Dashboard

The Security Dashboard has two parts. The upper part shows you key security related content, while the lower part has a sign-in map displaying where your users sign in from.

Security tiles

  • User accounts: User accounts not logged in last 90 days should be reviewed to ensure that they should still be active, and if not they should be disengaged

  • Guest accounts: Inactive guest accounts should be removed as a guest account with rights can be just as dangerous as a member of the company

  • Multi-factor Authentication: Users without multi factor authentication configured could be a security risk. What will happen if someone guess the correct password to one of these accounts? Break the glass accounts should also have a separate MFA method configured ref https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/security-emergency-access.

  • Administrative privileges: Users with administrative privileges will provide you with information on active Entra ID roles assigned to users or applications

  • Service principals: Service Principals is often used when integrating third party solutions with Entra ID. They have an application id and a secret just as a member user have username and password. These Service Principals skips all security measures such as conditional access and the can be used from everywhere. Giving these "users" high permissions, such as read all mailboxes, create users and such means that you should monitor usage of these Service Principals. Where do the sign in from and did you know that these permissions was given the holder of the application id and the corresponding secret value? Consider adopting Microsoft best practice guidance

Sign in map

Simply a world map showing which countries your member users have successfully signed in from the last 14 days. Look at the map for unwanted sign-ins from specific countries such as i.e Russia or China

Last updated