Skip to content

Commit 2197034

Browse files
authored
Merge pull request #87612 from curtand/ultravox0905
[Azure AD roles] monitor break glass account alerts
2 parents 7dae459 + 455c04a commit 2197034

File tree

4 files changed

+72
-13
lines changed

4 files changed

+72
-13
lines changed

articles/active-directory/users-groups-roles/directory-emergency-access.md

Lines changed: 72 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22

33
title: Manage emergency access administrator accounts - Azure Active Directory | Microsoft Docs
4-
description: This article describes how to use emergency access accounts to help prevent being inadvertently locked out of your Azure Active Directory (Azure AD) tenant.
4+
description: This article describes how to use emergency access accounts to help prevent being inadvertently locked out of your Azure Active Directory (Azure AD) organization.
55
services: active-directory
66
author: markwahl-msft
77
ms.author: curtand
8-
ms.date: 03/19/2019
8+
ms.date: 09/09/2019
99
ms.topic: conceptual
1010
ms.service: active-directory
1111
ms.subservice: users-groups-roles
@@ -17,13 +17,13 @@ ms.collection: M365-identity-device-management
1717

1818
# Manage emergency access accounts in Azure AD
1919

20-
It is important that you prevent being inadvertently locked out of your Azure Active Directory (Azure AD) tenant because you can't sign in or activate an existing individual user's account as an administrator. You can mitigate the impact of inadvertent lack of administrative access by creating two or more *emergency access accounts* in your tenant.
20+
It is important that you prevent being accidentally locked out of your Azure Active Directory (Azure AD) organization because you can't sign in or activate another user's account as an administrator. You can mitigate the impact of accidental lack of administrative access by creating two or more *emergency access accounts* in your organization.
2121

22-
Emergency access accounts are highly privileged, and they are not assigned to specific individuals. Emergency access accounts are limited to emergency or 'break glass' scenarios where normal administrative accounts cannot be used. Organizations must maintain a goal of restricting the emergency account's usage to only the times when it is absolutely necessary.
22+
Emergency access accounts are highly privileged, and they are not assigned to specific individuals. Emergency access accounts are limited to emergency or "break glass"' scenarios where normal administrative accounts can't be used. We recommend that you maintain a goal of restricting emergency account use to only the times when it is absolutely necessary.
2323

2424
This article provides guidelines for managing emergency access accounts in Azure AD.
2525

26-
## When would you use an emergency access account?
26+
## Why use an emergency access account
2727

2828
An organization might need to use an emergency access account in the following situations:
2929

@@ -32,7 +32,7 @@ An organization might need to use an emergency access account in the following s
3232
- The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it does not prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
3333
- Unforeseen circumstances such as a natural disaster emergency, during which a mobile phone or other networks might be unavailable.
3434

35-
## Create two cloud-based emergency access accounts
35+
## Create emergency access accounts
3636

3737
Create two or more emergency access accounts. These accounts should be cloud-only accounts that use the \*.onmicrosoft.com domain and that are not federated or synchronized from an on-premises environment.
3838

@@ -43,7 +43,6 @@ When configuring these accounts, the following requirements must be met:
4343
- The device or credential must not expire or be in scope of automated cleanup due to lack of use.
4444
- You should make the Global Administrator role assignment permanent for your emergency access accounts.
4545

46-
4746
### Exclude at least one account from phone-based multi-factor authentication
4847

4948
To reduce the risk of an attack resulting from a compromised password, Azure AD recommends that you require multi-factor authentication for all individual users. This group includes administrators and all others (for example, financial officers) whose compromised account would have a significant impact.
@@ -54,24 +53,84 @@ However, at least one of your emergency access accounts should not have the same
5453

5554
During an emergency, you do not want a policy to potentially block your access to fix an issue. At least one emergency access account should be excluded from all Conditional Access policies. If you have enabled a [baseline policy](../conditional-access/baseline-protection.md), you should exclude your emergency access accounts.
5655

57-
## Additional guidance for hybrid customers
56+
## Federation guidance
5857

5958
An additional option for organizations that use AD Domain Services and ADFS or similar identity provider to federate to Azure AD, is to configure an emergency access account whose MFA claim could be supplied by that identity provider. For example, the emergency access account could be backed by a certificate and key pair such as one stored on a smartcard. When that user is authenticated to AD, ADFS can supply a claim to Azure AD indicating that the user has met MFA requirements. Even with this approach, organizations must still have cloud-based emergency access accounts in case federation cannot be established.
6059

61-
## Store devices and credentials in a safe location
60+
## Store account credentials safely
6261

6362
Organizations need to ensure that the credentials for emergency access accounts are kept secure and known only to individuals who are authorized to use them. Some customers use a smartcard and others use passwords. A password for an emergency access account is usually separated into two or three parts, written on separate pieces of paper, and stored in secure, fireproof safes that are in secure, separate locations.
6463

6564
If using passwords, make sure the accounts have strong passwords that do not expire the password. Ideally, the passwords should be at least 16 characters long and randomly generated.
6665

67-
6866
## Monitor sign-in and audit logs
6967

70-
Monitor the [Azure AD sign-in and audit logs](../reports-monitoring/concept-sign-ins.md) for any sign-ins and audit activity from the emergency access accounts. Normally, these accounts should not be signing in and should not be making changes, so use of them is likely to be anomalous and require security investigation.
68+
Organizations should monitor sign-in and audit log activity from the emergency accounts and trigger notifications to other administrators. When you monitor the activity on break glass accounts, you can verify these accounts are only used for testing or actual emergencies. You can use Azure Log Analytics to monitor the sign-in logs and trigger email and SMS alerts to your admins whenever break glass accounts sign in.
69+
70+
### Prerequisites
71+
72+
1. [Send Azure AD sign-in logs](https://docs.microsoft.com/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics) to Azure Monitor.
73+
74+
### Obtain Object IDs of the break glass accounts
75+
76+
1. Sign in to the [Azure portal](https://portal.azure.com) with an account assigned to the User administrator role.
77+
1. Select **Azure Active Directory** > **Users**.
78+
1. Search for the break glass account and select the user’s name.
79+
1. Copy and save the Object ID attribute so that you can use it later.
80+
1. Repeat previous steps for second break glass account.
81+
82+
### Create an alert rule
83+
84+
1. Sign in to the [Azure portal](https://portal.azure.com) with an account assigned to the XXXX role.
85+
1. Select **All services**", enter "log analytics" and select **Log Analytics workspaces**.
86+
1. Select a workspace.
87+
1. In your workspace, select **Alerts** > **New alert rule**.
88+
1. Under **Resource**, verify that the subscription is the one with which you want to associate the alert rule.
89+
1. Under **Condition**, select **Add**.
90+
1. Select **Custom log search** under **Signal name**.
91+
1. Under **Search query**, enter the following query, inserting the object IDs of the two break glass accounts.
92+
> [!NOTE]
93+
> For each additional break glass account you want to include, add another "or UserId == "ObjectGuid"" to the query.
94+
95+
![Add the object IDs of the break glass accounts to an alert rule](./media/directory-emergency-access/query-image1.png)
96+
97+
1. Under **Alert logic**, enter the following:
98+
99+
- Based on: Number of results
100+
- Operator: Greater than
101+
- Threshold value: 0
102+
103+
1. Under **Evaluated based on**, select the **Period (in minutes)** for how long you want the query to run, and the **Frequency (in minutes)** for how often you want the query to run. The frequency should be less than or equal to the period.
104+
105+
![alert logic](./media/directory-emergency-access/alert-image2.png)
106+
107+
1. Select **Done**. You may now view the estimated monthly cost of this alert.
108+
1. Select an action group of users to be notified by the alert. If you want to create one, see [Create an action group](#create-an-action-group).
109+
1. To customize the email notification sent to the members of the action group, select actions under **Customize Actions**.
110+
1. Under **Alert Details**, specify the alert rule name and add an optional description.
111+
1. Set the **Severity level** of the event. We recommend that you set it to **Critical(Sev 0)**.
112+
1. Under **Enable rule upon creation**, leave it set as **yes**.
113+
1. To turn off alerts for a while, select the **Suppress Alerts** check box and enter the wait duration before alerting again, and then select **Save**.
114+
1. Click **Create alert rule**.
115+
116+
### Create an action group
117+
118+
1. Select **Create an action group**.
119+
120+
![create an action group for notification actions](./media/directory-emergency-access/action-group-image3.png)
121+
122+
1. Enter the action group name and a short name.
123+
1. Verify the subscription and resource group.
124+
1. Under action type, select **Email/SMS/Push/Voice**.
125+
1. Enter an action name such as **Notify global admin**.
126+
1. Select the **Action Type** as **Email/SMS/Push/Voice**.
127+
1. Select **Edit details** to select the notification methods you want to configure and enter the required contact information, and then select **Ok** to save the details.
128+
1. Add any additional actions you want to trigger.
129+
1. Select **OK**.
71130

72-
## Validate accounts at regular intervals
131+
## Validate accounts regularly
73132

74-
To train staff members to use emergency access accounts and validate the emergency access accounts, do the following minimum steps at regular intervals:
133+
When you train staff members to use emergency access accounts and validate the emergency access accounts, at minimum do the following steps at regular intervals:
75134

76135
- Ensure that security-monitoring staff are aware that the account-check activity is ongoing.
77136
- Ensure that the emergency break glass process to use these accounts is documented and current.
150 KB
Loading
69 KB
Loading
171 KB
Loading

0 commit comments

Comments
 (0)