{"componentChunkName":"component---src-templates-post-template-js","path":"/azure-setup-on-security-en","result":{"data":{"markdownRemark":{"id":"d69f32d4-2701-5cb8-b23b-6209c04f6474","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/azure-setup-on-security\">original page</a>.</p>\n</blockquote>\n<p>Lately I suddenly felt like playing around with Azure, but before spinning up any machines I decided to review the security-related recommendations first.</p>\n<p>The service I checked was Identity Secure Score, and right after logging in I was surprised to see that the achievement rate was only 14%, which meant the security level was pretty low.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/692c36b1058f300a04519d42e43c7adf/0b533/image-10.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/692c36b1058f300a04519d42e43c7adf/8ac56/image-10.webp 240w,\n/static/692c36b1058f300a04519d42e43c7adf/d3be9/image-10.webp 480w,\n/static/692c36b1058f300a04519d42e43c7adf/b0a15/image-10.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/692c36b1058f300a04519d42e43c7adf/8ff5a/image-10.png 240w,\n/static/692c36b1058f300a04519d42e43c7adf/e85cb/image-10.png 480w,\n/static/692c36b1058f300a04519d42e43c7adf/0b533/image-10.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/692c36b1058f300a04519d42e43c7adf/0b533/image-10.png\"\n            alt=\"image-10.png\"\n            title=\"image-10.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/fundamentals/identity-secure-score\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">What is Identity Secure Score? - Azure Active Directory | Microsoft Docs</a></p>\n<p>So this time, I would like to go through the best practices recommended by Identity Secure Score and improve the security level around my account.</p>\n<!-- omit in toc -->\n<h2 id=\"table-of-contents\" style=\"position:relative;\"><a href=\"#table-of-contents\" aria-label=\"table of contents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Table of Contents</h2>\n<ul>\n<li>\n<p><a href=\"#require-mfa-for-administrative-roles\">Require MFA for Administrative Roles</a></p>\n<ul>\n<li><a href=\"#configure-security-defaults\">Configure Security Defaults</a></li>\n</ul>\n</li>\n<li><a href=\"#make-sure-all-users-can-complete-mfa-for-secure-access\">Make Sure All Users Can Complete MFA for Secure Access</a></li>\n<li>\n<p><a href=\"#set-passwords-to-never-expire\">Set Passwords to Never Expire</a></p>\n<ul>\n<li><a href=\"#configure-password-expiration-with-the-microsoft-azure-ad-module-for-windows-powershell\">Configure Password Expiration with the Microsoft Azure AD Module for Windows PowerShell</a></li>\n</ul>\n</li>\n<li><a href=\"#enable-a-policy-that-blocks-legacy-authentication\">Enable a Policy That Blocks Legacy Authentication</a></li>\n<li><a href=\"#enable-the-sign-in-risk-policy\">Enable the Sign-In Risk Policy</a></li>\n<li><a href=\"#enable-the-user-risk-policy\">Enable the User Risk Policy</a></li>\n<li><a href=\"#do-not-allow-user-consent-for-unmanaged-applications\">Do Not Allow User Consent for Unmanaged Applications</a></li>\n<li><a href=\"#assign-multiple-global-administrators\">Assign Multiple Global Administrators</a></li>\n<li><a href=\"#use-limited-administrator-roles\">Use Limited Administrator Roles</a></li>\n<li><a href=\"#enable-self-service-password-reset\">Enable Self-Service Password Reset</a></li>\n<li><a href=\"#summary\">Summary</a></li>\n</ul>\n<h2 id=\"require-mfa-for-administrative-roles\" style=\"position:relative;\"><a href=\"#require-mfa-for-administrative-roles\" aria-label=\"require mfa for administrative roles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Require MFA for Administrative Roles</h2>\n<p>First, I will start with the item that has the biggest impact.</p>\n<p>It is recommended to configure MFA for administrative roles.</p>\n<blockquote>\n<p>Requiring multi-factor authentication (MFA) for all administrative roles makes it harder for attackers to access accounts.</p>\n<p>Administrative roles are granted more advanced permissions than regular users. If any of these accounts are compromised, critical devices and data become vulnerable to attack.</p>\n</blockquote>\n<p>According to the documentation below, enabling MFA reduces the risk of account compromise by more than 99.9%.</p>\n<p>The recommended way to configure MFA is to protect sign-ins with a Conditional Access policy, but unfortunately I could not configure that on my account.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/authentication/tutorial-enable-azure-mfa\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Enable Azure AD Multi-Factor Authentication | Microsoft Docs</a></p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Azure AD Multi-Factor Authentication in your organization - Azure Active Directory | Microsoft Docs</a></p>\n<p>It seems that Azure MFA offers different configuration options depending on the license you are using.</p>\n<p>The Conditional Access policy mentioned above appears to be available only for accounts that have purchased <code class=\"language-text\">Enterprise Mobility + Security E5</code> or <code class=\"language-text\">Azure AD Premium P2</code>, so this time I used <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/fundamentals/concept-fundamentals-security-defaults\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Security Defaults</a>, which is available even to <code class=\"language-text\">Azure AD Free</code> users.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/authentication/concept-mfa-licensing\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Azure AD Multi-Factor Authentication editions and consumption plans | Microsoft Docs</a></p>\n<h3 id=\"configure-security-defaults\" style=\"position:relative;\"><a href=\"#configure-security-defaults\" aria-label=\"configure security defaults permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Configure Security Defaults</h3>\n<p>I was able to enable MFA through Security Defaults with the following steps.</p>\n<p>First, open <a href=\"https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Azure Active Directory</a> from the Azure portal and select [Properties].</p>\n<p>There, enable Security Defaults.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/ae4f23f49f7d02216287d819a987fbe7/0b533/image-11.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 58.75%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAYAAABiDJ37AAAACXBIWXMAARlAAAEZQAGA43XUAAABv0lEQVQoz4WS0XLaMBBF/f9fwQfkgZd0eG2aGRLSpGmTTHmggxliYsAQW7ZlWxLc7lUwcTNTsoyQLa/O7t3dYL6I8fwSQykFrTVa2+/376t9l93FMSrxS9MUy+USURQh5llVeZ9gk6xhrZHl5FCjrmvsdrt3KPfDu1utoM/OoF5ThLPQA7Ms89AwDD004B+NeyLwsig8cOec3521IM5KRvrqinQ8b0v8mkRIX7fep6smME3jgWVZYiUZGGPeQAIkzBEmQarhEJay5JfkDaK0FrbzCroWJOvkCKQEBqBsAlszNzfYCxRH+R1Mt9bMkBJ5mcDFYuH3Qs5yaRJz1/f30FIfI8+NZOiDdWV2GugzVFl6rOFgMMCX83N8u7jAj4cHpNMp1PU1Csm6kAAMVOT5P037aEEmxW4OMvv9Pnq9Hubzuf/IJlgZEWZkWU9R0tb4v0BK9Jfl4mTyB0+Pj8gobfwblWRoWUMJSJCVxeAngZvNxjsVRQnXVL4m+VrGZzSCkYstjD7N4fkkUKncf+BQf/0+xngWI7m9Qy0NauS8kVIQwpJwGfsJcCvDzHlTKsNk+BPx5Qh6OjuOxEcj5BTwLwHfoCdHa7qVAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/ae4f23f49f7d02216287d819a987fbe7/8ac56/image-11.webp 240w,\n/static/ae4f23f49f7d02216287d819a987fbe7/d3be9/image-11.webp 480w,\n/static/ae4f23f49f7d02216287d819a987fbe7/b0a15/image-11.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/ae4f23f49f7d02216287d819a987fbe7/8ff5a/image-11.png 240w,\n/static/ae4f23f49f7d02216287d819a987fbe7/e85cb/image-11.png 480w,\n/static/ae4f23f49f7d02216287d819a987fbe7/0b533/image-11.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/ae4f23f49f7d02216287d819a987fbe7/0b533/image-11.png\"\n            alt=\"image-11.png\"\n            title=\"image-11.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Next, open <a href=\"https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Azure Active Directory</a> from the Azure portal and select [All users].</p>\n<p>From there, click [Per-user MFA] to open the screen below, then click [Enable] in [quick steps] to enable MFA.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/3c6d8873843f184362b124df7d419374/0b533/image-12.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.5%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/3c6d8873843f184362b124df7d419374/8ac56/image-12.webp 240w,\n/static/3c6d8873843f184362b124df7d419374/d3be9/image-12.webp 480w,\n/static/3c6d8873843f184362b124df7d419374/b0a15/image-12.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/3c6d8873843f184362b124df7d419374/8ff5a/image-12.png 240w,\n/static/3c6d8873843f184362b124df7d419374/e85cb/image-12.png 480w,\n/static/3c6d8873843f184362b124df7d419374/0b533/image-12.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/3c6d8873843f184362b124df7d419374/0b533/image-12.png\"\n            alt=\"image-12.png\"\n            title=\"image-12.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>That seems to have configured MFA for the administrative account.</p>\n<p>Unfortunately, the method recommended by the “Improvement action” is configuration through a Conditional Access policy, and I could not do that this time because of the license limitations.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/0b533/image-13.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 47.5%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/8ac56/image-13.webp 240w,\n/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/d3be9/image-13.webp 480w,\n/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/b0a15/image-13.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/8ff5a/image-13.png 240w,\n/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/e85cb/image-13.png 480w,\n/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/0b533/image-13.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/305ebcfa7c0741cb3b619b0ec3e9eeb5/0b533/image-13.png\"\n            alt=\"image-13.png\"\n            title=\"image-13.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Still, MFA is properly configured for the administrative account, so under “Improvement action” I selected “Resolved through alternative mitigation”.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 400px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/492837bb5e76bebab177a8297c24bc43/e17e5/image-14.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 97.50000000000001%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/492837bb5e76bebab177a8297c24bc43/8ac56/image-14.webp 240w,\n/static/492837bb5e76bebab177a8297c24bc43/7f61c/image-14.webp 400w\"\n              sizes=\"(max-width: 400px) 100vw, 400px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/492837bb5e76bebab177a8297c24bc43/8ff5a/image-14.png 240w,\n/static/492837bb5e76bebab177a8297c24bc43/e17e5/image-14.png 400w\"\n            sizes=\"(max-width: 400px) 100vw, 400px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/492837bb5e76bebab177a8297c24bc43/e17e5/image-14.png\"\n            alt=\"image-14.png\"\n            title=\"image-14.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h2 id=\"make-sure-all-users-can-complete-mfa-for-secure-access\" style=\"position:relative;\"><a href=\"#make-sure-all-users-can-complete-mfa-for-secure-access\" aria-label=\"make sure all users can complete mfa for secure access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Make Sure All Users Can Complete MFA for Secure Access</h2>\n<p>Next is MFA again.</p>\n<p>This time the recommendation is to configure MFA not only for administrator roles but for all users.</p>\n<blockquote>\n<p>Multi-factor authentication (MFA) helps protect the devices and data that these users can access.</p>\n<p>By adding authentication methods such as the Microsoft Authenticator app and phone numbers, you can strengthen protection if one authentication method is compromised.</p>\n</blockquote>\n<p>Unfortunately, I also cannot configure a Conditional Access policy for this one because of the license, so I configured MFA for all users in the same way as above and selected “Resolved through alternative mitigation” from “Improvement action”.</p>\n<h2 id=\"set-passwords-to-never-expire\" style=\"position:relative;\"><a href=\"#set-passwords-to-never-expire\" aria-label=\"set passwords to never expire permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Set Passwords to Never Expire</h2>\n<p>Next is the setting to make passwords never expire.</p>\n<p>In Japanese companies and similar environments, it often feels common to force password changes every few months, but recent research says this is actually a bad practice.</p>\n<blockquote>\n<p>Research has found that when periodic password resets are enforced, password security declines.</p>\n<p>Users tend to choose weaker passwords and change them only slightly each time they reset them.</p>\n<p>If users create strong passwords (long, complex, and not made from practical words), those passwords should remain just as strong in the future.</p>\n<p>Microsoft’s official security position is that passwords should not be expired periodically without a specific reason, and it recommends that cloud-only tenants set the password policy to never expire.</p>\n</blockquote>\n<p>Some of the Japanese UI text is mistranslated, but it seems Microsoft’s recommendation is to “set one strong password and not change it unless there is a specific reason.”</p>\n<p>By the way, the part in the UI that read like “It is Microsoft’s official security position to periodically update passwords…” was displayed as follows in the English UI.</p>\n<blockquote>\n<p>It is Microsoft’s official security position to not expire passwords periodically without a specific reason, and recommends that cloud-only tenants set the password policy to never expire.</p>\n</blockquote>\n<p>So my understanding that the recommendation is “do not change passwords periodically” seems to be correct.</p>\n<p>With that out of the way, let’s change the password expiration settings.</p>\n<h3 id=\"configure-password-expiration-with-the-microsoft-azure-ad-module-for-windows-powershell\" style=\"position:relative;\"><a href=\"#configure-password-expiration-with-the-microsoft-azure-ad-module-for-windows-powershell\" aria-label=\"configure password expiration with the microsoft azure ad module for windows powershell permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Configure Password Expiration with the Microsoft Azure AD Module for Windows PowerShell</h3>\n<p>It looks like you can change the password expiration policy with the Microsoft Azure AD Module for Windows PowerShell.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/authentication/concept-sspr-policy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Self-service password reset policies - Azure Active Directory | Microsoft Docs</a></p>\n<p>First, you need to install <code class=\"language-text\">Connect-AzureAD</code> in order to use the Microsoft Azure AD Module for Windows PowerShell.</p>\n<p>Start PowerShell as administrator and run the following command.</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\"><span class=\"token function\">Install-Module</span> AzureAD</code></pre></div>\n<p>Once the installation is complete, the <code class=\"language-text\">Connect-AzureAD</code> cmdlet becomes available.</p>\n<p>The following is a useful reference for how to connect by using the <code class=\"language-text\">Connect-AzureAD</code> cmdlet.</p>\n<p>This time I wanted to connect to AAD, so I think it is best to specify the AAD tenant ID with <code class=\"language-text\">-TenantId</code>.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/powershell/module/azuread/connect-azuread?view=azureadps-2.0#examples\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Connect-AzureAD (AzureAD) | Microsoft Docs</a></p>\n<p>After the connection is established, you will see output like the following.</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">> <span class=\"token function\">Connect-AzureAD</span> <span class=\"token operator\">-</span>TenantId XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX\nAccount            Environment TenantId                             TenantDomain                      AccountType\n<span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">-</span>            <span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">-</span> <span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span>                             <span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span>                      <span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">--</span><span class=\"token operator\">-</span>\nXXXXXXXXXXX        AzureCloud  XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX xxxxxxxxxx<span class=\"token punctuation\">.</span>onmicrosoft<span class=\"token punctuation\">.</span>com   User</code></pre></div>\n<p>Now that I was logged in to the tenant from PowerShell, I used the following command to set passwords to never expire for all users.</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\"><span class=\"token function\">Get-AzureADUser</span> <span class=\"token operator\">-</span>All <span class=\"token boolean\">$true</span> <span class=\"token punctuation\">|</span> <span class=\"token function\">Set-AzureADUser</span> <span class=\"token operator\">-</span>PasswordPolicies DisablePasswordExpiration</code></pre></div>\n<p>That completes the setting.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/authentication/concept-sspr-policy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Self-service password reset policies - Azure Active Directory | Microsoft Docs</a></p>\n<h2 id=\"enable-a-policy-that-blocks-legacy-authentication\" style=\"position:relative;\"><a href=\"#enable-a-policy-that-blocks-legacy-authentication\" aria-label=\"enable a policy that blocks legacy authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable a Policy That Blocks Legacy Authentication</h2>\n<p>The next setting is a policy that blocks legacy authentication.</p>\n<blockquote>\n<p>Today, most sign-in attempts that compromise security rely on legacy authentication.</p>\n<p>Older Office clients such as Office 2010 do not support modern authentication and use legacy protocols such as IMAP, SMTP, and POP3.</p>\n<p>Legacy authentication does not support multi-factor authentication (MFA). Even if an MFA policy is configured in the environment, malicious users can use legacy protocols to bypass those policies.</p>\n</blockquote>\n<p>Unfortunately, this setting also requires a Conditional Access policy, so because Security Defaults is enabled, I selected “Resolved through alternative mitigation” from “Improvement action”.</p>\n<h2 id=\"enable-the-sign-in-risk-policy\" style=\"position:relative;\"><a href=\"#enable-the-sign-in-risk-policy\" aria-label=\"enable the sign in risk policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable the Sign-In Risk Policy</h2>\n<p>Next, let’s look at how to enable the sign-in risk policy from <code class=\"language-text\">Azure AD Identity Protection</code>.</p>\n<blockquote>\n<p>Enabling the sign-in risk policy will require multi-factor authentication (MFA) for suspicious sign-ins.</p>\n</blockquote>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/identity-protection/overview-identity-protection\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">What is Azure Active Directory Identity Protection? | Microsoft Docs</a></p>\n<p>That said, with the license I am using, the sign-in risk remediation policy was disabled and could not be enabled, so I marked this as “Risk accepted”.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/b0c877cbb1f5f20a65aeb46d90f072d9/0b533/image-15.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 89.58333333333334%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/b0c877cbb1f5f20a65aeb46d90f072d9/8ac56/image-15.webp 240w,\n/static/b0c877cbb1f5f20a65aeb46d90f072d9/d3be9/image-15.webp 480w,\n/static/b0c877cbb1f5f20a65aeb46d90f072d9/b0a15/image-15.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/b0c877cbb1f5f20a65aeb46d90f072d9/8ff5a/image-15.png 240w,\n/static/b0c877cbb1f5f20a65aeb46d90f072d9/e85cb/image-15.png 480w,\n/static/b0c877cbb1f5f20a65aeb46d90f072d9/0b533/image-15.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/b0c877cbb1f5f20a65aeb46d90f072d9/0b533/image-15.png\"\n            alt=\"image-15.png\"\n            title=\"image-15.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h2 id=\"enable-the-user-risk-policy\" style=\"position:relative;\"><a href=\"#enable-the-user-risk-policy\" aria-label=\"enable the user risk policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable the User Risk Policy</h2>\n<p>As in the previous section, this is configured from <code class=\"language-text\">Azure AD Identity Protection</code>.</p>\n<blockquote>\n<p>Enabling the user risk policy allows Azure Active Directory to detect the possibility that a user account has been compromised.</p>\n<p>Administrators can configure Conditional Access policies based on user risk in order to respond automatically to specific risk levels.</p>\n<p>For example, they can block access to resources or require a password change to return a user account to a clean state.</p>\n</blockquote>\n<p>This one also could not be enabled, so I marked it as “Risk accepted”.</p>\n<h2 id=\"do-not-allow-user-consent-for-unmanaged-applications\" style=\"position:relative;\"><a href=\"#do-not-allow-user-consent-for-unmanaged-applications\" aria-label=\"do not allow user consent for unmanaged applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Do Not Allow User Consent for Unmanaged Applications</h2>\n<p>This appears to be a recommendation about controlling permissions when integrating AAD with third-party applications.</p>\n<blockquote>\n<p>Regulate permissions for integrated third-party applications to strengthen the security of the service.</p>\n<p>Allow access only to the applications you need and that support robust security controls.</p>\n<p>Because third-party applications are not created by Microsoft, they could be used for malicious purposes, such as exfiltrating data from the tenant.</p>\n<p>Attackers may be able to maintain access to the service through these integrated applications without using a compromised account.</p>\n</blockquote>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/active-directory/saas-apps/tutorial-list\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Tutorials for integrating SaaS applications with Azure AD | Microsoft Docs</a></p>\n<p>At the moment I am not planning to integrate any third-party services with AAD, so I skipped this.</p>\n<h2 id=\"assign-multiple-global-administrators\" style=\"position:relative;\"><a href=\"#assign-multiple-global-administrators\" aria-label=\"assign multiple global administrators permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Assign Multiple Global Administrators</h2>\n<p>This recommendation is to prepare multiple administrators.</p>\n<blockquote>\n<p>Having multiple global administrators can help when organizational requirements or obligations cannot be met by a single person.</p>\n<p>It is important to prepare a delegate or emergency response account that someone on the team can access when needed.</p>\n<p>It also makes it possible for administrators to watch each other for signs of compromise.</p>\n</blockquote>\n<p>It is useful not only for handling absences or lost account credentials, but also for preventing abuse.</p>\n<p>This topic was also included in CISSP content.</p>\n<p>Since I am using this personally, I skipped this as well.</p>\n<h2 id=\"use-limited-administrator-roles\" style=\"position:relative;\"><a href=\"#use-limited-administrator-roles\" aria-label=\"use limited administrator roles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use Limited Administrator Roles</h2>\n<p>It is not recommended to use an account with the Global Administrator role as your day-to-day user account.</p>\n<blockquote>\n<p>Users with limited administrator roles have more privileges than standard users, but fewer than global administrators.</p>\n<p>By using limited administrator roles to perform the management tasks you need, you can reduce the number of users who are assigned the highly valuable and high-impact Global Administrator role.</p>\n<p>Assigning roles such as Password Administrator or Exchange Online Administrator instead of Global Administrator can reduce the chance that a globally privileged account will be compromised.</p>\n</blockquote>\n<p>I added a new user from the AAD console and assigned an appropriate administrative role.</p>\n<p>And of course I did not forget to enable MFA for it.</p>\n<h2 id=\"enable-self-service-password-reset\" style=\"position:relative;\"><a href=\"#enable-self-service-password-reset\" aria-label=\"enable self service password reset permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable Self-Service Password Reset</h2>\n<p>This setting controls whether non-administrative users can reset their passwords.</p>\n<blockquote>\n<p>Using self-service password reset in Azure Active Directory means users no longer need to rely on the help desk to reset their passwords.</p>\n<p>This feature can also be used together with Azure AD’s dynamic banned passwords, which help prevent the use of easily guessed passwords.</p>\n</blockquote>\n<p>You can configure it from the screen below, but since this is for personal use, I left it set to “None”.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/c189b750fd07511d2e9fa22b029c6e08/0b533/image-16.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/c189b750fd07511d2e9fa22b029c6e08/8ac56/image-16.webp 240w,\n/static/c189b750fd07511d2e9fa22b029c6e08/d3be9/image-16.webp 480w,\n/static/c189b750fd07511d2e9fa22b029c6e08/b0a15/image-16.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/c189b750fd07511d2e9fa22b029c6e08/8ff5a/image-16.png 240w,\n/static/c189b750fd07511d2e9fa22b029c6e08/e85cb/image-16.png 480w,\n/static/c189b750fd07511d2e9fa22b029c6e08/0b533/image-16.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/c189b750fd07511d2e9fa22b029c6e08/0b533/image-16.png\"\n            alt=\"image-16.png\"\n            title=\"image-16.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h2 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary</h2>\n<p>I felt like playing with Azure a bit, so as a first step I went through all of the recommendations shown in <code class=\"language-text\">Secure Score for Identity</code>.</p>\n<p>I think that covers the minimum account-related best practices, so I would like to start experimenting with Azure from here.</p>","fields":{"slug":"/azure-setup-on-security-en","tagSlugs":["/tag/security-en/","/tag/azure-en/","/tag/備忘録/","/tag/english/"]},"frontmatter":{"date":"2022-02-08","description":"","tags":["Security (en)","Azure (en)","備忘録","English"],"title":"Checking Azure Active Directory's Identity Secure Score","socialImage":{"publicURL":"/static/5c545c1024b2178addc54de4a9c2d549/azure-setup-on-security.png"}}}},"pageContext":{"slug":"/azure-setup-on-security-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}