Ensure MFA for all users: CIS 1.1.2 | Security > Conditional Access > Grant > Require MFA |
Ensure self-service password reset (SSPR) is enabled: CIS 1.1.4 | Azure Active Directory > Users > Password reset > Self-service password reset enabled |
Require two methods of authentication for SSPR: Vectra AZ-0017 | Azure Active Directory > Users > Password reset > Password Policy > Properties > Authentication Methods In addition, ensure security questions, authenticator app codes and office phones are DISABLED, but authenticator notifications, personal phones and email one-time passcode (OTP) are ENABLED. |
Ensure password protection is enabled: CIS 1.1.5 | Read the full instructions in this Microsoft blog. |
Block legacy authentication: CIS 1.1.6 | Azure Active Directory > Security > Conditional Access > New Policy > Client apps > Access controls > Block access > All users > Exclude |
Ensure password hash sync is enabled: CIS 1.1.7 | Run Azure AD Connect > View current configuration > Password synchronization enabled |
If E5 licensed, enable Identity Protection risk policies: CIS 1.1.8 | Azure Active Directory > Security > Conditional Access > Users or workload identities > All users > All Cloud apps > Conditions > Sign-in risk > Yes > Access Control Require multi-factor authentication |
If E5 licensed, enable Identity Protection user risk policies: CIS 1.1.9 | Azure Active Directory > Security > Conditional Access > Users or workload identities > All users > All Cloud apps > Conditions > User risk > Yes > Access Control Require password change |
Ensure Security Defaults is DISABLED: CIS 1.1.11 | Azure Active Directory > Properties > Manage security defaults > No |
Ensure only organizationally managed/approved groups exist: CIS 1.1.12 | Microsoft 365 Admin Portal > Teams and Groups > Active teams and groups > Verify that no groups have “Public” in the privacy column |
Ensure collaboration invitations are resent to allowed domains only: CIS 1.1.13 | Azure Active Directory > Users > User settings > External users > Manage external collaboration settings > Collaboration restrictions > Allow invitations only to the specified domains > Target domains > Specify
domains
|
Ensure LinkedIn contract synchronization is disabled: CIS 1.1.14 | Azure Active Directory > Users > User settings > LinkedIn account connections > No |
Ensure persistent sign-in is disabled: CIS 1.1.16 | Azure Active Directory > Company branding > Manage > Create policy > Show option to remain signed in > No |
Require MFA to register devices: Vectra AZ-0009 | Azure Active Directory > Devices > Device settings > All > Require Multi-Factor Auth to join devices > Yes |
Require users to register multiple factors for MFA: Vectra AZ-0003 | Azure Active Directory > Security > Identity Protection > MFA registration policy > Assignments > Users > All users > Enforce policy – On |
Require external users to authenticate with email OTP: Vectra AZ-0013 | Azure Active Directory > External Identities > All identity providers > Email one-time passcode > Email one-time passcode for guests > Yes |
Restrict the default guest user role: Vectra AZ-0027 | Azure Active Directory > User settings > External users > Manage external collaboration settings > Guest user access is restricted to properties and memberships of their own directory objects |
Restrict entitlement to invite guest users: Vectra AZ-0028 | Azure Active Directory > Users > All users > External users > Manage external collaboration settings > Guests can invite > No |