Configure security alerts for Azure AD roles in Privileged Identity Management
Privileged Identity Management (PIM) generates alerts when there's suspicious or unsafe activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra. When an alert is triggered, it shows up on the Privileged Identity Management dashboard. Select the alert to see a report that lists the users or roles that triggered the alert.
Security alerts
This section lists all the security alerts for Azure AD roles, along with how to fix and how to prevent. Severity has the following meaning:
- High: Requires immediate action because of a policy violation.
- Medium: Doesn't require immediate action but signals a potential policy violation.
- Low: Doesn't require immediate action but suggests a preferable policy change.
Administrators aren't using their privileged roles
Severity: Low
Description | |
---|---|
Why do I get this alert? | Users that have been assigned privileged roles they don't need increases the chance of an attack. It's also easier for attackers to remain unnoticed in accounts that aren't actively being used. |
How to fix? | Review the users in the list and remove them from privileged roles that they don't need. |
Prevention | Assign privileged roles only to users who have a business justification. Schedule regular access reviews to verify that users still need their access. |
In-portal mitigation action | Removes the account from their privileged role. |
Trigger | Triggered if a user goes over a specified number of days without activating a role. |
Number of days | This setting specifies the maximum number of days, from 0 to 100, that a user can go without activating a role. |
Roles don't require multi-factor authentication for activation
Severity: Low
Description | |
---|---|
Why do I get this alert? | Without multi-factor authentication, compromised users can activate privileged roles. |
How to fix? | Review the list of roles and require multi-factor authentication for every role. |
Prevention | Require MFA for every role. |
In-portal mitigation action | Makes multi-factor authentication required for activation of the privileged role. |
The organization doesn't have Azure AD Premium P2
Severity: Low
Description | |
---|---|
Why do I get this alert? | The current Azure AD organization doesn't have Azure AD Premium P2. |
How to fix? | Review information about Azure AD editions. Upgrade to Azure AD Premium P2. |
Potential stale accounts in a privileged role
Severity: Medium
Description | |
---|---|
Why do I get this alert? | This alert is no longer triggered based on the last password change date of for an account. This alert is for accounts in a privileged role that haven't signed in during the past n days, where n is a number of days that is configurable between 1-365 days. These accounts might be service or shared accounts that aren't being maintained and are vulnerable to attackers. |
How to fix? | Review the accounts in the list. If they no longer need access, remove them from their privileged roles. |
Prevention | Ensure that accounts that are shared are rotating strong passwords when there's a change in the users that know the password. Regularly review accounts with privileged roles using access reviews and remove role assignments that are no longer needed. |
In-portal mitigation action | Removes the account from their privileged role. |
Best practices | Shared, service, and emergency access accounts that authenticate using a password and are assigned to highly privileged administrative roles such as Global administrator or Security administrator should have their passwords rotated for the following cases:
|
Roles are being assigned outside of Privileged Identity Management
Severity: High
Description | |
---|---|
Why do I get this alert? | Privileged role assignments made outside of Privileged Identity Management aren't properly monitored and may indicate an active attack. |
How to fix? | Review the users in the list and remove them from privileged roles assigned outside of Privileged Identity Management. You can also enable or disable both the alert and its accompanying email notification in the alert settings. |
Prevention | Investigate where users are being assigned privileged roles outside of Privileged Identity Management and prohibit future assignments from there. |
In-portal mitigation action | Removes the user from their privileged role. |
There are too many global administrators
Severity: Low
Description | |
---|---|
Why do I get this alert? | Global administrator is the highest privileged role. If a Global Administrator is compromised, the attacker gains access to all of their permissions, which puts your whole system at risk. |
How to fix? | Review the users in the list and remove any that don't absolutely need the Global administrator role. Assign lower privileged roles to these users instead. |
Prevention | Assign users the least privileged role they need. |
In-portal mitigation action | Removes the account from their privileged role. |
Trigger | Triggered if two different criteria are met, and you can configure both of them. First, you need to reach a certain threshold of Global administrator role assignments. Second, a certain percentage of your total role assignments must be Global administrators. If you only meet one of these measurements, the alert doesn't appear. |
Minimum number of Global Administrators | This setting specifies the number of Global Administrator role assignments, from 2 to 100, that you consider to be too few for your Azure AD organization. |
Percentage of Global Administrators | This setting specifies the minimum percentage of administrators who are Global administrators, from 0% to 100%, below which you do not want your Azure AD organization to dip. |
Roles are being activated too frequently
Severity: Low
Description | |
---|---|
Why do I get this alert? | Multiple activations to the same privileged role by the same user is a sign of an attack. |
How to fix? | Review the users in the list and ensure that the activation duration for their privileged role is set long enough for them to perform their tasks. |
Prevention | Ensure that the activation duration for privileged roles is set long enough for users to perform their tasks.Require multi-factor authentication for privileged roles that have accounts shared by multiple administrators. |
In-portal mitigation action | N/A |
Trigger | Triggered if a user activates the same privileged role multiple times within a specified period. You can configure both the time period and the number of activations. |
Activation renewal timeframe | This setting specifies in days, hours, minutes, and second the time period you want to use to track suspicious renewals. |
Number of activation renewals | This setting specifies the number of activations, from 2 to 100, at which you would like to be notified, within the timeframe you chose. You can change this setting by moving the slider, or typing a number in the text box. |
Customize security alert settings
Follow these steps to configure security alerts for Azure AD roles in Privileged Identity Management:
Sign in to the Azure portal.
Open Azure AD Privileged Identity Management. For information about how to add the Privileged Identity Management tile to your dashboard, see Start using Privileged Identity Management.
From the left menu, select Azure AD Roles.
From the left menu, select Alerts, and then select Setting.
Customize settings on the different alerts to work with your environment and security goals.
Next steps
Feedback
Submit and view feedback for