When you use a privileged account for daily activities like reading emails or documents from the Internet, you increase the risk of compromising that account. Threat actors frequently gain initial access into an environment through phishing documents sent via email or drive-by download attacks in web browsers. If an attacker targets an administrator using such attack methods, it could lead to severe consequences, resulting in a direct, full compromise of the Entra infrastructure, its accounts, and resources.
This Indicator of Exposure checks whether service plans (i.e., licenses) associated with Microsoft 365 applications and services are assigned to privileged accounts, when they should only be necessary for normal accounts. This detection heuristic aims to identify when administrators have only a single account instead of two separate accounts (a standard account and a privileged account). This detection method may generate false positives, such as when an administrator already has separate standard and privileged accounts with service plans assigned to both accounts. You can ignore the finding if you confirm a false positive after investigation through a provided option. However, even in such cases, using Microsoft 365 applications and services from the privileged account increases the likelihood of compromising that account, which we don't recommend.
The IoE verifies the following Microsoft 365 services:
This IoE considers various service plan variants for Microsoft 365 services, such as business, education, government, and others.
You must ensure that users performing administrative tasks in Entra ID have multiple types of accounts, typically two: a standard account for daily use and a separate privileged account strictly for administrative activities. You should use a standard account without privileges for risky daily Internet operations or when opening untrusted documents. You should have a separate privileged account with limited service plans, including only the necessary and required plans, to focus on administrative tasks. This follows Microsoft's guidance on separating accounts for admins, as Microsoft recommends.
To summarize, follow two remediation steps:
Maintaining separate standard and privileged accounts introduces other security-related considerations that you should also address:
Name: Privileged Entra Account With Access To M365 Services
Codename: PRIVILEGED-ENTRA-ACCOUNT-WITH-ACCESS-TO-M365-SERVICES
Severity: Medium