You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md
+63-66Lines changed: 63 additions & 66 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 03/01/2022
9
+
ms.date: 04/07/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -19,25 +19,17 @@ ms.custom: contperf-fy20q4
19
19
---
20
20
# Security defaults in Azure AD
21
21
22
-
Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more popular. Security defaults make it easier to help protect your organization from these attacks with preconfigured security settings:
22
+
Microsoft is making security defaults available to everyone, because managing security can be difficult. Identity-related attacks like password spray, replay, and phishing are common in today's environment. More than 99.9% of these identity-related attacks are stopped by using multi-factor authentication (MFA) and blocking legacy authentication. The goal is to ensure that all organizations have at least a basic level of security enabled at no extra cost.
23
23
24
-
- Requiring all users to register for Azure AD Multi-Factor Authentication.
25
-
- Requiring administrators to do multi-factor authentication.
26
-
- Blocking legacy authentication protocols.
27
-
- Requiring users to do multi-factor authentication when necessary.
28
-
- Protecting privileged activities like access to the Azure portal.
24
+
Security defaults make it easier to help protect your organization from these identity-related attacks with preconfigured security settings:
29
25
30
-
## Why security defaults?
26
+
-[Requiring all users to register for Azure AD Multi-Factor Authentication](#require-all-users-to-register-for-azure-ad-multi-factor-authentication).
27
+
-[Requiring administrators to do multi-factor authentication](#require-administrators-to-do-multi-factor-authentication).
28
+
-[Requiring users to do multi-factor authentication when necessary](#require-users-to-do-multi-factor-authentication-when-necessary).
-[Protecting privileged activities like access to the Azure portal](#protect-privileged-activities-like-access-to-the-azure-portal).
31
31
32
-
Quoting Alex Weinert, Director of Identity Security at Microsoft:
33
-
34
-
> ...our telemetry tells us that more than 99.9% of organization account compromise could be stopped by simply using MFA, and that disabling legacy authentication correlates to a 67% reduction in compromise risk (and completely stops password spray attacks, 100% of which come in via legacy authentication)...
35
-
36
-
More details on why security defaults are being made available can be found in Alex Weinert's blog post, [Introducing security defaults](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-security-defaults/ba-p/1061414).
37
-
38
-
Microsoft is making security defaults available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You turn on security defaults in the Azure portal. If your tenant was created on or after October 22, 2019, security defaults may be enabled in your tenant. To protect all of our users, security defaults are being rolled out to new tenants at creation.
39
-
40
-
### Who's it for?
32
+
## Who's it for?
41
33
42
34
- Organizations who want to increase their security posture, but don't know how or where to start.
43
35
- Organizations using the free tier of Azure Active Directory licensing.
@@ -46,17 +38,34 @@ Microsoft is making security defaults available to everyone. The goal is to ensu
46
38
47
39
- If you're an organization currently using Conditional Access policies, security defaults are probably not right for you.
48
40
- If you're an organization with Azure Active Directory Premium licenses, security defaults are probably not right for you.
49
-
- If your organization has complex security requirements, you should consider Conditional Access.
41
+
- If your organization has complex security requirements, you should consider [Conditional Access](#conditional-access).
42
+
43
+
## Enabling security defaults
44
+
45
+
If your tenant was created on or after October 22, 2019, security defaults may be enabled in your tenant. To protect all of our users, security defaults are being rolled out to all new tenants at creation.
46
+
47
+
To enable security defaults in your directory:
48
+
49
+
1. Sign in to the [Azure portal](https://portal.azure.com) as a security administrator, Conditional Access administrator, or global administrator.
50
+
1. Browse to **Azure Active Directory** > **Properties**.
51
+
1. Select **Manage security defaults**.
52
+
1. Set the **Enable security defaults** toggle to **Yes**.
53
+
1. Select **Save**.
54
+
55
+

### Require all users to register for Azure AD Multi-Factor Authentication
54
60
55
61
All users in your tenant must register for multi-factor authentication (MFA) in the form of the Azure AD Multi-Factor Authentication. Users have 14 days to register for Azure AD Multi-Factor Authentication by using the Microsoft Authenticator app. After the 14 days have passed, the user can't sign in until registration is completed. A user's 14-day period begins after their first successful interactive sign-in after enabling security defaults.
56
62
57
-
### Protecting administrators
63
+
### Require administrators to do multi-factor authentication
64
+
65
+
Administrators have increased access to your environment. Because of the power these highly privileged accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication.
58
66
59
-
Users with privileged access have increased access to your environment. Because of the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication. We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
67
+
> [!TIP]
68
+
> We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
60
69
61
70
After registration with Azure AD Multi-Factor Authentication is finished, the following Azure AD administrator roles will be required to do extra authentication every time they sign in:
62
71
@@ -74,15 +83,15 @@ After registration with Azure AD Multi-Factor Authentication is finished, the fo
74
83
- SharePoint administrator
75
84
- User administrator
76
85
77
-
### Protecting all users
86
+
### Require users to do multi-factor authentication when necessary
78
87
79
88
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
80
89
81
90
After these attackers gain access, they can request access to privileged information for the original account holder. They can even download the entire directory to do a phishing attack on your whole organization.
82
91
83
92
One common method to improve protection for all users is to require a stronger form of account verification, such as Multi-Factor Authentication, for everyone. After users complete Multi-Factor Authentication registration, they'll be prompted for another authentication whenever necessary. Azure AD decides when a user will be prompted for Multi-Factor Authentication, based on factors such as location, device, role and task. This functionality protects all applications registered with Azure AD including SaaS applications.
84
93
85
-
### Blocking legacy authentication
94
+
### Block legacy authentication protocols
86
95
87
96
To give your users easy access to your cloud apps, Azure AD supports various authentication protocols, including legacy authentication. *Legacy authentication* is a term that refers to an authentication request made by:
88
97
@@ -98,7 +107,7 @@ After security defaults are enabled in your tenant, all authentication requests
98
107
99
108
-[How to set up a multifunction device or application to send email using Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365)
100
109
101
-
### Protecting privileged actions
110
+
### Protect privileged activities like access to the Azure portal
102
111
103
112
Organizations use various Azure services managed through the Azure Resource Manager API, including:
104
113
@@ -126,19 +135,35 @@ This policy applies to all users who are accessing Azure Resource Manager servic
126
135
127
136
## Deployment considerations
128
137
129
-
The following extra considerations are related to deployment of security defaults.
138
+
### Authentication methods
139
+
140
+
Security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.
| Verification code from mobile app or hardware token | X**| X |
146
+
| Text message to phone || X |
147
+
| Call to phone || X |
148
+
| App passwords || X***|
130
149
131
-
### Emergency access accounts
150
+
-** Users may use verification codes from the Microsoft Authenticator app but can only register using the notification option.
151
+
-*** App passwords are only available in per-user MFA with legacy authentication scenarios only if enabled by administrators.
132
152
133
-
Every organization should have at least two emergency access account configured.
153
+
> [!WARNING]
154
+
> Do not disable methods for your organization if you are using Security Defaults. Disabling methods may lead to locking yourself out of your tenant. Leave all **Methods available to users** enabled in the [MFA service settings portal](../authentication/howto-mfa-getstarted.md#choose-authentication-methods-for-mfa).
155
+
156
+
### Backup administrator accounts
157
+
158
+
Every organization should have at least two backup administrator accounts configured. We call these emergency access accounts.
134
159
135
160
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
136
161
137
162
Emergency access accounts are:
138
163
139
-
- Assigned Global Administrator rights in Azure AD
140
-
- Aren't used on a daily basis
141
-
- Are protected with a long complex password
164
+
- Assigned Global Administrator rights in Azure AD.
165
+
- Aren't used on a daily basis.
166
+
- Are protected with a long complex password.
142
167
143
168
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
144
169
@@ -155,58 +180,28 @@ To create an emergency access account:
155
180
1. Under **Usage location**, select the appropriate location.
156
181
1. Select **Create**.
157
182
158
-
You may choose [disable password expiration](../authentication/concept-sspr-policy.md#set-a-password-to-never-expire) to for these accounts using Azure AD PowerShell.
183
+
You may choose to [disable password expiration](../authentication/concept-sspr-policy.md#set-a-password-to-never-expire) for these accounts using Azure AD PowerShell.
159
184
160
185
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
161
186
162
-
### Authentication methods
163
-
164
-
These free security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.
| Verification code from mobile app or hardware token | X**| X |
170
-
| Text message to phone || X |
171
-
| Call to phone || X |
172
-
| App passwords || X***|
173
-
174
-
-** Users may use verification codes from the Microsoft Authenticator app but can only register using the notification option.
175
-
-*** App passwords are only available in per-user MFA with legacy authentication scenarios only if enabled by administrators.
176
-
177
-
> [!WARNING]
178
-
> Do not disable methods for your organization if you are using Security Defaults. Disabling methods may lead to locking yourself out of your tenant. Leave all **Methods available to users** enabled in the [MFA service settings portal](../authentication/howto-mfa-getstarted.md#choose-authentication-methods-for-mfa).
179
-
180
187
### Disabled MFA status
181
188
182
189
If your organization is a previous user of per-user based Azure AD Multi-Factor Authentication, don't be alarmed to not see users in an **Enabled** or **Enforced** status if you look at the Multi-Factor Auth status page. **Disabled** is the appropriate status for users who are using security defaults or Conditional Access based Azure AD Multi-Factor Authentication.
183
190
184
191
### Conditional Access
185
192
186
-
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including user exclusions, which aren't available in security defaults. If you're using Conditional Access and have Conditional Access policies enabled in your environment, security defaults won't be available to you. More information about Azure AD licensing can be found on the [Azure AD pricing page](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
193
+
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including user exclusions, which aren't available in security defaults. If you're using Conditional Access in your environment today, security defaults won't be available to you.
187
194
188
195

189
196
190
-
Here are step-by-step guides for Conditional Access to configure a set of policies, which form a good starting point for protecting your identities:
197
+
If you want to enable Conditional Access to configure a set of policies, which form a good starting point for protecting your identities:
191
198
192
199
-[Require MFA for administrators](../conditional-access/howto-conditional-access-policy-admin-mfa.md)
193
200
-[Require MFA for Azure management](../conditional-access/howto-conditional-access-policy-azure-management.md)
-[Require MFA for all users](../conditional-access/howto-conditional-access-policy-all-users-mfa.md)
196
203
197
-
## Enabling security defaults
198
-
199
-
To enable security defaults in your directory:
200
-
201
-
1. Sign in to the [Azure portal](https://portal.azure.com) as a security administrator, Conditional Access administrator, or global administrator.
202
-
1. Browse to **Azure Active Directory** > **Properties**.
203
-
1. Select **Manage security defaults**.
204
-
1. Set the **Enable security defaults** toggle to **Yes**.
205
-
1. Select **Save**.
206
-
207
-

208
-
209
-
## Disabling security defaults
204
+
### Disabling security defaults
210
205
211
206
Organizations that choose to implement Conditional Access policies that replace security defaults must disable security defaults.
212
207
@@ -222,4 +217,6 @@ To disable security defaults in your directory:
- More information about Azure AD licensing can be found on the [Azure AD pricing page](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
0 commit comments