5 min read
Top policies for securing device registration in Microsoft 365
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...
3 min read
Nick Ross
:
Mar 24, 2025 12:15:00 AM
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of maintaining persistence for hackers is to join a device to Entra after initial user compromise to maintain persistence. In today’s article, I am going to show you my top policies for locking down device registrations to approved resources within your organization.
Without strict policies, allowing any user to register or join a device creates a “back door” for attackers who might compromise a user account. Here’s why this can be concerning:
Let’s dive into policies that can help secure your organization and prevent these vulnerabilities.
If we think about the common ways devices are joined or registered into Entra today, we really have two major workflows:
The key thing to note here is that when users sign into desktop applications on any device, they end up getting prompted to register their device with Entra without any type of approval workflow. This is what can lead to an unapproved asset inventory.
When I talk about “Layer 1” Protections, these are usually settings I usually try to enable by default in every tenant I manage. Layer 2 protections usually are a step up because they include:
Adding Multi-Factor Authentication (MFA) for device registration is a simple yet effective way to stop unauthorized devices. By requiring an MFA prompt, even if an attacker has access to a compromised token (think of man-in-the-middle attacks, cookie hijacking, etc.), they’ll face a significant roadblock:
Restricting device joins to an “Approved Users” group helps limit who can add new devices. This control is especially useful for high-security environments or when dealing with contractors or temporary staff. You would have to have a process in place for your User onboarding workflow to temporarily add new hire to this group while they get their workstation set up. Here’s how to do it:
For a more secure approach, consider using a Temporary Access Pass (TAP) to authorize device registrations. This method not only reduces password sharing risks on initial new hire onboarding but also ensures each registration window is temporary and verified by IT. This would ensure that users can’t blindly register any device to Entra:
If you are looking for a tool to help you understand if you have these policies deployed across one to many tenants, check out a tool I built called CloudCapsule, which automates Microsoft 365 security assessments. You can get a tenant connected and within minutes, have a full security report mapped to the CIS Controls.
5 min read
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...
6 min read
Managing asoftware application inventoryfor a business can feel overwhelming. With the rapidproliferation of SaaS tools, lack of governance, and...
6 min read
In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and incident...