Managing Microsoft Secure Score (Video)

Managing Microsoft Secure Score (Video)

Managing Microsoft Secure Score is a simple, transparent way to manage the security of your Office 365, Windows and EMS environments. When you think about modern security, there are a lot of challenges. Identity attacks alone are up 300% this year alone and many attacks are going through identity because it is the easiest path to get at your information. With so many avenues for attack, it is difficult to know what to secure, what is secure and how to improve your security score. By providing visibility into you enterprise attack surfaces, Microsoft Secure Score helps you monitor, maintain and make improvements to your cybersecurity.  

 

What is Microsoft Secure Score?

Originally called Office 365 Secure Score when it launched in February 2017 it expanded its focus across the entire Microsoft 365 enterprise suite (Office 365, EMS and Windows 10) in April of 2018 and became Microsoft Secure Score. Secure Score was envisioned as “a credit score for security”; a simple at-a-glance way to be sure that the proper security controls were in place in Office 365. Secure Score determines the Office 365 services you use (One Drive, Share Point, and Exchange), looks at your configuration and behaviors then compares it to a suggested baseline. If your configuration and behaviors are in line with best practices, you get points, which can be tracked over time. This gives you the ability to quickly determine what to do to reduce your risk.

How to Access Secure Score?

Secure score can be accessed in two ways:

Understanding The Secure Score Dashboard

The secure score dashboard is a single-pane view of your security posture. What you see on the secure score dashboard once you log in are:

  • The date of your current secure score. Secure Score is calculated every 24 hours at around 1 am PST)
  • Your present secure score for Office 365 above your target score for comparison.
  • Your present Windows Secure Score if you have Windows Defender ATP.
  • A risk assessment widget that shows you what your attack risks are.
  • A comparison widget that shows your secure score as compared to:
    • All Office 365 tenants
    • Other tenants of the same seat size as yours
    • The secure score of other tenants in your industry.
  • The Target Score Slider

Using Microsoft Secure Score’s Target Score Slider

The target score slider allows you to set your target score. By moving the slider to the left you lower your level of desired security, and moving it right increases it. As you move the slider, you will see your target score above go up and down, as well as the number of actions needed to be taken to reach the desired score. Below the slider is your action queue, a list of actions needed to be taken to reach the desired state.

Reading the Secure Score Action Queue

If you click the expand arrow to the right of each action item, you will get an in-depth view of the action needed. This view includes:

  • A brief explanation of the action
  • What category of defense the action impacts
  • The user impact if implementing the change
  • The predicted costs of performing the action
  • Your score for the particular action
  • The total score possible for implementing the action
  • Threats that the action will reduce
  • The compliance controls the action can affect
  • Links to learn more about the control, ignore the recommendation, or to adapt the score for third-party applications.

What Suggested Actions are Available With Microsoft 365 Secure Score?

The actions available to you will vary based on the products and licenses in your particular tenant. Below is a complete list of all actions available with Microsoft 365 stack. This list is subject to change as new threats and capabilities are discovered or released.

NameAction CategoryAction scoreUser Impact
Activate Information Rights Management (IRM) services [Not Scored]Data10Low
Activate mobile device management servicesDevice20Moderate
Allow anonymous guest sharing links for sites and docsData1Moderate
Apply Data Loss Prevention policiesData20Moderate
Apply IRM protections to documentsData5Moderate
Apply IRM protections to email [Not Scored]Data5Moderate
Automate log upload from firewallsApps5Low
Block Client Forwarding Rules [Not Scored]Data20Moderate
Block jail broken or rooted mobile devices from connectingDevice1Moderate
Compile alternate contact info for all usersIdentity1Low
Configure expiration time for external sharing linksData2Moderate
Consume audit data weeklyData5Low
Create a Microsoft Intune App Protection Policy for AndroidDevice1010
Create a Microsoft Intune App Protection Policy for iOSDevice10Moderate
Create a Microsoft Intune Compliance Policy for AndroidDevice10Moderate
Create a Microsoft Intune Compliance Policy for Android for WorkDevice10Moderate
Create a Microsoft Intune Compliance Policy for iOSDevice10Moderate
Create a Microsoft Intune Compliance Policy for macOSDevice10Moderate
Create a Microsoft Intune Compliance Policy for WindowsDevice10Moderate
Create a Microsoft Intune Configuration Profile for AndroidDevice10Moderate
Create a Microsoft Intune Configuration Profile for Android for WorkDevice10Moderate
Create a Microsoft Intune Configuration Profile for iOSDevice10Moderate
Create a Microsoft Intune Configuration Profile for macOSDevice10Moderate
Create a Microsoft Intune Configuration Profile for WindowsDevice10Moderate
Create a Microsoft Intune Windows Information Protection PolicyDevice10Moderate
Delete/block accounts not used in last 30 daysIdentity1Moderate
Designate less than 5 global adminsIdentity1Low
Designate more than one global adminIdentity55
Discover risky and non compliant shadow IT applications used in your organizationApps20Low
Do not allow anonymous calendar sharing [Not Scored]Data10Moderate
Do not allow calendar details sharing [Not Scored]Data5Moderate
Do not allow external domain skype communications [Not Scored]Data5Moderate
Do not allow mailbox delegationData1Moderate
Do not allow simple passwords on mobile devicesDevice2Moderate
Do not allow users to grant consent to unmanaged applicationsIdentity10Moderate
Do not expire passwordsIdentity10Moderate
Do not use mail forwarding rules to external domains [Not Scored]Data1Low
Do not use transport white lists [Not Scored]Data5Low
Enable Cloud App Security ConsoleApps20Low
Enable Enhanced Jailbreak Detection in Microsoft IntuneDevice1010
Enable Microsoft Intune Mobile Device ManagementDeviceDeviceModerate
Enable Password Hash Sync if hybridIdentity10Low
Enable policy to block legacy authenticationIdentity20Moderate
Enable self-service password resetIdentity5Moderate
Enable user risk policyIdentity30Moderate
Enable Windows Defender ATP integration into Microsoft IntuneDevice10Low
Mark devices with no Microsoft Intune Compliance Policy assigned as Non CompliantDevice10Moderate
No transport rule to external domains [Not Scored]Data5Low
Reduce mobile device password re-useDevice1Moderate
Register all users for multi-factor authenticationIdentity20High
Remove TLS 1.0/1.1 and 3DES DependenciesData5Low
Require all devices to be patched, have anti-virus, and firewalls enabled [Not Scored]Device10Moderate
Require all devices to have advanced security configurations [Not Scored]Device5Moderate
Require MFA for all usersIdentity30Moderate
Require MFA for Azure AD privileged rolesIdentity50Low
Require mobile devices to block access and report policy violationsDevice5Moderate
Require mobile devices to have minimum password lengthDevice1Moderate
Require mobile devices to lock if inactiveDevice1Moderate
Require mobile devices to manage email profileDevice5Moderate
Require mobile devices to never expire passwordsDevice1Moderate
Require mobile devices to use a passwordDevice5Low
Require mobile devices to use alphanumeric passwordDevice1Moderate
Require mobile devices to use encryptionDevice1Moderate
Require mobile devices to wipe on multiple sign-in failuresDevice1Moderate
Review blocked devices report weekly [Not Scored]Device5Low
Review mailbox access by non-owners report bi-weeklyData5Low
Review mailbox forwarding rules weeklyData5Low
Review malware detections report weeklyData5Low
Review permissions & block risky OAuth applications connected to your environmentApps15Moderate
Set automated notification for new OAuth applications connected to your corporate environmentApps20Moderate
Set automated notifications for new and trending cloud applications in your organizationApps15Moderate
Set custom activity policy for your organization to discover suspicious usage patterns in cloud appsApps10Moderate
Set outbound spam notifications [Not Scored]Data15Low
Set up Office 365 ATP Safe AttachmentsData15Moderate
Set up Office 365 ATP Safe Links to verify URLsData15Moderate
Set up versioning on SharePoint online document librariesData2Moderate
SPO Sites have classification policies [Not Scored]Data10Moderate
Store user documents in OneDrive for BusinessData10Low
Tag documents in SharePoint [Not Scored]Data2Moderate
Turn on audit data recording [Not Scored]Data15Low
Turn on customer lockbox featureData5Moderate
Turn on mailbox auditing for all usersData10Low
Turn on sign-in risk policyIdentity30Moderate
Use Cloud App Security to detect insider threat, compromised account, and brute force attemptsApps15Low
Use non-global administrative rolesIdentity1Low

Agile IT Tech Talks are weekly sessions where we bring in subject matter experts for short, highly focused educational segments, followed by up to an hour of open Q&A where Agile IT clients can discuss their own environments with our engineers and a group of peers. While we release the demos and sessions on our blog, the Q&A benefit is only available to Agile IT Managed Service and Cloud Service Customers. Agile IT is a four-time cloud partner of the year and offers fully managed security as a service. To find out more, schedule a free call with a cloud service advisor, or REQUEST A QUOTE:

This demonstration provides a quick look at how a number of integrated tools across Microsoft’s security stack can be applied to enable a Zero Trust methodology in your organization. For more in-depth explorations and demos, please check out these other blogs: What is Zero Trust Security Zero Trust with Microsoft 365 Understanding Active Directory Microsoft Defender Advanced Threat Protection Demo Automate Security with Cloud App Security and Power Automate Intune for Mobile Device Management Managing Microsoft Secure Score Setting up Single Sign On (SSO) in Azure Active Directory Azure Information Protection Demo Protecting your Data Even Outside of Office 365 Azure Azure Security Center Demo Combating Shadow IT with EMS and Cloud App Security Need help defending your remote workers and assuring your devices, data, and identities are secure? Agile IT is a Gold Microsoft Security Partner, and have solutions to help your organization remain secure.

Published on: .

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

How can we help?

Loading...

Let's start a conversation

location Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

telephone-icon + 1 (619) 292-0800 mail-icon Sales@AgileIT.com

Don’t want to wait for us to get back to you?