Skip to main content

🛡️ Microsoft Entra ID Security Defaults are not enabled🟢⚪

Similar Policies

Description

Open File

Description

[IMPORTANT - Please read the section overview: If your organization pays for Microsoft Entra ID licensing (included in Microsoft 365 E3, E5, or F5, and EM&S E3 or E5 licenses) and CAN use Conditional Access, ignore the recommendations in this section and proceed to the Conditional Access section.]

Security defaults in Microsoft Entra ID make it easier to be secure and help protect your organization. Security defaults contain preconfigured security settings for common attacks.

Security defaults is available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You may turn on security defaults in the Azure portal.

Rationale

Security defaults provide secure default settings that we manage on behalf of organizations to keep customers safe until they are ready to manage their own identity security settings.

For example, doing the following:

  • Requiring all users and admins to register for MFA.
  • Challenging users with MFA - when necessary, based on factors such as location, device, role, and task.

... see more

Remediation

Open File

Remediation

From Azure Portal

To enable security defaults in your directory:

  1. From Azure Home select the Portal Menu.
  2. Browse to Microsoft Entra ID > Properties.
  3. Select Manage security defaults.
  4. Under Security defaults, select Enabled (recommended).
  5. Select Save.

policy.yaml

Open File

Linked Framework Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v2.1.0 → 💼 1.1.1 Ensure Security Defaults is enabled on Microsoft Entra ID - Level 1 (Manual)1no data
💼 CIS Azure v3.0.0 → 💼 2.1.1 Ensure Security Defaults is enabled on Microsoft Entra ID (Manual)1no data
💼 CIS Azure v4.0.0 → 💼 6.1.1 Ensure that 'security defaults' is enabled in Microsoft Entra ID (Manual)1no data
💼 Cloudaware Framework → 💼 General Access Controls11no data