

Recommended admin accounts to be defined with exceptions include the following: It provides higher-level and more granular control of authentication for defining privileged accounts, such as various admin accounts, as well as user accounts for executives and other critical accounts. Require MFA for users with admin roles or those identified as a high-risk user.Ĭonditional access is provided through AD Premium P1 and P2 licensing.Designed for Azure AD tenants without Azure AD Premium licenses.Security defaults were implemented in approximately 2019 and have the following characteristics: Thus, security defaults are a safety net to use until organizations develop a fully fledged security plan that fits their specific needs. These are basic, essential settings that Microsoft manages to provide what it feels keeps their customers safe while they develop a security strategy. To mitigate this, Microsoft gathered input from partners and customers and combined that knowledge and experience into security defaults. Despite Microsoft giving organizations tools for MFA implementation, adoption was slow. This initiative in Azure AD is one that Microsoft has been working on since 2014.

Security defaults are provided automatically for Azure AD tenants without AD Premium licenses. The two most common approaches IT administrators use to deploy MFA across a Microsoft environment are via security defaults and conditional access.
