October 11, 2025

  Sidebar

Security Defaults Prepare for Conditional Access

My Atlas / Sidebar

380 wordsTime to read: 2 min
Wes Miller by
Wes Miller

Wes Miller analyzes and writes about Microsoft’s security, identity management, and systems management technologies. Before joining Directions on Microsoft, Wes... more

To increase security and reduce the number of attacks on Entra ID tenancies with poor and unchanged default security settings, Microsoft deployed Security Defaults in 2019. Security Defaults provide a small number of baseline security settings in every Entra ID tenancy that can prevent a significant number of security issues later.

For example, when Microsoft first offered multifactor authentication (MFA) to all Office 365 and Microsoft 365 tenancies, the company acknowledged that the use of MFA among monthly active users (MAUs) was still quite low (less than 2% of MAU). Organizations are often slow to adopt new security features from identity providers due to real and perceived issues that will arise from the change.

Security Defaults sought to help new tenancies start with a secure foundation, even if they were not licensed for Entra ID P1—then known as Azure Active Directory Premium—but also was beneficial for organizations that had not yet implemented CA or did not have a dedicated IT staff to deploy and manage CA, as is often the case in smaller organizations. While Security Defaults are not CA, and they are not based on CA, they are intended to build in some similar capabilities, without requiring the licensing or IT staff to benefit from it.

Atlas Members have full access

Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.

Membership Options

Already have an account? Login Now