Microsoft Secure Score, a tool to measure and enhance organizational security posture, works hand in hand with Microsoft Defender for Identity. This combination promotes 14 recommended actions. The third one emphasizes the removal of dormant accounts from sensitive groups, enhancing security. A blog series exploring these actions is being rolled out, aiming to provide a comprehensive approach, its impacts, and security recommendations. The fourteen recommendations range from resolving unsecure domain configurations to addressing insecure account attributes.
Here are some of the actions that are recommended:
Microsoft Defender for Identity employs deep insights from Secure Score to provide actionable recommendations. It effectively scans for unsecured domain configurations and account attributes, highlighting potential vulnerabilities. Its partnership with Secure Score enables a more extensive assessment and more reliable recommendations. This is focused on improving organizations' overall security stance, eliminating inactive accounts from sensitive groups, reducing the possibility of unauthorized access and data breaches.
Microsoft Defender for Identity is a security solution designed to help organizations protect their identities and data. The solution provides insights into an organization's security posture through Microsoft Secure Score, which measures security-related measurements. Defender for Identity leverages Secure Score with fourteen recommended actions that can help organizations improve their security posture. The third action in this series is the “Remove dormant accounts from sensitive groups” recommended action. This action helps organizations identify and remove dormant accounts from sensitive groups, ensuring that only active accounts with valid permissions have access to sensitive data. Organizations should review their groups regularly and remove any dormant accounts that are no longer being used. Additionally, organizations should review their group membership to ensure that only accounts with valid permissions have access to sensitive data. Organizations should also ensure that they have appropriate measures in place to monitor user access and ensure that accounts are only used by authorized personnel. Finally, organizations should ensure that they have appropriate procedures in place for removing accounts that are no longer in use. By taking these steps, organizations can help protect their sensitive data from unauthorized access.
Microsoft Defender, Secure Score, Remove Dormant Accounts, Unsecure Domain Configurations, Unsecure Account Attributes