{"id":24456,"date":"2019-01-16T17:00:18","date_gmt":"2019-01-16T17:00:18","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/"},"modified":"2019-01-16T17:00:18","modified_gmt":"2019-01-16T17:00:18","slug":"step-3-protect-your-identities-top-10-actions-to-secure-your-environment","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/","title":{"rendered":"Step 3. Protect your identities: top 10 actions to secure your environment"},"content":{"rendered":"<p><em>The \u201cTop 10 actions to secure your environment\u201d series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In \u201cStep 3. Protect your identities,\u201d you\u2019ll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts.<\/em><\/p>\n<p>Whether or not you have experienced a security incident in the past, you probably know that it\u2019s not a matter of <em>if<\/em> an attacker will successfully compromise your corporate resources, but <em>when<\/em>. This is what is meant by an \u201cassume breach\u201d mindset. Preventative measures are critical, but in an \u201cassume breach\u201d world, so are detection and rapid response. <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/active-directory-identityprotection\" rel=\"noopener\">Azure Active Directory (Azure AD) Identity Protection<\/a> can help you rapidly uncover anomalies or suspicious incidents and configure policies that will automate a response. With <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/active-directory-privileged-identity-management-configure\" rel=\"noopener\">Azure AD Privileged Identity Management (PIM)<\/a>, you can protect your administrative accounts. The faster you discover a hacker and take back control, the less damage that attacker can do, saving you time, money, and reputation.<\/p>\n<h2>Reduce the time an attacker has access to your network<\/h2>\n<p>Most breaches begin with stolen or guessed user credentials. Once hackers gain access, they attempt to escalate those privileges, or they exploit their access to discover and target administrative users with access to valuable data. Rapid detection of a compromised account\u2014no matter its access level\u2014is critical. This can be challenging in a large enterprise with thousands of users.<\/p>\n<p>Azure AD uses machine learning to analyze every sign-in to uncover anomalies or suspicious incidents. It then assigns a risk level of low, medium, or high to indicate how likely it is that the sign-in was not performed by the user. This is called a risk event. Azure AD also analyzes risk events for each user and calculates a risk level of low, medium, or high to indicate how likely it is that a user has been compromised. <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/active-directory-identityprotection\" rel=\"noopener\">Azure AD Identity Protection<\/a> uses this data to generate reports and alerts that can be viewed from a dashboard (Figure 1) in the <a target=\"_blank\" href=\"https:\/\/ms.portal.azure.com\/#home\" rel=\"noopener\">Azure portal<\/a> or by enabling daily or weekly emails.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-88033 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1.png\" alt=\"\" width=\"1100\" height=\"522\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1.png 1100w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1-300x142.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1-768x364.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1-1024x486.png 1024w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1-330x157.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1-800x380.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-1-400x190.png 400w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\"\/><\/p>\n<p><em>Figure 1. Azure AD Identity Protection reports users who are likely compromised.<\/em><\/p>\n<h2>Automate response with Azure AD risk-based conditional access policies<\/h2>\n<p>In addition to reporting, Azure AD Identity Protection also lets you configure policies to automate a response based on conditions you define. A <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/identity-protection\/howto-sign-in-risk-policy\" rel=\"noopener\">sign-in risk policy<\/a> is a conditional access policy that you can configure based on the risk level assigned to a sign-in (Figure 2). A <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/active-directory-identityprotection\" rel=\"noopener\">user risk policy<\/a> is a conditional access policy that you can configure based on the likelihood that a user has been compromised. For example, we recommend that you create a sign-in risk policy that forces all medium-risk sign-ins to use <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/azure\/multi-factor-authentication\/multi-factor-authentication\" rel=\"noopener\">Multi-Factor Authentication (MFA).<\/a> We also recommend users with a high-risk level be required to safely change their password after verifying their identity using MFA. In both instances, these policies will be enforced automatically without any intervention by an administrator. (We\u2019ll go into more details about Azure AD conditional access policies in our next blog.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-88036 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-2.png\" alt=\"\" width=\"841\" height=\"570\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-2.png 841w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-2-300x203.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-2-768x521.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-2-330x224.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-2-800x542.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-2-400x271.png 400w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\"\/><\/p>\n<p><em>Figure 2. Apply a policy that blocks or flags risky sign-ins.<\/em><\/p>\n<h2>Protect your administrative accounts with Azure AD PIM<\/h2>\n<p>Even with good detection and response tools, there is still a chance that a hacker will make it through your defenses. In those instances, you need to minimize the likelihood that a compromised account can operate with a privileged role. <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/active-directory-privileged-identity-management-configure\" rel=\"noopener\">Azure AD PIM<\/a> gives you visibility into the users assigned to administrative roles and allows you to establish rules and policies that govern those accounts. Once you\u2019ve identified the users, you can remove users who don\u2019t need privileged access and move remaining user permissions set from permanent to eligible (Figure 3). A user who is eligible for administrative access must request access every time they wish to perform a privileged task. We recommend that you enable MFA for all privileged roles, so you can verify their identity. We also recommend that you establish time limits for administrator access. Users should only have access long enough to complete the privileged task. These steps will make it much more difficult for a hacker to gain access to your most valuable data and resources.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-88039 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-3.png\" alt=\"\" width=\"583\" height=\"410\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-3.png 583w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-3-300x211.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-3-330x232.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/01\/Step-3-Protect-your-identities-3-400x281.png 400w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\"\/><\/p>\n<p><em>Figure 3. Protect administrative roles by setting users to \u201cEligible.\u201d<\/em><\/p>\n<p><strong>Learn more<\/strong><\/p>\n<p>Check back in a few weeks for our next blog post, \u201cStep 4. Set conditional access policies,\u201d where we\u2019ll dive into additional conditional access policies you can apply to your identities to ensure that only authorized people access the appropriate data and apps.<\/p>\n<p><strong>Get deployment help now<\/strong><\/p>\n<p>FastTrack for Microsoft 365 provides end-to-end guidance to set up your security products. FastTrack is a deployment and adoption service that comes at no charge with your subscription. <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/fasttrack\/microsoft-365\/security\" rel=\"noopener\">Get started at FastTrack for Microsoft 365<\/a>.<\/p>\n<p><strong>Resources<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2019\/01\/16\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In todays installment, Step 3. Protect your identities, youll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts.<br \/>\nThe post Step 3. Protect your identities: top 10 actions to secure your environment appeared first on Microsoft Secure. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24457,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-24456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Step 3. Protect your identities: top 10 actions to secure your environment 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Step 3. Protect your identities: top 10 actions to secure your environment 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-16T17:00:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"522\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Step 3. Protect your identities: top 10 actions to secure your environment\",\"datePublished\":\"2019-01-16T17:00:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/\"},\"wordCount\":801,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/\",\"name\":\"Step 3. Protect your identities: top 10 actions to secure your environment 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png\",\"datePublished\":\"2019-01-16T17:00:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png\",\"width\":1100,\"height\":522},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Step 3. Protect your identities: top 10 actions to secure your environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Step 3. Protect your identities: top 10 actions to secure your environment 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/","og_locale":"en_US","og_type":"article","og_title":"Step 3. Protect your identities: top 10 actions to secure your environment 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-16T17:00:18+00:00","og_image":[{"width":1100,"height":522,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Step 3. Protect your identities: top 10 actions to secure your environment","datePublished":"2019-01-16T17:00:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/"},"wordCount":801,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/","url":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/","name":"Step 3. Protect your identities: top 10 actions to secure your environment 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png","datePublished":"2019-01-16T17:00:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment.png","width":1100,"height":522},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/step-3-protect-your-identities-top-10-actions-to-secure-your-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Step 3. Protect your identities: top 10 actions to secure your environment"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24456"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24456\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24457"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}