Security operations for privileged accounts in Microsoft Entra ID

The security of business assets depends on the integrity of the privileged accounts that administer your IT systems. Cyber attackers use credential theft attacks and other means to target privileged accounts and gain access to sensitive data.

Traditionally, organizational security has focused on the entry and exit points of a network as the security perimeter. However, software as a service (SaaS) applications and personal devices on the internet have made this approach less effective.

Microsoft Entra ID uses identity and access management (IAM) as the control plane. In your organization's identity layer, users assigned to privileged administrative roles are in control. The accounts used for access must be protected, whether the environment is on-premises, in the cloud, or a hybrid environment.

You're entirely responsible for all layers of security for your on-premises IT environment. When you use Azure services, prevention and response are the joint responsibilities of Microsoft as the cloud service provider and you as the customer.

Log files to monitor

The log files you use for investigation and monitoring are:

From the Azure portal, you can view the Microsoft Entra audit logs and download as comma-separated value (CSV) or JavaScript Object Notation (JSON) files. The Azure portal has several ways to integrate Microsoft Entra logs with other tools that allow for greater automation of monitoring and alerting:

  • Microsoft Sentinel. Enables intelligent security analytics at the enterprise level by providing security information and event management (SIEM) capabilities.

  • Sigma rules - Sigma is an evolving open standard for writing rules and templates that automated management tools can use to parse log files. Where Sigma templates exist for our recommended search criteria, we have added a link to the Sigma repo. The Sigma templates are not written, tested, and managed by Microsoft. Rather, the repo and templates are created and collected by the worldwide IT security community.

  • Azure Monitor. Enables automated monitoring and alerting of various conditions. Can create or use workbooks to combine data from different sources.

  • Azure Event Hubs integrated with a SIEM. Enables Microsoft Entra logs to be pushed to other SIEMs such as Splunk, ArcSight, QRadar, and Sumo Logic via the Azure Event Hubs integration. For more information, see Stream Microsoft Entra logs to an Azure event hub.

  • Microsoft Defender for Cloud Apps. Enables you to discover and manage apps, govern across apps and resources, and check your cloud apps' compliance.

  • Microsoft Graph. Enables you to export data and use Microsoft Graph to do more analysis. For more information, see Microsoft Graph PowerShell SDK and Microsoft Entra ID Protection.

  • Identity Protection. Generates three key reports you can use to help with your investigation:

    • Risky users. Contains information about which users are at risk, details about detections, history of all risky sign-ins, and risk history.

    • Risky sign-ins. Contains information about a sign-in that might indicate suspicious circumstances. For more information on investigating information from this report, see Investigate risk.

    • Risk detections. Contains information about other risks triggered when a risk is detected and other pertinent information such as sign-in location and any details from Microsoft Defender for Cloud Apps.

  • Securing workload identities with Identity Protection Preview. Use to detect risk on workload identities across sign-in behavior and offline indicators of compromise.

Although we discourage the practice, privileged accounts can have standing administration rights. If you choose to use standing privileges, and the account is compromised, it can have a strongly negative effect. We recommend you prioritize monitoring privileged accounts and include the accounts in your Privileged Identity Management (PIM) configuration. For more information on PIM, see Start using Privileged Identity Management. Also, we recommend you validate that admin accounts:

  • Are required.
  • Have the least privilege to execute the require activities.
  • Are protected with multifactor authentication at a minimum.
  • Are run from privileged access workstation (PAW) or secure admin workstation (SAW) devices.

The rest of this article describes what we recommend you monitor and alert on. The article is organized by the type of threat. Where there are specific prebuilt solutions, we link to them following the table. Otherwise, you can build alerts by using the tools described above.

This article provides details on setting baselines and auditing sign-in and usage of privileged accounts. It also discusses tools and resources you can use to help maintain the integrity of your privileged accounts. The content is organized into the following subjects:

  • Emergency "break-glass" accounts
  • Privileged account sign-in
  • Privileged account changes
  • Privileged groups
  • Privilege assignment and elevation

Emergency access accounts

It's important that you prevent being accidentally locked out of your Microsoft Entra tenant. You can mitigate the effect of an accidental lockout by creating emergency access accounts in your organization. Emergency access accounts are also known as break-glass accounts, as in "break glass in case of emergency" messages found on physical security equipment like fire alarms.

Emergency access accounts are highly privileged, and they aren't assigned to specific individuals. Emergency access accounts are limited to emergency or break-glass scenarios where normal privileged accounts can't be used. An example is when a Conditional Access policy is misconfigured and locks out all normal administrative accounts. Restrict emergency account use to only the times when it's absolutely necessary.

For guidance on what to do in an emergency, see Secure access practices for administrators in Microsoft Entra ID.

Send a high-priority alert every time an emergency access account is used.

Discovery

Because break-glass accounts are only used if there's an emergency, your monitoring should discover no account activity. Send a high-priority alert every time an emergency access account is used or changed. Any of the following events might indicate a bad actor is trying to compromise your environments:

  • Sign-in.
  • Account password change.
  • Account permission or roles changed.
  • Credential or auth method added or changed.

For more information on managing emergency access accounts, see Manage emergency access admin accounts in Microsoft Entra ID. For detailed information on creating an alert for an emergency account, see Create an alert rule.

Privileged account sign-in

Monitor all privileged account sign-in activity by using the Microsoft Entra sign-in logs as the data source. In addition to sign-in success and failure information, the logs contain the following details:

  • Interrupts
  • Device
  • Location
  • Risk
  • Application
  • Date and time
  • Is the account disabled
  • Lockout
  • MFA fraud
  • Conditional Access failure

Things to monitor

You can monitor privileged account sign-in events in the Microsoft Entra sign-in logs. Alert on and investigate the following events for privileged accounts.

What to monitor Risk level Where Filter/subfilter Notes
Sign-in failure, bad password threshold High Microsoft Entra sign-in log Status = Failure
-and-
error code = 50126
Define a baseline threshold and then monitor and adjust to suit your organizational behaviors and limit false alerts from being generated.
Microsoft Sentinel template

Sigma rules
Failure because of Conditional Access requirement High Microsoft Entra sign-in log Status = Failure
-and-
error code = 53003
-and-
Failure reason = Blocked by Conditional Access
This event can be an indication an attacker is trying to get into the account.
Microsoft Sentinel template

Sigma rules
Privileged accounts that don't follow naming policy Azure subscription List Azure role assignments using the Azure portal List role assignments for subscriptions and alert where the sign-in name doesn't match your organization's format. An example is the use of ADM_ as a prefix.
Interrupt High, medium Microsoft Entra Sign-ins Status = Interrupted
-and-
error code = 50074
-and-
Failure reason = Strong auth required
Status = Interrupted
-and-
Error code = 500121
Failure reason = Authentication failed during strong authentication request
This event can be an indication an attacker has the password for the account but can't pass the multi-factor authentication challenge.
Microsoft Sentinel template

Sigma rules
Privileged accounts that don't follow naming policy High Microsoft Entra directory List Microsoft Entra role assignments List role assignments for Microsoft Entra roles and alert where the UPN doesn't match your organization's format. An example is the use of ADM_ as a prefix.
Discover privileged accounts not registered for multi-factor authentication High Microsoft Graph API Query for IsMFARegistered eq false for admin accounts. List credentialUserRegistrationDetails - Microsoft Graph beta Audit and investigate to determine if the event is intentional or an oversight.
Account lockout High Microsoft Entra sign-in log Status = Failure
-and-
error code = 50053
Define a baseline threshold, and then monitor and adjust to suit your organizational behaviors and limit false alerts from being generated.
Microsoft Sentinel template

Sigma rules
Account disabled or blocked for sign-ins Low Microsoft Entra sign-in log Status = Failure
-and-
Target = User UPN
-and-
error code = 50057
This event could indicate someone is trying to gain access to an account after they've left the organization. Although the account is blocked, it's still important to log and alert on this activity.
Microsoft Sentinel template

Sigma rules
MFA fraud alert or block High Microsoft Entra sign-in log/Azure Log Analytics Sign-ins>Authentication details Result details = MFA denied, fraud code entered Privileged user has indicated they haven't instigated the multi-factor authentication prompt, which could indicate an attacker has the password for the account.
Microsoft Sentinel template

Sigma rules
MFA fraud alert or block High Microsoft Entra audit log log/Azure Log Analytics Activity type = Fraud reported - User is blocked for MFA or fraud reported - No action taken (based on tenant-level settings for fraud report) Privileged user has indicated they haven't instigated the multi-factor authentication prompt, which could indicate an attacker has the password for the account.
Microsoft Sentinel template

Sigma rules
Privileged account sign-ins outside of expected controls Microsoft Entra sign-in log Status = Failure
UserPricipalName = <Admin account>
Location = <unapproved location>
IP address = <unapproved IP>
Device info = <unapproved Browser, Operating System>
Monitor and alert on any entries that you've defined as unapproved.
Microsoft Sentinel template

Sigma rules
Outside of normal sign-in times High Microsoft Entra sign-in log Status = Success
-and-
Location =
-and-
Time = Outside of working hours
Monitor and alert if sign-ins occur outside of expected times. It's important to find the normal working pattern for each privileged account and to alert if there are unplanned changes outside of normal working times. Sign-ins outside of normal working hours could indicate compromise or possible insider threats.
Microsoft Sentinel template

Sigma rules
Identity protection risk High Identity Protection logs Risk state = At risk
-and-
Risk level = Low, medium, high
-and-
Activity = Unfamiliar sign-in/TOR, and so on
This event indicates there's some abnormality detected with the sign-in for the account and should be alerted on.
Password change High Microsoft Entra audit logs Activity actor = Admin/self-service
-and-
Target = User
-and-
Status = Success or failure
Alert on any admin account password changes, especially for global admins, user admins, subscription admins, and emergency access accounts. Write a query targeted at all privileged accounts.
Microsoft Sentinel template

Sigma rules
Change in legacy authentication protocol High Microsoft Entra sign-in log Client App = Other client, IMAP, POP3, MAPI, SMTP, and so on
-and-
Username = UPN
-and-
Application = Exchange (example)
Many attacks use legacy authentication, so if there's a change in auth protocol for the user, it could be an indication of an attack.
Microsoft Sentinel template

Sigma rules
New device or location High Microsoft Entra sign-in log Device info = Device ID
-and-
Browser
-and-
OS
-and-
Compliant/Managed
-and-
Target = User
-and-
Location
Most admin activity should be from privileged access devices, from a limited number of locations. For this reason, alert on new devices or locations.
Microsoft Sentinel template

Sigma rules
Audit alert setting is changed High Microsoft Entra audit logs Service = PIM
-and-
Category = Role management
-and-
Activity = Disable PIM alert
-and-
Status = Success
Changes to a core alert should be alerted if unexpected.
Microsoft Sentinel template

Sigma rules
Administrators authenticating to other Microsoft Entra tenants Medium Microsoft Entra sign-in log Status = success

Resource tenantID != Home Tenant ID
When scoped to Privileged Users, this monitor detects when an administrator has successfully authenticated to another Microsoft Entra tenant with an identity in your organization's tenant.

Alert if Resource TenantID isn't equal to Home Tenant ID
Microsoft Sentinel template

Sigma rules
Admin User state changed from Guest to Member Medium Microsoft Entra audit logs Activity: Update user

Category: UserManagement

UserType changed from Guest to Member
Monitor and alert on change of user type from Guest to Member.

Was this change expected?
Microsoft Sentinel template

Sigma rules
Guest users invited to tenant by non-approved inviters Medium Microsoft Entra audit logs Activity: Invite external user

Category: UserManagement

Initiated by (actor): User Principal Name
Monitor and alert on non-approved actors inviting external users.
Microsoft Sentinel template

Sigma rules

Changes by privileged accounts

Monitor all completed and attempted changes by a privileged account. This data enables you to establish what's normal activity for each privileged account and alert on activity that deviates from the expected. The Microsoft Entra audit logs are used to record this type of event. For more information on Microsoft Entra audit logs, see Audit logs in Microsoft Entra ID.

Microsoft Entra Domain Services

Privileged accounts that have been assigned permissions in Microsoft Entra Domain Services can perform tasks for Microsoft Entra Domain Services that affect the security posture of your Azure-hosted virtual machines that use Microsoft Entra Domain Services. Enable security audits on virtual machines and monitor the logs. For more information on enabling Microsoft Entra Domain Services audits and for a list of sensitive privileges, see the following resources:

What to monitor Risk level Where Filter/subfilter Notes
Attempted and completed changes High Microsoft Entra audit logs Date and time
-and-
Service
-and-
Category and name of the activity (what)
-and-
Status = Success or failure
-and-
Target
-and-
Initiator or actor (who)
Any unplanned changes should be alerted on immediately. These logs should be retained to help with any investigation. Any tenant-level changes should be investigated immediately (link out to Infra doc) that would lower the security posture of your tenant. An example is excluding accounts from multifactor authentication or Conditional Access. Alert on any additions or changes to applications. See Microsoft Entra security operations guide for Applications.
Example
Attempted or completed change to high-value apps or services
High Audit log Service
-and-
Category and name of the activity
Date and time, Service, Category and name of the activity, Status = Success or failure, Target, Initiator or actor (who)
Privileged changes in Microsoft Entra Domain Services High Microsoft Entra Domain Services Look for event 4673 Enable security audits for Microsoft Entra Domain Services
For a list of all privileged events, see Audit Sensitive Privilege use.

Changes to privileged accounts

Investigate changes to privileged accounts' authentication rules and privileges, especially if the change provides greater privilege or the ability to perform tasks in your Microsoft Entra environment.

What to monitor Risk level Where Filter/subfilter Notes
Privileged account creation Medium Microsoft Entra audit logs Service = Core Directory
-and-
Category = User management
-and-
Activity type = Add user
-correlate with-
Category type = Role management
-and-
Activity type = Add member to role
-and-
Modified properties = Role.DisplayName
Monitor creation of any privileged accounts. Look for correlation that's of a short time span between creation and deletion of accounts.
Microsoft Sentinel template

Sigma rules
Changes to authentication methods High Microsoft Entra audit logs Service = Authentication Method
-and-
Activity type = User registered security information
-and-
Category = User management
This change could be an indication of an attacker adding an auth method to the account so they can have continued access.
Microsoft Sentinel template

Sigma rules
Alert on changes to privileged account permissions High Microsoft Entra audit logs Category = Role management
-and-
Activity type = Add eligible member (permanent)
-or-
Activity type = Add eligible member (eligible)
-and-
Status = Success or failure
-and-
Modified properties = Role.DisplayName
This alert is especially for accounts being assigned roles that aren't known or are outside of their normal responsibilities.

Sigma rules
Unused privileged accounts Medium Microsoft Entra access reviews Perform a monthly review for inactive privileged user accounts.
Sigma rules
Accounts exempt from Conditional Access High Azure Monitor Logs
-or-
Access Reviews
Conditional Access = Insights and reporting Any account exempt from Conditional Access is most likely bypassing security controls and is more vulnerable to compromise. Break-glass accounts are exempt. See information on how to monitor break-glass accounts later in this article.
Addition of a Temporary Access Pass to a privileged account High Microsoft Entra audit logs Activity: Admin registered security info

Status Reason: Admin registered temporary access pass method for user

Category: UserManagement

Initiated by (actor): User Principal Name

Target: User Principal Name
Monitor and alert on a Temporary Access Pass being created for a privileged user.
Microsoft Sentinel template

Sigma rules

For more information on how to monitor for exceptions to Conditional Access policies, see Conditional Access insights and reporting.

For more information on discovering unused privileged accounts, see Create an access review of Microsoft Entra roles in Privileged Identity Management.

Assignment and elevation

Having privileged accounts that are permanently provisioned with elevated abilities can increase the attack surface and risk to your security boundary. Instead, employ just-in-time access by using an elevation procedure. This type of system allows you to assign eligibility for privileged roles. Admins elevate their privileges to those roles only when they perform tasks that need those privileges. Using an elevation process enables you to monitor elevations and non-use of privileged accounts.

Establish a baseline

To monitor for exceptions, you must first create a baseline. Determine the following information for these elements

  • Admin accounts

    • Your privileged account strategy
    • Use of on-premises accounts to administer on-premises resources
    • Use of cloud-based accounts to administer cloud-based resources
    • Approach to separating and monitoring administrative permissions for on-premises and cloud-based resources
  • Privileged role protection

    • Protection strategy for roles that have administrative privileges
    • Organizational policy for using privileged accounts
    • Strategy and principles for maintaining permanent privilege versus providing time-bound and approved access

The following concepts and information help determine policies:

  • Just-in-time admin principles. Use the Microsoft Entra logs to capture information for performing administrative tasks that are common in your environment. Determine the typical amount of time needed to complete the tasks.
  • Just-enough admin principles. Determine the least-privileged role, which might be a custom role, that's needed for administrative tasks. For more information, see Least privileged roles by task in Microsoft Entra ID.
  • Establish an elevation policy. After you have insight into the type of elevated privilege needed and how long is needed for each task, create policies that reflect elevated privileged usage for your environment. As an example, define a policy to limit Global Administrator access to one hour.

After you establish your baseline and set policy, you can configure monitoring to detect and alert usage outside of policy.

Discovery

Pay particular attention to and investigate changes in assignment and elevation of privilege.

Things to monitor

You can monitor privileged account changes by using Microsoft Entra audit logs and Azure Monitor logs. Include the following changes in your monitoring process.

What to monitor Risk level Where Filter/subfilter Notes
Added to eligible privileged role High Microsoft Entra audit logs Service = PIM
-and-
Category = Role management​
-and-
Activity type = Add member to role completed (eligible)
-and-
Status = Success or failure​
-and-
Modified properties = Role.DisplayName
Any account eligible for a role is now being given privileged access. If the assignment is unexpected or into a role that isn't the responsibility of the account holder, investigate.
Microsoft Sentinel template

Sigma rules
Roles assigned out of PIM High Microsoft Entra audit logs Service = PIM
-and-
Category = Role management​
-and-
Activity type = Add member to role (permanent)
-and-
Status = Success or failure
-and-
Modified properties = Role.DisplayName
These roles should be closely monitored and alerted. Users shouldn't be assigned roles outside of PIM where possible.
Microsoft Sentinel template

Sigma rules
Elevations Medium Microsoft Entra audit logs Service = PIM
-and-
Category = Role management
-and-
Activity type = Add member to role completed (PIM activation)
-and-
Status = Success or failure
-and-
Modified properties = Role.DisplayName
After a privileged account is elevated, it can now make changes that could affect the security of your tenant. All elevations should be logged and, if happening outside of the standard pattern for that user, should be alerted and investigated if not planned.
Approvals and deny elevation Low Microsoft Entra audit logs Service = Access Review
-and-
Category = UserManagement
-and-
Activity type = Request approved or denied
-and-
Initiated actor = UPN
Monitor all elevations because it could give a clear indication of the timeline for an attack.
Microsoft Sentinel template

Sigma rules
Changes to PIM settings High Microsoft Entra audit logs Service = PIM
-and-
Category = Role management
-and-
Activity type = Update role setting in PIM
-and-
Status reason = MFA on activation disabled (example)
One of these actions could reduce the security of the PIM elevation and make it easier for attackers to acquire a privileged account.
Microsoft Sentinel template

Sigma rules
Elevation not occurring on SAW/PAW High Microsoft Entra sign-in logs Device ID
-and-
Browser
-and-
OS
-and-
Compliant/Managed
Correlate with:
Service = PIM
-and-
Category = Role management
-and-
Activity type = Add member to role completed (PIM activation)
-and-
Status = Success or failure
-and-
Modified properties = Role.DisplayName
If this change is configured, any attempt to elevate on a non-PAW/SAW device should be investigated immediately because it could indicate an attacker is trying to use the account.
Sigma rules
Elevation to manage all Azure subscriptions High Azure Monitor Activity Log tab
Directory Activity tab
Operations Name = Assigns the caller to user access admin
-and-
Event category = Administrative
-and-
Status = Succeeded, start, fail
-and-
Event initiated by
This change should be investigated immediately if it isn't planned. This setting could allow an attacker access to Azure subscriptions in your environment.

For more information about managing elevation, see Elevate access to manage all Azure subscriptions and management groups. For information on monitoring elevations by using information available in the Microsoft Entra logs, see Azure Activity log, which is part of the Azure Monitor documentation.

For information about configuring alerts for Azure roles, see Configure security alerts for Azure resource roles in Privileged Identity Management.

Next steps

See these security operations guide articles:

Microsoft Entra security operations overview

Security operations for user accounts

Security operations for consumer accounts

Security operations for Privileged Identity Management

Security operations for applications

Security operations for devices

Security operations for infrastructure