CIS Microsoft 365 Foundations v5.0.0 L1 E3

Audit Details

Name: CIS Microsoft 365 Foundations v5.0.0 L1 E3

Updated: 10/22/2025

Authority: CIS

Plugin: microsoft_azure

Revision: 1.1

Estimated Item Count: 80

File Details

Filename: CIS_Microsoft_365_Foundations_v5.0.0_L1_E3.audit

Size: 267 kB

MD5: e4c8d463dc00e119931d14230b267229
SHA256: 8195d45c3e52d6213f3a65966e5764e8e25f04b6de3e437ff7cdaced28fbd1ac

Audit Changelog

 
Revision 1.1

Oct 22, 2025

Functional Update
  • 5.1.3.1 (L1) Ensure a dynamic group for guest users is created
Informational Update
  • 1.1.2 (L1) Ensure two emergency access accounts have been defined
  • 1.1.3 (L1) Ensure that between two and four global admins are designated
  • 1.1.4 (L1) Ensure administrative accounts use licenses with a reduced application footprint
  • 1.2.2 (L1) Ensure sign-in to shared mailboxes is blocked
  • 1.3.1 (L1) Ensure the 'Password expiration policy' is set to 'Set passwords to never expire (recommended)'
  • 1.3.4 (L1) Ensure 'User owned apps and services' is restricted
  • 1.3.5 (L1) Ensure internal phishing protection for Forms is enabled
  • 2.1.10 (L1) Ensure DMARC Records for all Exchange Online domains are published
  • 2.1.12 (L1) Ensure the connection filter IP allow list is not used
  • 2.1.13 (L1) Ensure the connection filter safe list is off
  • 2.1.14 (L1) Ensure inbound anti-spam policies do not contain allowed domains
  • 2.1.2 (L1) Ensure the Common Attachment Types Filter is enabled
  • 2.1.3 (L1) Ensure notifications for internal users sending malware is Enabled
  • 2.1.6 (L1) Ensure Exchange Online Spam Policies are set to notify administrators
  • 2.1.8 (L1) Ensure that SPF records are published for all Exchange Domains
  • 2.1.9 (L1) Ensure that DKIM is enabled for all Exchange Online Domains
  • 3.1.1 (L1) Ensure Microsoft 365 audit log search is Enabled
  • 3.2.1 (L1) Ensure DLP policies are enabled
  • 3.3.1 (L1) Ensure Information Protection sensitivity label policies are published
  • 5.1.2.1 (L1) Ensure 'Per-user MFA' is disabled
  • 5.1.2.3 (L1) Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes'
  • 5.1.2.4 (L1) Ensure access to the Entra admin center is restricted
  • 5.1.3.1 (L1) Ensure a dynamic group for guest users is created
  • 5.1.5.2 (L1) Ensure the admin consent workflow is enabled
  • 5.1.6.2 (L1) Ensure that guest user access is restricted
  • 5.2.2.1 (L1) Ensure multifactor authentication is enabled for all users in administrative roles
  • 5.2.2.10 (L1) Ensure a managed device is required to register security information
  • 5.2.2.11 (L1) Ensure sign-in frequency for Intune Enrollment is set to 'Every time'
  • 5.2.2.12 (L1) Ensure the device code sign-in flow is blocked
  • 5.2.2.2 (L1) Ensure multifactor authentication is enabled for all users
  • 5.2.2.3 (L1) Enable Conditional Access policies to block legacy authentication
  • 5.2.2.4 (L1) Ensure Sign-in frequency is enabled and browser sessions are not persistent for Administrative users
  • 5.2.2.9 (L1) Ensure a managed device is required for authentication
  • 5.2.3.1 (L1) Ensure Microsoft Authenticator is configured to protect against MFA fatigue
  • 5.2.3.2 (L1) Ensure custom banned passwords lists are used
  • 5.2.3.3 (L1) Ensure password protection is enabled for on-prem Active Directory
  • 5.2.3.5 (L1) Ensure weak authentication methods are disabled
  • 5.2.3.6 (L1) Ensure system-preferred multifactor authentication is enabled
  • 5.2.4.1 (L1) Ensure 'Self service password reset enabled' is set to 'All'
  • 6.1.2 (L1) Ensure mailbox audit actions are configured
  • 6.2.1 (L1) Ensure all forms of mail forwarding are blocked and/or disabled
  • 6.2.2 (L1) Ensure mail transport rules do not whitelist specific domains
  • 6.2.3 (L1) Ensure email from external senders is identified
  • 6.5.1 (L1) Ensure modern authentication for Exchange Online is enabled
  • 6.5.4 (L1) Ensure SMTP AUTH is disabled
  • 7.2.1 (L1) Ensure modern authentication for SharePoint applications is required
  • 7.2.10 (L1) Ensure reauthentication with verification code is restricted
  • 7.2.11 (L1) Ensure the SharePoint default sharing link permission is set
  • 7.2.3 (L1) Ensure external content sharing is restricted
  • 7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive
  • 7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically
  • 7.3.3 (L1) Ensure custom script execution is restricted on personal sites
  • 7.3.4 (L1) Ensure custom script execution is restricted on site collections
  • 8.1.2 (L1) Ensure users can't send emails to a channel email address
  • 8.2.2 (L1) Ensure communication with unmanaged Teams users is disabled
  • 8.2.3 (L1) Ensure external Teams users cannot initiate conversations
  • 8.2.4 (L1) Ensure communication with Skype users is disabled
  • 8.4.1 (L1) Ensure app permission policies are configured
  • 8.5.2 (L1) Ensure anonymous users and dial-in callers can't start a meeting
  • 8.5.3 (L1) Ensure only people in my org can bypass the lobby
  • 8.5.4 (L1) Ensure users dialing in can't bypass the lobby
  • 8.5.7 (L1) Ensure external participants can't give or request control
  • 8.6.1 (L1) Ensure users can report security concerns in Teams
  • 9.1.1 (L1) Ensure guest user access is restricted
  • 9.1.10 (L1) Ensure access to APIs by Service Principals is restricted
  • 9.1.11 (L1) Ensure Service Principals cannot create and use profiles
  • 9.1.2 (L1) Ensure external user invitations are restricted
  • 9.1.3 (L1) Ensure guest access to content is restricted
  • 9.1.4 (L1) Ensure 'Publish to web' is restricted
  • 9.1.6 (L1) Ensure 'Allow users to apply sensitivity labels for content' is 'Enabled'
  • 9.1.7 (L1) Ensure shareable links are restricted
  • 9.1.8 (L1) Ensure enabling of external data sharing is restricted
  • 9.1.9 (L1) Ensure 'Block ResourceKey Authentication' is 'Enabled'
Miscellaneous
  • Metadata updated.