Security defaults disabled in Azure Active Directory
Security Defaults give every tenant a baseline of MFA and legacy auth blocking. The CIS posture replaces them with Conditional Access policies that cover the same gaps with finer control.
Security Defaults and Conditional Access cannot run side by side. Tenants left on Security Defaults cannot use Conditional Access at all, which means no risk-based MFA, no device compliance gating, no admin protections.
Stand up CA policies that require MFA for all users, block legacy auth, and require compliant or hybrid-joined devices for admins. Once the CA policies are reporting-only clean for 24 hours, switch Security Defaults off in Entra admin center, Identity, Overview, Properties.
