Indicators of Exposure

NameDescriptionSeverityType
User Primary Group

Verify users' Primary Group has not been changed

critical
Dangerous Kerberos Delegation

Checks for unauthorized Kerberos delegation, and ensures protection for privileged users against it.

critical
Reversible Passwords

Verifies that the option to store passwords in a reversible format does not get enabled.

medium
Reversible Passwords in GPO

Checks that GPO preferences do not allow passwords in a reversible format.

medium
Ensure SDProp Consistency

Control that the AdminSDHolder object is in a clean state.

critical
Last Password Change on KRBTGT account

Checks for KRBTGT accounts that have not changed their passwords for more than the recommended interval.

high
Native Administrative Group Members

Abnormal accounts in the native administrative groups of Active Directory

critical
Privileged Accounts Running Kerberos Services

Detects highly privileged accounts with the Service Principal Name (SPN) attribute which affects their security.

critical
AdminCount Attribute Set on Standard Users

Checks for the adminCount attribute on decommissioned accounts leading to permission issues that are difficult to manage.

medium
Dormant Accounts

Detects unused dormant accounts that can lead to security risks.

medium
Dangerous Trust Relationships

Identifies misconfigured trust relationship attributes that decrease the security of a directory infrastructure.

high
Accounts With Never Expiring Passwords

Checks for accounts with the DONT_EXPIRE_PASSWORD property flag in the userAccountControl attribute that allows indefinite use of the same password, bypassing password renewal policies.

medium
Unlinked, Disabled or Orphan GPO

Unused or disabled GPOs slow directory performance and RSoP computation, and can lead to security policy confusion. Reactivating them by mistake can weaken existing policies.

low
Never Used Device

You should avoid pre-created never used device accounts as they reflect poor hygiene practices and can potentially pose security risks.

LOW
Weak Password Policy - Minimum Length

A password policy with a low minimum length allows users to create short, easily guessable passwords, increasing the risk of compromise.

HIGH
Weak Password Policy - Password History

A password policy with a low password history count allows users to reuse potentially compromised passwords.

MEDIUM
Empty Entra Group

Empty groups can lead to confusion, compromise security, and result in unused resources. It is generally advisable to establish a clear purpose for groups and ensure they contain relevant members.

LOW
Risky Users Without Enforcement

Block risky users to prevent unauthorized access and potential breaches. Security best practices recommend using Conditional Access Policies to stop vulnerable accounts from authenticating to Entra ID.

MEDIUM
Privileged Entra Account Synchronized With AD (Hybrid)

Hybrid accounts, i.e. synchronized from Active Directory, with privileged roles in Entra ID pose a security risk because they allow attackers who compromise AD to pivot to Entra ID. Privileged accounts in Entra ID must be cloud-only accounts.

HIGH
Conditional Access Policy Disables Continuous Access Evaluation

Continuous Access Evaluation is an Entra ID security feature that enables swift reactions to security policy changes or user status updates. For this reason, do not disable it.

MEDIUM
Dangerous Application Permissions Affecting the Tenant

Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant.

HIGH
Dormant Privileged User

Dormant privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface.

MEDIUM
Weak Password Policy - Common Passwords

A password policy that allows common passwords increases the risk of compromise, as users may choose weak, easily guessable credentials.

HIGH
Federation Signing Certificates Mismatch

Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding a malicious token-signing certificate, leading to persistence and privilege escalation.

HIGH
Managed Devices Not Required for Authentication

Require managed devices to prevent unauthorized access and potential breaches. Security best practices recommend using Conditional Access Policies to block authentication to Entra ID from unmanaged devices.

MEDIUM
Unrestricted User Consent for Applications

Entra ID allows users to autonomously consent to external applications' access to organization's data, which attackers may exploit in "illicit consent grant" attacks. Prevent this by restricting access to verified publishers or requiring administrator approval.

MEDIUM
Unusual Federation Signing Certificate Validity Period

An unusually high validity period for a federation signing certificate is suspicious, as it could indicate that an attacker obtained elevated privileges in Entra ID and created a backdoor through the federation trust mechanism.

MEDIUM
High Number of Administrators

Administrators have elevated privileges and can pose security risks when there is a high number of them since it increases the attack surface. This is also the sign that the least-privileged principle is not respected.

HIGH
Dangerous Application Permissions Affecting Data

Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a threat to users' data that these services store.

MEDIUM
Dormant Non-Privileged User

Dormant non-privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface.

LOW
Dynamic Group Featuring an Exploitable Rule

Attackers can exploit dynamic groups in Microsoft Entra ID by manipulating self-modifiable attributes, allowing them to add themselves as group members. This manipulation enables privilege escalation and unauthorized access to sensitive resources tied to the groups.

MEDIUM
Never Used Non-Privileged User

Never used non-privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers.

LOW
Weak Password Policy - Lockout Threshold

A password policy with a high lockout threshold can allow attackers to perform brute-force attacks before triggering an account lockout.

HIGH
Authentication Methods Migration Not Complete

Migrating to the "Authentication methods" policy streamlines and modernizes authentication management in Microsoft Entra ID. This transition simplifies administration, enhances security, and enables support for the latest authentication methods. To avoid disruptions caused by the deprecation of legacy policies, complete your migration by September 2025.

MEDIUM
Missing MFA for Privileged Account

MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, especially with privileged accounts. Accounts without an MFA method registered cannot benefit from it.

HIGH
Privileged Account Naming Convention

A naming convention for privileged users in Entra ID is crucial for security, standardization, audit compliance, and facilitates administration.

LOW
Privileged Entra Account With Access To M365 Services

You should have separate Entra accounts for administrative tasks: one standard account for daily use and another privileged account limited specifically to administration activities. This approach reduces the attack surface of the privileged account.

MEDIUM
Users Allowed to Join Devices

Allowing all users to join unrestricted devices to the Entra tenant opens the door for threat actors to plant rogue devices into the organization's identity system and give them a foothold for further compromise.

LOW
Entra Security Defaults Not Enabled

Entra ID Security Defaults offer pre-configured, Microsoft-recommended settings to enhance tenant protection.

MEDIUM
MFA Not Required for Risky Sign-ins

MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you require MFA for risky sign-ins, for example when the authentication request may not come from the legitimate identity owner.

HIGH
Show Additional Context in Microsoft Authenticator Notifications

For improved visibility, enable Microsoft Authenticator notifications to display additional context, such as the application name and geolocation. This helps users identify and deny potentially malicious MFA or passwordless authentication requests, effectively mitigating the risk of MFA fatigue attacks.

MEDIUM
Single Member Entra Group

It is not advisable to create a group with only one member because it introduces redundancy and complexity. This practice unnecessarily complicates management by adding layers and diminishes the intended efficiency of using groups for streamlined access control and administration.

LOW
Unrestricted Guest Accounts

By default, while guest users in Entra ID have limited access to reduce their visibility within the tenant, it is also possible to enhance security and privacy by further tightening these restrictions.

MEDIUM
Application Allowing Multi-Tenant Authentication

Entra applications, which allow multi-tenant authentication, may give unauthorized access to malicious users if this configuration was not enabled with full awareness and without implementing adequate authorization checks within the application code.

LOW
Dangerous Delegated Permissions Affecting Data

Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on behalf of users (called "delegated permissions"). Certain permissions can pose a threat to users' data that these services store.

MEDIUM
Dangerous Delegated Permissions Affecting the Tenant

Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on behalf of users (called "delegated permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant.

HIGH
Dormant Device

Dormant devices pose security risks such as outdated configurations and unpatched vulnerabilities. Without regular monitoring and updates, these stale devices become potential targets for exploitation, compromising tenant integrity and data confidentiality.

LOW
Managed Devices Not Required for MFA Registration

Requiring managed devices for MFA registration makes it harder for attackers to register their rogue MFA, in case of stolen credentials, if they do not also have access to a managed device.

MEDIUM
Never Used Privileged User

Never used privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers.

MEDIUM
Password Expiration Enforced

Enforcing password expiration in Microsoft Entra ID domains can undermine security by prompting users to change passwords frequently, often leading to weak, predictable, or reused passwords that reduce overall account protection.

LOW