1.1.1 Ensure Security Defaults is disabled on Azure Active Directory

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Security defaults in Azure Active Directory (Azure AD) make it easier to be secure and help protect the organization. Security defaults contain preconfigured security settings for common attacks.

By default, Microsoft enables security defaults. The goal is to ensure that all organizations have a basic level of security-enabled. The security default setting is manipulated in the Azure Portal.

The use of security defaults however, will prohibit custom settings which are being set with more advanced settings from this benchmark.

Rationale:

Security defaults provide secure default settings that are manage on behalf of organizations to keep customers safe until they are ready to manage their own identity security settings.

For example doing the following:

Requiring all users and admins to register for MFA.

Challenging users with MFA - mostly when they show up on a new device or app, but more often for critical roles and tasks.

Disabling authentication from legacy authentication clients, which can't do MFA.

Impact:

The potential impact associated with disabling of Security Defaults is dependent upon the security controls implemented in the environment. It is likely that most organizations disabling Security Defaults plan to implement equivalent controls to replace Security Defaults.

It may be necessary to check settings in other Microsoft products, such as Azure, to ensure settings and functionality are as expected when disabling security defaults for MS365.

Solution

To disable security defaults:

Navigate to the Microsoft Entra admin center https://entra.microsoft.com.

Click to expand Azure Active Directory select Overview

Click Properties.

Click Manage security defaults.

Set the Security defaults dropdown to Disabled.

Select Save.

To configure security defaults using Microsoft Graph PowerShell:

Connect to the Microsoft Graph service using Connect-MgGraph -Scopes 'Policy.ReadWrite.ConditionalAccess'.

Run the following Microsoft Graph PowerShell command:

$params = @{ IsEnabled = $false }
Update-MgPolicyIdentitySecurityDefaultEnforcementPolicy -BodyParameter $params

Default Value:

Enabled.

See Also

https://workbench.cisecurity.org/benchmarks/10751