This article describes the Entra ID settings and configuration that should be set to improve security including:
User Default Configurations
Guest Defaults
User Applications Consent and Permissions
Secure Entra ID roles
Privileged Role Membership Protection
Role Assignable Group Configurations
Highly Privileged Applications
Conditional Access Policies
Partner Access
Securing Entra Connect
Secure Entra ID Quickly Checklist
User Default Configurations
Users are able to register applications and create new tenants by default.
These settings should be changed as shown in the below screenshot.
User Defaults Actions:
Set “Users can register applications” from Yes to No
Set “Restrict non-admin users from creating tenants” from No to Yes.
User Device Setting Defaults
Users have the default ability to Entra join devices without requiring MFA.
User Device Setting Actions:
Set “Users may join devices to Microsoft Entra” to “Selected” and add a group that is allowed to join devices to Entra.
Either configure a Conditional Access policy to require MFA when joining devices to Entra or set the configuration “Require Multifactor Authentication to register or join devices with Microsoft Entra” to “Yes”.
Guest Defaults
Guest users have the same ability to view Entra ID
This setting should be changed as shown below.
Guest Defaults Actions:
Change the Guest user access restrictions from “Guest users have the same access as members (most inclusive)” to “Guest user access is restricted to properties and memberships of their own directory objects (most restrictive)”.
User Application Consent and Permission Defaults
Originally in Azure AD/Entra ID, users had default rights to consent to permissions. This configuration persist in many current environments.
This has changed to the following options that are available now.
User Application Consent and Permission Recommendations:
Set user consent for applications to either “Allow user consent for apps from verified publishers, for selected permissions” or the better option which is “Let Microsoft manage your consent settings (Recommended).”
Secure Entra ID Roles
There are 117 Entra ID roles (as of October 2025). This makes it challenging to know what to protect and at what level.
Microsoft has tagged 28 roles as “Privileged“. These roles should be protected, though not at the same level. For example, Global Reader isn’t the same as the Global Administrator role and the level of protection for accounts in Global Administrator should be higher than that of Global Reader.
Tier 0 Entra ID Roles
There are five (5) roles that should be protected at the highest level (like Tier 0). Ensure that members of these roles are required to always use MFA (preferably FIDO2) and the membership is very limited.
“Can create, manage and deploy provisioning configuration setup from Active Directory to Microsoft Entra ID using Cloud Provisioning as well as manage Microsoft Entra Connect, Pass-through Authentication (PTA), Password hash synchronization (PHS), Seamless Single Sign-On (Seamless SSO), and federation settings.”
“The Partner Tier2 Support role can reset passwords and invalidate refresh tokens for all non-administrators and administrators (including Global Administrators). “
“Set or reset any authentication method (including passwords) for any user, including Global Administrators. …Force users to re-register against existing non-password credential (such as MFA or FIDO) and revoke remember MFA on the device, prompting for MFA on the next sign-in of all users.”
“Users with this role can manage role assignments in Microsoft Entra ID, as well as within Microsoft Entra Privileged Identity Management. …This role grants the ability to manage assignments for all Microsoft Entra roles including the Global Administrator role. “
Secure Privileged Role Membership
Ensure there are no standard user accounts as members in highly privileged roles.
Ensure that role members are eligible, not permanent.
Ensure that members are required to use MFA.
Secure Role Assignable Groups (RAGs)
Role Assignable Groups are Security or Microsoft 365 group with the isAssignableToRole property set to true and cannot be dynamic. They were created to solve the potential issue where groups are added to an Entra ID role and a group admin could modify membership. Only Global Administrators or Privileged Role Administrators can create Role Assignable Groups and manage them (membership). Role Assignable Group owners can manage them. There is an application permission (Graph:RoleManagement.ReadWrite.Directory) that provides management rights as well. There is a 500 role-assignable groups maximum in an Entra ID tenant (creation maximum). Only a Privileged Authentication Administrator or a Global Administrator can change the credentials or reset MFA or modify sensitive attributes for members & owners of a role-assignable group.
Group Nesting in Entra ID
Role Assignable Group Owners The owners configured on a role assignable group are able to manage the membership of the group. Ensure that the owners are admin accounts and protected at the same level as the role the role assignable group is a member of.
Secure Highly Privileged Applications
The permission structure for Entra ID permissions:
Tier 0 Applications
These applications have effective full administrative rights or capability to gain full administrative rights to Entra ID. Limit applications that have these permissions.
Allows the app to manage permission grants for application permissions to any API & application assignments for any app, on behalf of the signed-in user. This also allows an application to grant additional privileges to itself, other applications, or any user.
Allows the app to read & manage the role-based access control (RBAC) settings for the tenant, without a signed-in user. This includes instantiating directory roles & managing directory role membership, and reading directory role templates, directory roles and memberships.
Allows the calling app to create, & manage (read, update, update application secrets and delete) applications & service principals without a signed-in user. This also allows an application to act as other entities & use the privileges they were granted.
This application permission is Tier 0 when there is at least 1 application that is Tier 0. Then this permission provides an application the ability to add a credential to that application and impersonate it.
Secure Entra ID with Conditional Access Policies
Conditional Access policies apply after first-factor authentication (user name and password). This requires Entra P1 licensing. Conditional Access takes action based on Who is connecting, Where are they connecting from, What app and/or device to which or from which the connection is taking place, and When this applies.
There are some common Conditional Access policies:
With these typical Conditional Access policies, there are common coverage gaps.
CA Policy Gap #1: Users Require MFA Outside of Corp Network
CAP requires users to MFA when they are working remotely (not on the corporate network or connected via VPN)
Assumes no attacker would be on the corporate network
Attacker can use username/password without having to MFA
CA Policy Gap #2: Admins don’t require MFA
MFA is required for certain users to access specific applications
However, there is no CAP that requires MFA for Admins
Or… CAP only requires members of a few roles use MFA
Attacker can use username/password without having to MFA
CA Policy Gap #3: Exclusions
CAP includes several security controls
MFA required
AAD Joined &Compliant device
Location based access
However, there are exclusions:
Admins
VIPs
Executives
HR
Etc
This creates a significant gap in security posture
Attackers love being excluded from security controls!
A configured partner can have admin rights to a customer tenant (“delegated administration”).
This is provided when the partner requests access to the customer environment.
When the customer accepts this request:
“Admin agent” role in partner tenant is provided effective “Global Administrator” rights to customer tenant.
“Helpdesk Agent” role in partner tenant is provided effective “Helpdesk Administrator” (Password Administrator) rights to customer tenant.
These are the only options.
They apply to all customer environments – there is no granular configuration.
A partner with dozens of customers will result in all partner accounts in these groups having elevated rights in all customer environments.Shift to granular delegated admin privileges (GDAP) ASAP!
Compromise server hosting PTA (typically Entra Connect server)
Entra ID sends the clear-text password (not hashed!) to authenticate the user.
Inject DLL to compromise credentials used for PTA
Securing Pass Through Authentication (PTA)
Treat Entra Connect as a Tier 0 asset (like a Domain Controller)
Secure Entra ID Quickly Checklist
Set “Users can register applications” to No
Set “Restrict non-admin users from creating tenants” to Yes
Set “Users can create security groups” to No
Set Guest user access restrictions to “Guest user access is restricted to properties and memberships of their own directory objects (most restrictive)”
Restrict who can join devices to Microsoft Entra & require MFA
Set Guest invite settings to “Only users assigned to specific admin roles can invite guest users”
Set User consent settings to “Let Microsoft manage your consent settings (Recommended)”
Review Tier 0 role membership and ensure members are admin accounts, are PIM Eligible, & are not synchronized from on-prem
If you’re using Role Assignable Groups, ensure Owners are not set on Tier 0 roles
Scrutinize any applications with Tier 0 Application permissions
Ensure that Conditional Access requires MFA for Tier 0 role members for every authentication, preferably FIDO2/Microsoft Authenticator push (service accounts & service principles excepted).
Remove any standard Delegated Administration and shift to Granular Delegated Admin Privileges (GDAP)
Treat Entra Connect as a Tier 0 asset (like a Domain Controller)
Ensure Cloud Admins are using a separate browser for admin activities (minimum) or connecting to a dedicated cloud admin server (recommended)
Ensure there is at least 1 emergency access admin account configured with a FIDO2 key(s).