2.17 Ensure That 'Restrict access to Microsoft Entra admin center' is Set to 'Yes'

Information

Restrict access to the Microsoft Entra ID administration center to administrators only.

NOTE: This only affects access to the Entra ID administrator's web portal. This setting does not prohibit privileged users from using other methods such as Rest API or Powershell to obtain sensitive information from Microsoft Entra ID.

Rationale:

The Microsoft Entra ID administrative center has sensitive data and permission settings. All non-administrators should be prohibited from accessing any Microsoft Entra ID data in the administration center to avoid exposure.

Impact:

All administrative tasks will need to be done by Administrators, causing additional overhead in management of users and resources.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Remediate from Azure Portal

From Azure Home select the Portal Menu

Select Microsoft Entra ID

Under Manage, select Users

Under Manage, select User settings

Under Administration centre, set Restrict access to Microsoft Entra admin center to Yes

Click Save

Default Value:

By default, Restrict access to Microsoft Entra admin center is set to No

See Also

https://workbench.cisecurity.org/benchmarks/16820