Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
To verify the inactivity timeout is configured for 15 minutes or less, follow the steps outlined below: 1. Sign in to portal.office365.com (or .us if the user is a GCCH or DOD tenant). 2. Navigate to Admin >> Settings >> Org Settings >> Security and Privacy (tab on top of page) >> Idle Session Timeout. 3. Select the check box to enable "Turn on to set the period of inactivity". 4. Select custom option, then verify it has been set to 15. If the inactivity timeout is not set to 15 minutes or less, this is a finding.
Sign in to portal.office365.com (or .us if the user is a GCCH or DOD tenant). 1. Navigate to Admin >> Settings >> Org Settings >> Security and Privacy (tab on top of page) >> Idle Session Timeout. 2. Select the check box to enable "Turn on to set the period of inactivity". 3. Select custom option, then enter "15". 4. Select "Save".
Intune administrator account authentication is managed by Entra ID. Use the following procedure to discover inactive user accounts in Entra ID (35+ days) via the use of the Graph PowerShell SDK. Installation instructions: https://learn.microsoft.com/en-us/powershell/microsoftgraph/installation?view=graph-powershell-1.0 Required roles: At least Global Reader Required tenant license: Entra ID Premium P1 Example PowerShell commands: Connect-MgGraph -Scopes AuditLog.Read.All,User.Read.All -Environment USGov $inactiveDate = (Get-Date).AddDays(-35) $users = Get-MgUser -All:$true -Property Id, DisplayName, UserPrincipalName, UserType, createdDateTime, SignInActivity, AccountEnabled | Where-Object { $_.AccountEnabled -eq $true } $inactiveUsers = $users | Where-Object { ($_.SignInActivity.LastSignInDateTime -lt $inactiveDate) -or ($_.SignInActivity.LastSignInDateTime -eq $null -and $_.CreatedDateTime -lt $inactiveDate) } | Select-Object DisplayName, UserPrincipalName, UserType, createdDateTime, @{Name = 'LastSignInDateTime'; Expression = {($_.SignInActivity).LastSignInDateTime}}, Id | Sort-Object LastSignInDateTime $inactiveUsers | Format-Table -AutoSize If accounts are not disabled after a 35-day period of account inactivity, this is a finding. References: https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.users/get-mguser?view=graph-powershell-1.0 https://learn.microsoft.com/en-us/graph/api/user-list?view=graph-rest-1.0&tabs=http https://learn.microsoft.com/en-us/graph/api/resources/user?view=graph-rest-1.0#properties https://learn.microsoft.com/en-us/graph/api/resources/signinactivity?view=graph-rest-1.0#properties For any PowerShell scripts that are Graph, note Graph endpoints differ depending on where the tenant is located. - For commercial tenants, graph endpoints are graph.microsoft.com. - For GCC High tenants (IL4), graph endpoints are graph.microsoft.us. - For DOD tenants (IL5), graph endpoints are dod-graph.microsoft.us.
Intune administrator account authentication is managed by Entra ID. Use the following procedure to disable inactive user accounts in Entra ID via the use of the Graph PowerShell SDK. Installation instructions: https://learn.microsoft.com/en-us/powershell/microsoftgraph/installation?view=graph-powershell-1.0 Required roles: Global Administrator Example PowerShell commands: Connect-MgGraph -Scopes Directory.AccessAsUser.All, User.EnableDisableAccount.All -Environment USGov Update-MgBetaUser -UserId <Unique UserId of user> -AccountEnabled:$False References: https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.users/update-mguser?view=graph-powershell-1.0 https://learn.microsoft.com/en-us/graph/api/user-update?view=graph-rest-1.0&tabs=http For any PowerShell scripts that are Graph, note Graph endpoints differ depending on where the tenant is located. - For commercial tenants, graph endpoints are graph.microsoft.com. - For GCC High tenants (IL4), graph endpoints are graph.microsoft.us. - For DOD tenants (IL5), graph endpoints are dod-graph.microsoft.us.
Verify Entra ID is configured to enforce the limit of three consecutive invalid login attempts by a user during a 15-minute time period. 1. Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator. 2. Browse to Protection >> Authentication methods >> Password protection. 3. Verify the Lockout Threshold has been set to 3 and Lockout duration is set to 900 or more. If Entra ID is not configured to enforce the limit of three consecutive invalid login attempts with a lockout period of 15 minutes, this is a finding.
Intune administrator account authentication is managed by Entra ID. To configure account lockout settings, complete these steps: Required procedure: https://learn.microsoft.com/en-us/entra/identity/authentication/howto-password-smart-lockout 1. Sign in to the Microsoft Entra admin center as at least an Authentication Administrator. 2. Browse to Protection >> Authentication methods >> Password protection. 3. Set the Lockout threshold to 3. The default is 10 for Azure Public tenants and 3 for Azure U.S. Government tenants. 4. Set the Lockout duration in seconds, to the length in seconds of each lockout. The default is 900 seconds (15 minutes). Note: If the first sign-in after a lockout period has expired also fails, the account locks out again. If an account locks repeatedly, the lockout duration increases. ================================ This can be viewed in the Entra ID audit logs. 1. Log in to the Entra ID tenant with GA permissions. 2. Scroll down to the Monitoring section and select "Audit Logs". 3. All events related to user creation, modification, etc., are shown.
Verify Entra ID has been configured to display the DOD login banner when an Intune user logs in. Have an authorized Intune administrator log in to the Intune admin center and verify the DOD banner is displayed and the user is forced to acknowledge acceptance of the access conditions. If an authorized Intune administrator log does not find the DOD login banner when logging in to Intune and is not forced to acknowledge acceptance of the access conditions, this is a finding.
Intune administrator account authentication is managed by Entra ID. To create the standard DOD banner in Entra ID, do the following: 1. Sign in to the Microsoft Entra admin center as a Global Administrator. 2. Search for "Company Branding" in the search bar. 3. Select "Customize" under "Default sign-in experience". 4. Configure format of the banner as desired. Refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-customize-branding for more information. 5. Place the required DOD banner text in either the "Display text" box of the banner footer or the "Sign-in page text" box of the "Sign-in form" based on local preference. 6. Select "Create".
Verify the site is scheduling audit log backups at least every seven days. Since, at this time, offloading Intune audit logs is a manual process, verify the site is periodically (at least every seven days) offloading Intune logs. If Microsoft Intune is not set to transfer Microsoft Intune server logs to another server for storage, analysis, and reporting at least every seven days, this is a finding.
Configure the Microsoft Intune server to transfer Microsoft Intune server logs to another server for storage, analysis, and reporting at least every seven days. Intune audit logs can be sent to many locations, including Azure Monitor services or a third-party audit management server. If sending Intune audit logs to the Azure monitor, follow the setup instructions listed here: https://docs.microsoft.com/en-us/mem/intune/fundamentals/review-logs-using-azure-monitor. To manually offload audit logs to an audit log management server, follow these instructions: 1. Log in to the console. 2. Select "Tenant Administration". 3. Select "Audit Logs". 4. Select "Export". This exports a .csv file with audit data. Other methods can be used to archive the .csv files.
Verify all Intune user accounts require MFA. 1. Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator. 2. Browse to Conditional Access. 3. Find the MFA policy. 4. Confirm Enable policy is set to "On". If all Intune user accounts do not require MFA, this is a finding.
Intune administrator account authentication is managed by Entra ID. The following steps will create a Conditional Access policy to require all Intune users use multifactor authentication. 1. Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator. 2. In the search bar, search for Conditional Access. 3. Select "Create new policy". 4. Name the policy. It is recommended that organizations create a meaningful standard for the names of their policies. 5. Under Assignments, select "Users or workload identities". a. Under Include, select "All users". b. Under Exclude, select "Users and groups" and choose the organization's emergency access or break-glass accounts. 6. Under Target resources >> Cloud apps >> Include, select "All cloud apps". This will include Intune. a. Under Exclude, select any applications that do not require multifactor authentication. 7. Under Access controls >> Grant, select "Grant access, Require multifactor authentication", and select "Select". 8. Confirm the settings and set Enable policy to Report-only. 9. Select Create to create to enable the policy. 10. After confirming the policy, deploy the policy be either moving the Enable policy toggle from Report-only to On or alternately, deploy the policy using a Conditional Access template.
Verify the Entra ID password expiration time period has been changed to 60 days. Interview the site Intune and/or Entra ID system administrator and verify the script shown in the Fix has been run. If the Entra ID password expiration time period has been changed to 60 days, this is a finding. Note: It is not possible to view the current value for the password expiration time (the Entra ID default is 90). An administrator can check the maximum password age of their Entra ID tenant by using the Graph PowerShell SDK module and using the "Get-MgDomain" command by using the script located here: https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomain?view=graph-powershell-1.0 Note: For any PowerShell scripts that are Graph, note Graph endpoints differ depending on where the tenant is located. - For commercial tenants, graph endpoints are graph.microsoft.com. - For GCC High tenants (IL4), graph endpoints are graph.microsoft.us. - For DOD tenants (IL5), graph endpoints are dod-graph.microsoft.us.
Change the default Entra ID password expiration time period to 60 days by using the Graph script located here: https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.users/update-mguser Use the "Get-MgDomain" command, and update it to 60 days using the "Update-MgDomain -DomainId <DomainName> -PasswordValidityPeriodInDays 60" command. For any PowerShell scripts that are Graph, note Graph endpoints differ depending on where the tenant is located. - For commercial tenants, graph endpoints are graph.microsoft.com. - For GCC High tenants (IL4), graph endpoints are graph.microsoft.us. - For DOD tenants (IL5), graph endpoints are dod-graph.microsoft.us.
Verify the ISSO is alerted when accounts are created in Entra ID. Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting in Entra ID may be implemented through various methods including log aggregation and the use of monitoring tools. Determine how the site has implemented this requirement. It is recommended that Entra ID be configured to download audit logs to a log management server and the log management server be configured to alert the ISSO when accounts are created. If the ISSO is not alerted when accounts are created in Entra ID, this is a finding.
Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting may be implemented through various methods including log aggregation and the use of monitoring tools. It is recommended that Entra ID be configured to download audit logs to a log management server (https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-download-logs) and the log management server be configured to alert the ISSO when accounts are created.
Verify the ISSO is alerted when accounts are modified in Entra ID. Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting in Entra ID may be implemented through various methods including log aggregation and the use of monitoring tools. Determine how the site has implemented this requirement. It is recommended that Entra ID be configured to download audit logs to a log management server and the log management server be configured to alert the ISSO when accounts are modified. If the ISSO is not alerted when accounts are modified in Entra ID, this is a finding.
Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting may be implemented through various methods including log aggregation and the use of monitoring tools. It is recommended that Entra ID be configured to download audit logs to a log management server (https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-download-logs) and the log management server be configured to alert the ISSO when accounts are modified.
Verify the ISSO is alerted when accounts are disabled in Entra ID. Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting in Entra ID may be implemented through various methods including log aggregation and the use of monitoring tools. Determine how the site has implemented this requirement. It is recommended that Entra ID be configured to download audit logs to a log management server and the log management server be configured to alert the ISSO when accounts are disabled. If the ISSO is not alerted when accounts are disabled in Entra ID, this is a finding.
Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting may be implemented through various methods including log aggregation and the use of monitoring tools. It is recommended that Entra ID be configured to download audit logs to a log management server (https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-download-logs) and the log management server be configured to alert the ISSO when accounts are disabled.
Verify the ISSO is alerted when accounts are removed in Entra ID. Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting in Entra ID may be implemented through various methods including log aggregation and the use of monitoring tools. Determine how the site has implemented this requirement. It is recommended that Entra ID be configured to download audit logs to a log management server and the log management server be configured to alert the ISSO when accounts are removed. If the ISSO is not alerted when accounts are removed in Entra ID, this is a finding.
Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting may be implemented through various methods including log aggregation and the use of monitoring tools. It is recommended that Entra ID be configured to download audit logs to a log management server (https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-download-logs) and the log management server be configured to alert the ISSO when accounts are removed.
Verify the ISSO is alerted when accounts are enabled in Entra ID. Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting in Entra ID may be implemented through various methods including log aggregation and the use of monitoring tools. Determine how the site has implemented this requirement. It is recommended that Entra ID be configured to download audit logs to a log management server and the log management server be configured to alert the ISSO when accounts are enabled. If the ISSO is not alerted when accounts are enabled in Entra ID, this is a finding.
Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting may be implemented through various methods including log aggregation and the use of monitoring tools. It is recommended that Entra ID be configured to download audit logs to a log management server (https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-download-logs) and the log management server be configured to alert the ISSO when accounts are enabled.