Windows 10 reached end of support—need help planning your next step? We’re Here to Help Upgrade to Windows 11

Atten SLG: Identity Controls Beyond MFA

Microsoft-First. Security-First. Human.

MFA ISN’T ENOUGH: 5 IDENTITY CONTROLS COUNTIES CAN IMPLEMENT WITHOUT NEW HEADCOUNT

Most county security incidents start the same way: a login that shouldn’t have worked. MFA is essential—but it’s no longer the finish line. Counties running Microsoft 365 often already have powerful identity protections included in licensing. They just aren’t turned on or configured in the right order.

This is about using what you already own—without adding budget or staffing.


WHY IDENTITY IS YOUR MOST IMPORTANT SECURITY LAYER

Identity is the new perimeter. County employees sign in from home networks, personal devices, field locations, and everywhere in between. When attackers compromise an account, they don’t look like attackers — they look like a legitimate employee with access to email, files, and systems.

The good news: you likely already have the tools you need.

5 HIGH-IMPACT IDENTITY CONTROLS FOR COUNTY IT TEAMS

CONDITIONAL ACCESS

Conditional Access policies block or challenge suspicious logins based on location, device, or sign-in risk.

QUICK STEP

  • Block legacy authentication
  • Require MFA for admin roles

LEAST PRIVILEGE ACCESS

Administrative access should be rare, role-based, and temporary. Permanent admin privileges create unnecessary risk.

QUICK STEP

Review all global admin accounts and remove any without a documented operational need.

SEPARATE ADMIN ACCOUNTS

IT staff should use dedicated administrative accounts for elevated tasks, separate from their everyday email accounts.

DISABLE LEGACY AUTHENTICATION

Legacy protocols bypass modern security protections and should be disabled wherever possible.

MONITOR SIGN-IN RISK

Regularly review Microsoft Entra ID sign-in logs and risk alerts to identify suspicious activity early.

WHY THIS IS ACHIEVABLE

These controls are configuration changes—not large projects. Most organizations can implement them incrementally, starting with the highest-impact improvements.

Security posture improves fastest when organizations start with a clear baseline.

READY TO SEE WHERE YOU STAND?

Start with a conversation, or run a quick baseline to understand your current risk posture and improvement opportunities.

Covenant Technology Solutions | Connecting to what matters… securely

Scroll to Top