US Cyber Agency Urges Firms to Adopt Microsoft Intune Security Best Practices
US Urges Firms to Adopt Microsoft Intune Security Best Practices

US Cybersecurity Agency Issues Urgent Advisory Following Major Medical Device Hack

The United States government has issued a critical advisory urging organizations to immediately implement newly released best practices for securing Microsoft Intune, a widely used endpoint management system. This directive comes from the Cybersecurity and Infrastructure Security Agency (CISA) in response to a significant cyberattack last week that targeted Stryker Corporation, America's largest medical device manufacturer, by hackers linked to Iran.

Attack Details and CISA's Response

The cyberattack disrupted Stryker's services for over five days, impacting their Microsoft environment. In an official statement, CISA noted, "CISA is aware of malicious cyber activity targeting endpoint management systems of U.S. organizations based on the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment." To combat similar threats, the agency strongly advises hardening endpoint management system configurations using the recommendations outlined in the alert.

Key Security Recommendations for Organizations

The advisory emphasizes that these principles can be applied not only to Microsoft Intune but also broadly to other endpoint management software. Key recommendations include:

Wide Pickt banner — collaborative shopping lists app for Telegram, phone mockup with grocery list
  • Implement Least Privilege Principles: Design administrative roles with minimal necessary permissions to reduce attack surfaces.
  • Leverage Role-Based Access Control (RBAC): Use Microsoft Intune's RBAC to assign precise permissions for actions, users, and devices, ensuring each role has only what is needed for daily operations.
  • Enforce Phishing-Resistant Multi-Factor Authentication (MFA): Utilize Microsoft Entra ID capabilities, such as Conditional Access and risk signals, to block unauthorized access to privileged actions in Intune.
  • Configure Multi Admin Approval Policies: Set up access policies requiring a second administrative account's approval for sensitive actions like device wiping or configuration changes.

Enhanced Coordination and Additional Resources

CISA is actively conducting enhanced coordination with federal partners, including the Federal Bureau of Investigation (FBI), to identify further threats and determine mitigation strategies. In addition to strengthening Microsoft systems, the agency recommends reviewing specific resources:

  • Microsoft Resources: Best practices for securing Microsoft Intune, guidance on Multi Admin Approval, zero trust configurations, RBAC policies, and Privileged Identity Management deployment.
  • CISA Resources: Guidance on implementing phishing-resistant MFA to bolster defenses against similar malicious activities.

This advisory underscores the growing importance of robust cybersecurity measures in protecting critical infrastructure and organizational data from sophisticated cyber threats.

Pickt after-article banner — collaborative shopping lists app with family illustration