Skip to content

Commit 427c7a0

Browse files
authored
Merge pull request #206367 from yoelhor/patch-288
[Azure AD PIM] Adding the missing steps
2 parents 3a9e7d3 + 6b4a812 commit 427c7a0

File tree

3 files changed

+50
-32
lines changed

3 files changed

+50
-32
lines changed

articles/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts.md

Lines changed: 26 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -11,34 +11,34 @@ ms.service: active-directory
1111
ms.topic: how-to
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 06/24/2022
14+
ms.date: 07/29/2022
1515
ms.author: amsliu
1616
ms.reviewer: shaunliu
1717
ms.custom: pim
1818
ms.collection: M365-identity-device-management
1919
---
2020
# Configure security alerts for Azure AD roles in Privileged Identity Management
2121

22-
Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra. When an alert is triggered, it shows up on the Privileged Identity Management dashboard. Select the alert to see a report that lists the users or roles that triggered the alert.
22+
Privileged Identity Management (PIM) generates alerts when there's suspicious or unsafe activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra. When an alert is triggered, it shows up on the Privileged Identity Management dashboard. Select the alert to see a report that lists the users or roles that triggered the alert.
2323

24-
![Screenshot that shows the "Alerts" page with a list of alerts and their severity.](./media/pim-how-to-configure-security-alerts/view-alerts.png)
24+
![Screenshot that shows the alerts page with a list of alerts and their severity.](./media/pim-how-to-configure-security-alerts/view-alerts.png)
2525

2626
## Security alerts
2727

2828
This section lists all the security alerts for Azure AD roles, along with how to fix and how to prevent. Severity has the following meaning:
2929

3030
- **High**: Requires immediate action because of a policy violation.
31-
- **Medium**: Does not require immediate action but signals a potential policy violation.
32-
- **Low**: Does not require immediate action but suggests a preferable policy change.
31+
- **Medium**: Doesn't require immediate action but signals a potential policy violation.
32+
- **Low**: Doesn't require immediate action but suggests a preferable policy change.
3333

3434
### Administrators aren't using their privileged roles
3535

3636
Severity: **Low**
3737

3838
| | Description |
3939
| --- | --- |
40-
| **Why do I get this alert?** | Users that have been assigned privileged roles they don't need increases the chance of an attack. It is also easier for attackers to remain unnoticed in accounts that are not actively being used. |
41-
| **How to fix?** | Review the users in the list and remove them from privileged roles that they do not need. |
40+
| **Why do I get this alert?** | Users that have been assigned privileged roles they don't need increases the chance of an attack. It's also easier for attackers to remain unnoticed in accounts that aren't actively being used. |
41+
| **How to fix?** | Review the users in the list and remove them from privileged roles that they don't need. |
4242
| **Prevention** | Assign privileged roles only to users who have a business justification. </br>Schedule regular [access reviews](./pim-create-azure-ad-roles-and-resource-roles-review.md) to verify that users still need their access. |
4343
| **In-portal mitigation action** | Removes the account from their privileged role. |
4444
| **Trigger** | Triggered if a user goes over a specified number of days without activating a role. |
@@ -61,7 +61,7 @@ Severity: **Low**
6161

6262
| | Description |
6363
| --- | --- |
64-
| **Why do I get this alert?** | The current Azure AD organization does not have Azure AD Premium P2. |
64+
| **Why do I get this alert?** | The current Azure AD organization doesn't have Azure AD Premium P2. |
6565
| **How to fix?** | Review information about [Azure AD editions](../fundamentals/active-directory-whatis.md). Upgrade to Azure AD Premium P2. |
6666

6767
### Potential stale accounts in a privileged role
@@ -71,19 +71,19 @@ Severity: **Medium**
7171

7272
| | Description |
7373
| --- | --- |
74-
| **Why do I get this alert?** | This alert is no longer triggered based on the last password change date of for an account. This alert is for accounts in a privileged role that haven't signed in during the past *n* days, where *n* is a number of days that is configurable between 1-365 days . These accounts might be service or shared accounts that aren't being maintained and are vulnerable to attackers. |
74+
| **Why do I get this alert?** | This alert is no longer triggered based on the last password change date of for an account. This alert is for accounts in a privileged role that haven't signed in during the past *n* days, where *n* is a number of days that is configurable between 1-365 days. These accounts might be service or shared accounts that aren't being maintained and are vulnerable to attackers. |
7575
| **How to fix?** | Review the accounts in the list. If they no longer need access, remove them from their privileged roles. |
76-
| **Prevention** | Ensure that accounts that are shared are rotating strong passwords when there is a change in the users that know the password. </br>Regularly review accounts with privileged roles using [access reviews](./pim-create-azure-ad-roles-and-resource-roles-review.md) and remove role assignments that are no longer needed. |
76+
| **Prevention** | Ensure that accounts that are shared are rotating strong passwords when there's a change in the users that know the password. </br>Regularly review accounts with privileged roles using [access reviews](./pim-create-azure-ad-roles-and-resource-roles-review.md) and remove role assignments that are no longer needed. |
7777
| **In-portal mitigation action** | Removes the account from their privileged role. |
78-
| **Best practices** | Shared, service, and emergency access accounts that authenticate using a password and are assigned to highly privileged administrative roles such as Global administrator or Security administrator should have their passwords rotated for the following cases:<ul><li>After a security incident involving misuse or compromise of administrative access rights</li><li>After any user's privileges are changed so that they are no longer an administrator (for example, after an employee who was an administrator leaves IT or leaves the organization)</li><li>At regular intervals (for example, quarterly or yearly), even if there was no known breach or change to IT staffing</li></ul>Since multiple people have access to these accounts' credentials, the credentials should be rotated to ensure that people that have left their roles can no longer access the accounts. [Learn more about securing accounts](../roles/security-planning.md) |
78+
| **Best practices** | Shared, service, and emergency access accounts that authenticate using a password and are assigned to highly privileged administrative roles such as Global administrator or Security administrator should have their passwords rotated for the following cases:<ul><li>After a security incident involving misuse or compromise of administrative access rights</li><li>After any user's privileges are changed so that they're no longer an administrator (for example, after an employee who was an administrator leaves IT or leaves the organization)</li><li>At regular intervals (for example, quarterly or yearly), even if there was no known breach or change to IT staffing</li></ul>Since multiple people have access to these accounts' credentials, the credentials should be rotated to ensure that people that have left their roles can no longer access the accounts. [Learn more about securing accounts](../roles/security-planning.md) |
7979

8080
### Roles are being assigned outside of Privileged Identity Management
8181

8282
Severity: **High**
8383

8484
| | Description |
8585
| --- | --- |
86-
| **Why do I get this alert?** | Privileged role assignments made outside of Privileged Identity Management are not properly monitored and may indicate an active attack. |
86+
| **Why do I get this alert?** | Privileged role assignments made outside of Privileged Identity Management aren't properly monitored and may indicate an active attack. |
8787
| **How to fix?** | Review the users in the list and remove them from privileged roles assigned outside of Privileged Identity Management. You can also enable or disable both the alert and its accompanying email notification in the alert settings. |
8888
| **Prevention** | Investigate where users are being assigned privileged roles outside of Privileged Identity Management and prohibit future assignments from there. |
8989
| **In-portal mitigation action** | Removes the user from their privileged role. |
@@ -95,10 +95,10 @@ Severity: **Low**
9595
| | Description |
9696
| --- | --- |
9797
| **Why do I get this alert?** | Global administrator is the highest privileged role. If a Global Administrator is compromised, the attacker gains access to all of their permissions, which puts your whole system at risk. |
98-
| **How to fix?** | Review the users in the list and remove any that do not absolutely need the Global administrator role. </br>Assign lower privileged roles to these users instead. |
98+
| **How to fix?** | Review the users in the list and remove any that don't absolutely need the Global administrator role. </br>Assign lower privileged roles to these users instead. |
9999
| **Prevention** | Assign users the least privileged role they need. |
100100
| **In-portal mitigation action** | Removes the account from their privileged role. |
101-
| **Trigger** | Triggered if two different criteria are met, and you can configure both of them. First, you need to reach a certain threshold of Global administrator role assignments. Second, a certain percentage of your total role assignments must be Global administrators. If you only meet one of these measurements, the alert does not appear. |
101+
| **Trigger** | Triggered if two different criteria are met, and you can configure both of them. First, you need to reach a certain threshold of Global administrator role assignments. Second, a certain percentage of your total role assignments must be Global administrators. If you only meet one of these measurements, the alert doesn't appear. |
102102
| **Minimum number of Global Administrators** | This setting specifies the number of Global Administrator role assignments, from 2 to 100, that you consider to be too few for your Azure AD organization. |
103103
| **Percentage of Global Administrators** | This setting specifies the minimum percentage of administrators who are Global administrators, from 0% to 100%, below which you do not want your Azure AD organization to dip. |
104104

@@ -118,13 +118,21 @@ Severity: **Low**
118118

119119
## Customize security alert settings
120120

121-
On the **Alerts** page, select **Setting**.
121+
Follow these steps to configure security alerts for Azure AD roles in Privileged Identity Management:
122122

123-
![Alerts page with Settings highlighted](media/pim-how-to-configure-security-alerts/alert-settings.png)
123+
1. Sign in to the [Azure portal](https://portal.azure.com/).
124124

125-
Customize settings on the different alerts to work with your environment and security goals.
125+
1. Open **Azure AD Privileged Identity Management**. For information about how to add the Privileged Identity Management tile to your dashboard, see [Start using Privileged Identity Management](pim-getting-started.md).
126126

127-
![Setting page for an alert to enable and configure settings](media/pim-how-to-configure-security-alerts/security-alert-settings.png)
127+
1. From the left menu, select **Azure AD Roles**.
128+
129+
1. From the left menu, select **Alerts**, and then select **Setting**.
130+
131+
![Screenshots of alerts page with the settings highlighted.](media/pim-how-to-configure-security-alerts/alert-settings.png)
132+
133+
1. Customize settings on the different alerts to work with your environment and security goals.
134+
135+
![Screenshots of the alert setting page.](media/pim-how-to-configure-security-alerts/security-alert-settings.png)
128136

129137
## Next steps
130138

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-alerts.md

Lines changed: 22 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 06/24/2022
13+
ms.date: 07/29/2022
1414
ms.author: amsliu
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,43 +19,53 @@ ms.collection: M365-identity-device-management
1919

2020
# Configure security alerts for Azure roles in Privileged Identity Management
2121

22-
Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra. When an alert is triggered, it shows up on the Alerts page.
22+
Privileged Identity Management (PIM) generates alerts when there's suspicious or unsafe activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra. When an alert is triggered, it shows up on the Alerts page.
2323

24-
![Azure resources - Alerts page listing alert, risk level, and count](media/pim-resource-roles-configure-alerts/rbac-alerts-page.png)
24+
![Screenshot of the alerts page listing alert, risk level, and count.](media/pim-resource-roles-configure-alerts/rbac-alerts-page.png)
2525

2626
## Review alerts
2727

2828
Select an alert to see a report that lists the users or roles that triggered the alert, along with remediation guidance.
2929

30-
![Alert report showing last scan time, description, mitigation steps, type, severity, security impact, and how to prevent next time](media/pim-resource-roles-configure-alerts/rbac-alert-info.png)
30+
![Screenshot of the alert report showing last scan time, description, mitigation steps, type, severity, security impact, and how to prevent next time.](media/pim-resource-roles-configure-alerts/rbac-alert-info.png)
3131

3232
## Alerts
3333

3434
Alert | Severity | Trigger | Recommendation
3535
--- | --- | --- | ---
3636
**Too many owners assigned to a resource** | Medium | Too many users have the owner role. | Review the users in the list and reassign some to less privileged roles.
37-
**Too many permanent owners assigned to a resource** | Medium | Too many users are permanently assigned to a role. | Review the users in the list and re-assign some to require activation for role use.
37+
**Too many permanent owners assigned to a resource** | Medium | Too many users are permanently assigned to a role. | Review the users in the list and reassign some to require activation for role use.
3838
**Duplicate role created** | Medium | Multiple roles have the same criteria. | Use only one of these roles.
39-
**Roles are being assigned outside of Privileged Identity Management (Preview)** | High | A role is managed directly through the Azure IAM resource blade or the Azure Resource Manager API | Review the users in the list and remove them from privileged roles assigned outside of Privilege Identity Management.
39+
**Roles are being assigned outside of Privileged Identity Management (Preview)** | High | A role is managed directly through the Azure IAM resource, or the Azure Resource Manager API. | Review the users in the list and remove them from privileged roles assigned outside of Privilege Identity Management.
4040

4141
> [!NOTE]
4242
> During the public preview of the **Roles are being assigned outside of Privileged Identity Management (Preview)** alert, Microsoft supports only permissions that are assigned at the subscription level.
4343
4444
### Severity
4545

4646
- **High**: Requires immediate action because of a policy violation.
47-
- **Medium**: Does not require immediate action but signals a potential policy violation.
48-
- **Low**: Does not require immediate action but suggests a preferred policy change.
47+
- **Medium**: Doesn't require immediate action but signals a potential policy violation.
48+
- **Low**: Doesn't require immediate action but suggests a preferred policy change.
4949

5050
## Configure security alert settings
5151

52-
From the Alerts page, go to **Settings**.
52+
Follow these steps to configure security alerts for Azure roles in Privileged Identity Management:
5353

54-
![Alerts page with Settings highlighted](media/pim-resource-roles-configure-alerts/rbac-navigate-settings.png)
54+
1. Sign in to the [Azure portal](https://portal.azure.com/).
5555

56-
Customize settings on the different alerts to work with your environment and security goals.
56+
1. Open **Azure AD Privileged Identity Management**. For information about how to add the Privileged Identity Management tile to your dashboard, see [Start using Privileged Identity Management](pim-getting-started.md).
5757

58-
![Setting page for an alert to enable and configure settings](media/pim-resource-roles-configure-alerts/rbac-alert-settings.png)
58+
1. From the left menu, select **Azure resources**.
59+
60+
1. From the list of resources, select your Azure subscription.
61+
62+
1. On the **Alerts** page, select **Settings**.
63+
64+
![Screenshot of the alerts page with settings highlighted.](media/pim-resource-roles-configure-alerts/rbac-navigate-settings.png)
65+
66+
1. Customize settings on the different alerts to work with your environment and security goals.
67+
68+
![Screenshot of the alert setting.](media/pim-resource-roles-configure-alerts/rbac-alert-settings.png)
5969

6070
## Next steps
6171

articles/active-directory/privileged-identity-management/pim-security-wizard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: how-to
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 06/27/2022
14+
ms.date: 07/29/2022
1515
ms.author: amsliu
1616
ms.reviewer: shaunliu
1717
ms.custom: pim ; H1Hack27Feb2017
@@ -36,7 +36,7 @@ Also, keep role assignments permanent if a user has a Microsoft account (in othe
3636

3737
1. Open **Azure AD Privileged Identity Management**.
3838

39-
1. Select **Azure AD roles** and then select **Discovery and insights (Preview)**. Opening the page begins the discovery process to find relevant role assignments.
39+
1. From the left menu, select **Azure AD roles** and then select **Discovery and insights (Preview)**. Opening the page begins the discovery process to find relevant role assignments.
4040

4141
![Azure AD roles - Discovery and insights page showing the 3 options](./media/pim-security-wizard/new-preview-link.png)
4242

0 commit comments

Comments
 (0)