Skip to content

Commit 6b1ac82

Browse files
authored
Merge pull request #188279 from MicrosoftGuyJFlo/SecurityDefaultsUpdates
[Azure AD] Fundamentals - Security defaults updates
2 parents dcbcdd7 + a80c1d9 commit 6b1ac82

File tree

1 file changed

+40
-10
lines changed

1 file changed

+40
-10
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 40 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 09/27/2021
9+
ms.date: 02/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
ms.custom: contperf-fy20q4
1919
---
20-
# What are security defaults?
20+
# Security defaults in Azure AD
2121

2222
Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more popular. Security defaults make it easier to help protect your organization from these attacks with preconfigured security settings:
2323

@@ -27,11 +27,13 @@ Managing security can be difficult with common identity-related attacks like pas
2727
- Requiring users to do multi-factor authentication when necessary.
2828
- Protecting privileged activities like access to the Azure portal.
2929

30-
![Screenshot of the Azure portal with the toggle to enable security defaults](./media/concept-fundamentals-security-defaults/security-defaults-azure-ad-portal.png)
31-
32-
More details on why security defaults are being made available can be found in Alex Weinert's blog post, [Introducing security defaults](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-security-defaults/ba-p/1061414).
30+
## Why security defaults?
31+
32+
Quoting Alex Weinert, Director of Identity Security at Microsoft:
33+
34+
> ...our telemetry tells us that more than 99.9% of organization account compromise could be stopped by simply using MFA, and that disabling legacy authentication correlates to a 67% reduction in compromise risk (and completely stops password spray attacks, 100% of which come in via legacy authentication)...
3335
34-
## Availability
36+
More details on why security defaults are being made available can be found in Alex Weinert's blog post, [Introducing security defaults](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-security-defaults/ba-p/1061414).
3537

3638
Microsoft is making security defaults available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You turn on security defaults in the Azure portal. If your tenant was created on or after October 22, 2019, security defaults may be enabled in your tenant. To protect all of our users, security defaults are being rolled out to new tenants at creation.
3739

@@ -54,7 +56,7 @@ All users in your tenant must register for multi-factor authentication (MFA) in
5456

5557
### Protecting administrators
5658

57-
Users with privileged access have increased access to your environment. Because of the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication.
59+
Users with privileged access have increased access to your environment. Because of the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication. We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
5860

5961
After registration with Azure AD Multi-Factor Authentication is finished, the following Azure AD administrator roles will be required to do extra authentication every time they sign in:
6062

@@ -72,9 +74,6 @@ After registration with Azure AD Multi-Factor Authentication is finished, the fo
7274
- SharePoint administrator
7375
- User administrator
7476

75-
> [!WARNING]
76-
> Ensure your directory has at least two accounts with global administrator privileges assigned to them. This will help in the case that one global administrator is locked out. For more detail see the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
77-
7877
### Protecting all users
7978

8079
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
@@ -123,6 +122,35 @@ After you enable security defaults in your tenant, any user who's accessing the
123122

124123
The following extra considerations are related to deployment of security defaults.
125124

125+
### Emergency access accounts
126+
127+
Every organization should have at least two emergency access account configured.
128+
129+
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
130+
131+
Emergency access accounts are:
132+
133+
- Assigned Global Administrator rights in Azure AD
134+
- Aren't used on a daily basis
135+
- Are protected with a long complex password
136+
137+
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
138+
139+
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
140+
141+
To create an emergency access account:
142+
143+
1. Sign in to the **Azure portal** as an existing Global Administrator.
144+
1. Browse to **Azure Active Directory** > **Users**.
145+
1. Select **New user**.
146+
1. Select **Create user**.
147+
1. Give the account a **User name**.
148+
1. Give the account a **Name**.
149+
1. Create a long and complex password for the account.
150+
1. Under **Roles**, assign the **Global Administrator** role.
151+
1. Under **Usage location**, select the appropriate location.
152+
1. Select **Create**.
153+
126154
### Authentication methods
127155

128156
These free security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.
@@ -168,6 +196,8 @@ To enable security defaults in your directory:
168196
1. Set the **Enable security defaults** toggle to **Yes**.
169197
1. Select **Save**.
170198

199+
![Screenshot of the Azure portal with the toggle to enable security defaults](./media/concept-fundamentals-security-defaults/security-defaults-azure-ad-portal.png)
200+
171201
## Disabling security defaults
172202

173203
Organizations that choose to implement Conditional Access policies that replace security defaults must disable security defaults.

0 commit comments

Comments
 (0)