Microsoft recently released Security Defaults to help customers make their Microsoft 365 and Azure environments more secure FOR FREE. Before you say it… you’re right… nothing is free, it’s included at no additional cost. Microsoft is making these features available to everyone because identity-based attacks have skyrocketed over the last couple of years. As Microsoft states, the goal of these policies is to ensure that all organizations have a baseline level of security enabled at no extra cost.
|NOTE: In December 2019, Microsoft announced that Baseline Policies are being deprecated and therefore removed from Azure AD starting in February 2020. Security Defaults will be the replacement.|
So, what in the world are Security Defaults?! To understand Security Defaults, you need to understand Baseline Policies and Conditional Access.
Conditional Access gives you the ability to enforce access requirements when specific conditions occur. These policies can be complex to meet a wide variety of scenarios, but here are a couple of examples Microsoft gives. You can read more about Conditional Access here.
|When any user is outside the company network||They’re required to sign|
in with multi-factor authentication
|When users in the ‘Managers’ group sign-in||They are required be on|
an Intune compliant or domain-joined device
Baseline Polices are a base level of Conditional Access policies that companies can implement at no additional cost. Conditional Access
Policies also do not work with Baseline Policies. If you are licensed with Azure AD Premium, you can customize Conditional Access policies and therefore you don’t need the baseline policies.
Here are the 4 policies that are applied:
- Require MFA for admins
- End user protection
- Block legacy authentication
- Require MFA for service management
You can read more about Baseline Policies here.
Baseline Security Policies and Conditional Access are applied in the same location in Azure AD.
- In Azure AD, select Security. Then on the Security – Getting started window, select Conditional Access.
Will someone please tell me what Security Defaults are finally?
The short answer is that they are a new name for Baseline Policies but implemented by a simple toggle switch in Azure AD, instead of applying individual Baseline Policies. If you’re serious about security within your environment, we highly recommend upgrading
to a plan that includes Azure AD Premium, at a minimum you should enable Security Defaults to protect your Admins and Users from Identity attack and compromise.
You can read more about Security Defaults here
In Azure AD, click on Properties. On the Directory Properties page, scroll to the bottom and click Manage Security defaults.
Then toggle the Enable Security defaults to Yes and Save.
Some of our customers have already implemented Security Defaults, so Microsoft has removed Baseline policies from the Conditional Access – Policies screen.
#MultiFactorAuthentication #MFA #Security #Microsoft365 #Office365 #Azure #ConditionalAccess #SecurityDefaults #AzureAD