To enhance your cloud security, manage your Azure Security posture effectively by utilizing Azure Security Center's alerting features. Regularly review your security posture to identify and mitigate potential risks, ensuring your cloud environment remains secure.
Effective management of Microsoft Entra ID (formerly Azure Active Directory) is crucial for maintaining the security and efficiency of your organisation's IT infrastructure. Neglecting best practices can lead to unauthorised access, data breaches, and operational disruptions.
To check if your users are still typing passwords, use the Get-MgBetaAuditLogSignIn cmdlet - for example:
Connect-MgGraphImport-Module Microsoft.Graph.Beta.Reports$startDate = (Get-Date).AddDays(-30).ToString("yyyy-MM-ddTHH:mm:ssZ")$endDate = (Get-Date).ToString("yyyy-MM-ddTHH:mm:ssZ")$Output = @()$signIns = Get-MgBetaAuditLogSignIn -Filter "createdDateTime ge $startDate and createdDateTime le $endDate" -Allforeach ($signIn in $signIns) {$authMethods = $signIn.AuthenticationDetails | ForEach-Object { $_.AuthenticationMethod -join "," }$authMethodsString = $authMethods -join "; "if ($signIn.Status.errorCode -eq 0 -and $authMethodsString -contains "Password" -and !($authMethodsString -contains "Passwordless")) {$Output += [PSCustomObject]@{UserDisplayName = $signIn.UserDisplayNameUserPrincipalName = $signIn.UserPrincipalNameCreatedDateTime = $signIn.CreatedDateTimeAppDisplayName = $signIn.AppDisplayNameAuthenticationMethod = $authMethodsString}}}$Output | Export-Csv -Path C:\temp\password-use.csv -NoTypeInformation
Clear and consistent naming conventions for access groups make management simpler and ensure clarity across the organization
Without clear naming conventions, it becomes difficult to understand the purpose or scope of access groups, leading to confusion and potential security risks.
[Department]-[Resource]-[Level]HR-Payroll-ReadOnly or IT-SharePoint-AdminDL- for Distribution List, SEC- for Security Group, O365- for Office 365 Group 'Intune-' for Intune policies| Name | Purpose |
| SEC-IT-VPN-Access | Provides VPN access for IT personnel. |
| SEC-Marketing-WebAnalytics | Grants access to web analytics tools. |
| SEC-Finance-ERP-ReadOnly | Read-only access to the ERP system. |
| O365-SharePoint-Accounts-private-library-ReadWrite | Read-write access to the Accounts SharePoint library. |
| DL-All-Company-Broadcast | Organization-wide communication group. |
| Intune-User-AccountingSoftware | Intune user policy to install accounting software. |
| Intune-Computer-ScreenTimeout | Intune computer screen timeout policy. |
| ✅ Figure: Good example - Access group naming conventions that improve clarity and reduce errors in assignment |
By adhering to these best practices, including clear naming conventions for access groups, you can strengthen your organization's security posture and streamline the management of Microsoft Entra ID.
Once your environment is secured sufficiently you need to configure some alerting. This will ensure that any changes either due to changes in your Azure deployment or more importantly improved scanning in Security Center result in you being alerted so that your infrastructure can be better secured.
As things change, you should schedule a regular review of security posture. This should involve reviewing whether the current policy is appropriate. Consider the following: