Discovery and Insights (preview) for Azure AD roles (formerly Security Wizard)
If you're starting out using Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, to manage role assignments in your organization, you can use the Discovery and insights (preview) page to get started. This feature shows you who is assigned to privileged roles in your organization and how to use PIM to quickly change permanent role assignments into just-in-time assignments. You can view or make changes to your permanent privileged role assignments in Discovery and Insights (preview). It's an analysis tool and an action tool.
Discovery and insights (preview)
Before your organization starts using Privileged Identity Management, all role assignments are permanent. Users are always in their assigned roles even when they don't need their privileges. Discovery and insights (preview), which replaces the former Security Wizard, shows you a list of privileged roles and how many users are currently in those roles. You can list out assignments for a role to learn more about the assigned users if one or more of them are unfamiliar.
✔️ Microsoft recommends that you keep two break glass accounts that are permanently assigned to the global administrator role. Make sure that these accounts don't require the same multi-factor authentication mechanism as your normal administrative accounts to sign in, as described in Manage emergency access accounts in Azure AD.
Also, keep role assignments permanent if a user has a Microsoft account (in other words, an account they use to sign in to Microsoft services like Skype, or Outlook.com). If you require multi-factor authentication for a user with a Microsoft account to activate a role assignment, the user will be locked out.
Open Discovery and insights (preview)
Sign in to the Azure portal.
Open Azure AD Privileged Identity Management.
From the left menu, select Azure AD roles and then select Discovery and insights (Preview). Opening the page begins the discovery process to find relevant role assignments.
Select Reduce global administrators.
Review the list of Global Administrator role assignments.
Select Next to select the users or groups you want to make eligible, and then select Make eligible or Remove assignment.
You can also require all global administrators to review their own access.
After you select any of these changes, you'll see an Azure notification.
You can then select Eliminate standing access or Review service principals to repeat the above steps on other privileged roles and on service principal role assignments. For service principal role assignments, you can only remove role assignments.
Submit and view feedback for