| Applications don't have client secrets configured |
None (included with Microsoft Entra ID) |
| Service principals don't have certificates or credentials associated with them |
None (included with Microsoft Entra ID) |
| Applications don't have certificates with expiration longer than 180 days |
None (included with Microsoft Entra ID) |
| Application certificates must be rotated on a regular basis |
None (included with Microsoft Entra ID) |
| Enforce standards for app secrets and certificates |
None (included with Microsoft Entra ID) |
| Microsoft services applications don't have credentials configured |
None (included with Microsoft Entra ID) |
| User consent settings are restricted |
None (included with Microsoft Entra ID) |
| Admin consent workflow is enabled |
None (included with Microsoft Entra ID) |
| High Global Administrator to privileged user ratio |
None (included with Microsoft Entra ID) |
| Administrative privileges are tightly limited to prevent compromise |
Microsoft Entra ID P1 |
| Application admin rights are constrained to specific Private Access apps |
Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| Privileged accounts are cloud native identities |
None (included with Microsoft Entra ID) |
| All privileged role assignments are activated just in time and not permanently active |
Microsoft Entra ID P2 |
| All Microsoft Entra privileged role assignments are managed with PIM |
Microsoft Entra ID P2 |
| Passkey authentication method enabled |
None (included with Microsoft Entra ID) |
| Security key attestation is enforced |
None (included with Microsoft Entra ID) |
| Privileged accounts have phishing-resistant methods registered |
Microsoft Entra ID P1 |
| Privileged Microsoft Entra built-in roles are targeted with Conditional Access policies to enforce phishing-resistant methods |
Microsoft Entra ID P1 |
| Conditional Access policies enforce strong authentication for private apps |
Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| Application Proxy applications require preauthentication to block anonymous access |
Microsoft Entra ID P1 |
| Require password reset notifications for administrator roles |
Microsoft Entra ID P1 |
| Block legacy authentication policy is configured |
Microsoft Entra ID P1 |
| Temporary access pass is enabled |
Microsoft Entra ID P1 |
| Restrict Temporary Access Pass to Single Use |
Microsoft Entra ID P1 |
| Migrate from legacy MFA and SSPR policies |
Microsoft Entra ID P1 |
| Block administrators from using SSPR |
Microsoft Entra ID P1 |
| Self-service password reset doesn't use security questions |
Microsoft Entra ID P1 |
| SMS and Voice Call authentication methods are disabled |
Microsoft Entra ID P1 |
| Secure the MFA registration (My Security Info) page |
Microsoft Entra ID P1 |
| Use cloud authentication |
Microsoft Entra ID P1 |
| All users are required to register for MFA |
Microsoft Entra ID P2 |
| Users have strong authentication methods configured |
Microsoft Entra ID P1 |
| User sign-in activity uses token protection |
Microsoft Entra ID P1 |
| All user sign-in activity uses phishing-resistant authentication methods |
Microsoft Entra ID P1 |
| All sign-in activity comes from managed devices |
Microsoft Entra ID P1 |
| Security key authentication method enabled |
None (included with Microsoft Entra ID) |
| Privileged roles aren't assigned to stale identities |
Microsoft Entra ID P2 |
| Microsoft Authenticator app shows sign-in context |
Microsoft Entra ID P1 |
| Microsoft Authenticator app report suspicious activity setting is enabled |
Microsoft Entra ID P1 |
| Password expiration is disabled |
Microsoft Entra ID P1 |
| Smart lockout threshold set to 10 or less |
Microsoft Entra ID P1 |
| Smart lockout duration is set to a minimum of 60 |
Microsoft Entra ID P1 |
| Add organizational terms to the banned password list |
Microsoft Entra ID P1 |
| Require multifactor authentication for device join and device registration using user action |
Microsoft Entra ID P1 |
| Local Admin Password Solution is deployed |
Microsoft Entra ID P1 |
| Entra Connect Sync is configured with Service Principal Credentials |
None (included with Microsoft Entra ID) |
| No usage of ADAL in the tenant |
None (included with Microsoft Entra ID) |
| Block legacy Azure AD PowerShell module |
None (included with Microsoft Entra ID) |
| Enable Microsoft Entra ID security defaults for free tenants |
None (included with Microsoft Entra ID) |