1) Block Legacy Authentication CA Policy
This was already enabled as a Microsoft Managed rule that exactly matched the Manual Remediation steps for ourselves.
For another test customer, they have Security Defaults and no Business Premium licensing so cannot set CA policies but Security Defaults already enables this setting.
2) Administrative accounts are cloud only - In our environment we don't have Entra ID Sync, yet this was listed as a "not Compliant". We USED to have Entra ID Sync about 7 years ago, but this was removed.
Detection for "is
currently
Entra ID Synced" should be improved
In addition, the description of the policy is more about differentiating between user accounts and admin accounts and not using an admin account day-to-day. Whilst that's valid, it's not relevant to the title.
4) Non-admin users can view their own Bitlocker keys
This was already set to the correct value, but was listed as non-compliant.
5) Ensure organizational terms have been added to the banned password list
Whilst this was correctly detected as not being applied, it didn't actually say what custom passwords would get added if applied by Huntress. This either needs to be configurable as part of enabling in Huntress, or the platform should tell you what words will be added
6) Require MFA for All users
This was already enabled as a Microsoft Managed rule that exactly matched the Manual Remediation steps for ourselves
For another test customer, they have Security Defaults and no Business Premium licensing so cannot set CA policies but Security Defaults already enables this setting.