Skip to Content

EID-EXP-001 – Evidence


Experiment ID: EID-EXP-001

Category: Baseline 

Title: Default Entra ID Tenant Security Posture

Result: Weak default protections

Risk Rating: 🟠 Medium


Evidence Scope

This evidence was collected from a newly created Microsoft Entra ID tenant with no manual security hardening applied.

Tenant Conditions:

  • Newly created Entra ID tenant
  • No Conditional Access policies configured
  • Security Defaults: Enabled
  • No custom Identity Protection policies
  • No third-party security tools integrated

This evidence validates Entra ID's default security posture before any hardening steps are applied.


Tenant Validation 001-01


All evidence in this experiment was collected from the Microsoft Entra ID tenant
**F11labs** with primary domain **f11labs.onmicrosoft.com**.

Evidence Artifact: 

EID-EXP-001-Tenant-Overview.png

Evidence - Figure EID-EXP-001-Tenant-Overview.png

Tenant context validated as F11labs (f11labs.onmicrosoft.com). See Figure EID-EXP-001-Tenant-Overview.png.


Evidence EID-EXP-001-01

Control Area: Conditional Access

Observation: The Conditional Access policy list is empty in the default tenant configuration.

Expected Secure State: At least one Conditional Access policy is enforcing MFA for user sign-ins.

Actual Result: No Conditional Access policies exist by default.

Impact: User sign-ins are not evaluated against explicit access conditions.

Evidence Artifact: EID-EXP-001-01-CA-Empty.png

Evidence Artifact: EID-EXP-001-01-CA-Empty.png



Evidence EID-EXP-001-02

Control Area: Multi-Factor Authentication (MFA)

Observation: A standard user can authenticate successfully without an MFA challenge.

Expected Secure State: MFA is enforced for all interactive user sign-ins.

Actual Result: User authentication succeeds without MFA when Security Defaults are enabled.

Impact: Authentication relies on implicit protections rather than enforceable policy controls.

Evidence Artifact: EID-EXP-001-02-UserLogin-NoMFA.png

EID-USER-01: User login was successful without MFA. Refer to evidence EID-EXP-001-02-UserLogin-NoMFA.

Evidence Artifact: EID-EXP-001-02-NoAuthenticationMethods.png

No authentication methods configured for "EID-USER-01".  Refer to evidence EID-EXP-001-02-NoAuthenticationMethods.


Evidence EID-EXP-001-03

Control Area: Legacy Authentication

Observation: Legacy authentication is not explicitly blocked via Conditional Access.

Expected Secure State: Legacy authentication should be denied using Conditional Access policies.

Actual Result: No policy exists to explicitly block legacy authentication attempts.

Impact: Password-based authentication attack paths remain available.

Evidence Artifact: EID-EXP-001-03-LegacyAuth-SignInLogs

No Conditional Access policies blocking "Legacy Authentication". Refer to evidence EID-EXP-001-03-LegacyAuth-SignInLogs

No Conditional Access policy blocks legacy authentication; although no recent legacy sign-ins were observed, the attack path remains available due to lack of explicit enforcement. Refer to evidence EID-EXP-001-03-LegacyAuth-SignInLogs


Evidence EID-EXP-001-04

Control Area: Identity Protection

Observation: No user risk or sign-in risk policies are configured in Identity Protection.

Expected Secure State: Risk-based policies automatically enforce MFA or block access during risky sign-ins.

Actual Result: Identity Protection policies are not enabled by default.

Impact: Risky sign-ins are not automatically mitigated.

Evidence Artifact: EID-EXP-001-04-IdentityProtection-Empty.png

User risk policy is disabled by default. Refer to evidence EID-EXP-001-04-IdentityProtection-Empty.


Evidence EID-EXP-001-05

Control Area: External Identities (Guest Access)

Observation: Guest access is enabled using default external collaboration settings.

Expected Secure State: Guest access is restricted and governed through policy.

Actual Result: Guests can be invited without additional approval or access restrictions.

Impact: External identities increase the tenant attack surface if not governed.

Evidence Artifact: EID-EXP-001-05-GuestAccess-Defaults.png

Guests can be invited without additional approval or access restrictions. Refer to evidence EID-EXP-001-05-GuestAccess-Defaults.

Evidence Summary


Evidence IDControl AreaResult
001-01

Tenant Validation

Informational
001-02

Conditional Access

Weak
001-03

MFA Enforcement

Weak
001-04

Legacy Authentication

Weak
001-05

Identity Protection

Weak

001-06

Guest Access

Weak


Evidence-Based Conclusion

The evidence confirms that a default Microsoft Entra ID tenant relies on implicit protections instead of enforceable security controls. Without explicit Conditional Access, risk-based policies, and legacy authentication blocking, the tenant is exposed to common identity attack paths. 

This evidence forms the baseline for subsequent hardening experiments.


Next Experiment: EID-EXP-002 – Microsoft Entra ID Sign-In Logs Deep Dive – Visibility Gaps in Authentication Events


Related Analysis & Fix Guidance

- Technical deep dive: How Legacy Authentication Bypasses Entra ID Security Defaults 

- MSP risk & business impact: Why Security Defaults Create False Confidence for SMBs

- Video walkthrough: Real Entra ID Attack: Security Defaults Failed