Skip to main content

Inforcer Phase 1 – Entra & M365 Admin Hardening

Moving From Foundational to Enforced Security in Business Standard

Updated over a month ago

Purpose of Phase 1

Phase 1 introduces security controls that:

  • Increase enforcement

  • May impact user experience

  • Require communication and change management

  • Strengthen identity governance and app consent controls

Unlike Phase 0 (Quick Wins), these settings can have a noticeable operational impact if changed abruptly.


Important: Why Voice & SMS Are Addressed in Phase 1

In Phase 0, we identify legacy authentication methods but may not immediately disable them.

Why?

In many Business Standard tenants:

  • Voice and SMS MFA are actively in use

  • Users may not yet be enrolled in Microsoft Authenticator

  • Security Defaults may still allow these methods

Turning these off without preparation can:

  • Lock out users

  • Break sign-in flows

  • Disrupt onboarding

Therefore:

🔹 Phase 0 = Identify & prepare
🔹 Phase 1 = Enforce & modernize

Voice and SMS are considered legacy MFA methods due to:

  • SIM swap attacks

  • Telecom interception

  • MFA fatigue & OTP phishing kits

Microsoft’s guidance supports moving toward modern app-based MFA and phishing-resistant methods. See: Phishing-resistant MFA | Microsoft Learn


Phase 1 – M365 Admin


Password Expiration Policy

Recommendation: Disable forced password expiration.

Why:

Microsoft no longer recommends periodic password expiration in modern environments.

When MFA is enabled:

  • Frequent password changes encourage weaker passwords

  • Users increment patterns (Password1 → Password2)

  • Security benefit is minimal

Phase 1 aligns with modern password guidance:

Strong password + MFA > Expiration cycling


🔐 Phase 1 – Entra Controls


Registration Campaign

Encourages users to register Microsoft Authenticator.

Why Phase 1?

Before disabling SMS and Voice MFA, we ensure:

  • Users are enrolled in modern MFA

  • Number matching is enabled

  • Authentication method coverage is complete

This bridges the gap before enforcing stronger controls.


Voice Call Authentication Configuration

Action: Disable (if not already).

Why Now?

By Phase 1:

  • Registration campaign has run

  • Authenticator adoption has increased

  • Change communication has occurred

Voice MFA is vulnerable to:

  • SIM swap attacks

  • VoIP manipulation

  • Telecom redirection fraud


SMS Authentication Configuration

Action: Disable (unless exception required).

SMS OTP is vulnerable to:

  • Phishing proxy kits

  • SIM hijacking

  • SS7 telecom exploits

Disabling SMS is a strong security posture improvement — but must follow enrollment planning.


Security Defaults

Security Defaults provide baseline identity protection for Business Standard tenants.

Includes:

  • MFA enforcement

  • Legacy authentication blocking

  • Admin protection

  • Risk mitigation

This is critical if Conditional Access is not deployed.

Security Defaults is often misunderstood — Phase 1 ensures it is evaluated, configured correctly, or replaced with Conditional Access if licensing changes.


Entra Password Protection

Password protection: On by default for Business Standard needs P1 for advanced implementation.

  • Block common passwords

  • Enforce banned password lists

  • Protect against spray attacks

Especially important in Business Standard where P2 risk policies are unavailable.


Entra Enterprise Application – User Consent Settings

Restrict default user consent to applications.

Why?

Unrestricted user consent allows:

  • OAuth phishing attacks

  • Malicious app registrations

  • Data exfiltration via Graph permissions

Best Practice:

  • Disable broad user consent

  • Allow admin-approved app workflows


Enterprise Application – Admin Consent Settings

Require admin review for high-permission applications.

This prevents:

  • Users granting Directory.ReadWrite.All

  • Global API abuse

  • Token persistence attacks


Enable Guest Self-Service Sign-Up via User Flows

This must be carefully evaluated.

In many Business Standard tenants:

  • This should be disabled unless explicitly needed.

Why?
Self-service external onboarding can:

  • Bypass governance

  • Introduce unmanaged external identities

Did this answer your question?