriate location.
152
+
1. Select **Create**.
153
+
126
154
### Authentication methods
127
155
128
156
These free security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.
@@ -168,6 +196,8 @@ To enable security defaults in your directory:
168
196
1. Set the **Enable security defaults** toggle to **Yes**.
169
197
1. Select **Save**.
170
198
199
+

200
+
171
201
## Disabling security defaults
172
202
173
203
Organizations that choose to implement Conditional Access policies that replace security defaults must disable security defaults.
0 commit comments