Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Microsoft pushes a lot of products on users, but here’s one cybersecurity can embrace
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Microsoft pushes a lot of products on users, but here’s one cybersecurity can embrace

Entra monitors for suspicious activity: Entra monitors for activities that are more than likely being carried out by attackers. So, for example, the following actions are monitored:
Users with leaked credentials.Sign-ins from anonymous IP addresses.Impossible travel to atypical locations.Sign-ins from infected devices.Sign-ins from IP addresses with suspicious activity.Sign-ins from unfamiliar locations.You can set a threshold for how much or how little you want to monitor someone. Before this policy is rolled out, you need to ensure that all accounts are covered by MFA, which may require you to go back and review how your break-glass accounts are set up.

MFA is key to setting up Entra ID P2: Many years ago, the best practice was to set up some administrative accounts with merely a long, strong password as their authentication into EntraID. This allowed you to log into the system should some catastrophe occur and your normal multifactor authentication process was not working.Now the best-practices recommendations are to ensure that your break-glass accounts have different MFA options than your normal one. So, if the Microsoft authenticator is your normal MFA app, ensure that you deploy a different MFA option for another administrator account.Take the time to determine the impact to your organization by having an EntraID administrator review the impact via the Microsoft Entra admin center. While there, take the time to review your sign-in logs and consider what logging and SIEM monitoring you have in place. It’s always wise to review settings and policies when deploying new settings to ensure that all of your previous settings and policies will align with your new settings.Before deploying this policy, you’ll want to ensure that you run a registration campaign to urge those who have not set up MFA to do so. This policy will allow you to urge, or rather push, users to set up MFA.Determine if you want to let users snooze until later or snooze indefinitely. My recommendation is to not let your users snooze on this setting. In fact, it’s highly recommended to deploy phishing resistant MFA in your organization. Review a recent CISA document as to guidance on setting up such implementations.

Entra ID P2 is fundamental for Microsoft 365 users: As CISA points out, you’ll want IT leadership to point out the advantages of deploying such stronger technologies and secure the commitment of senior leadership to using such technologies. As we’ve seen too often in this environment, identities are too easily abused and attacked and reused passwords being harvested and available for reuse and included in attack sequences.As humans, we get fatigued by our password reset policies and too often choose improper passwords that make it too easy for attackers to enter our systems. Ensuring that we have deployed something stronger is a key defense.I consider the Entra ID P2 policy to be a foundational need if you use Microsoft 365 and you want to keep your business secure. This fundamental license is either available as a separate standalone license or as part of the Microsoft 365 E5 for enterprise licensing.It also includes privileged identity management, self-service access for end users. If you work for a government agency, you may need to review whether you need supplemental Entra ID Governance service. These are available in the US Government community cloud (GCC), GCC-High, and Department of Defense cloud environments.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3836778/microsoft-pushes-a-lot-of-products-on-users-but-heres-one-cybersecurity-can-embrace.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link