Azure Active Directory

Welcome to the Azure Active Directory suggestions and feedback site! We love hearing from you. If you have suggestions, please submit an idea or vote up an idea. We are monitoring the site actively.

Thank you for joining our community and helping improve Azure AD!

Wehave a new log in experience integrated with Azure AD, and we stronglyrecommend you log in with your Azure AD (Office 365) account. If yourUserVoice account is the same email address as your Azure AD account, yourprevious activities will be automatically mapped to your Azure AD account.  You can read more here for details: https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Putting-customers-first-for-f...

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. CSP complience requirements eligible for Identity Secure Score

    The CSP requirements for complience aren't being scored in Identity Secure Score.
    If we have enabled the Baseline Policy Require MFA for Admins and End User Protection the score remains the same. Only MFA Per User is being scored. This is a little strange because, in reality, all of our users have MFA configured to their accounts.

    3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Identity Secure Score  ·  Flag idea as inappropriate…  ·  Admin →
  2. Show accounts in 'Delete/block accounts not used in last 30 days'

    Securecore does not tell you which accounts are not used in the last 30 days, and there is no way to find out. It only says "You have XX accounts that have not been used in the last 30 days."

    Please include an easy way to show which accounts are not used. The suggested Powershell script does not do the job correctly, and is not very userfriendly.

    Ideally, i would like a notification if a useraccount has been unused for xx days.

    2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Identity Secure Score  ·  Flag idea as inappropriate…  ·  Admin →
  3. Identity Secure score doesn't specify which privilege accounts doesn't have MFA

    Secure score will let you know that 10 or 15 privilege accounts doesn't have MFA without listing these accounts. You have to do a lot of manual work to get these accounts especially Microsoft changes the definition of Privilege accounts and groups.

    Need a clear list to fix.

    2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Identity Secure Score  ·  Flag idea as inappropriate…  ·  Admin →
  4. Include points for security defaults setting into secure score

    Hi there,

    points for the new security defaults settings should be added after switching on into secure score.
    Why? As soon as i deleted the settings of the baseline policies under CA, i lost points within secure score and after switching on security defaults no points were added.

    Best
    Martin

    1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Identity Secure Score  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

Feedback and Knowledge Base