Topic Hub
Microsoft Entra ID
Identity management, Conditional Access, Privileged Identity Management, app registrations, hybrid join, and audit logging — practical coverage for admins running Microsoft 365 and endpoint environments on Entra ID.
Guides, scripts and analysis
Overview
What Microsoft Entra ID Is Used For in Real Environments
Entra ID (formerly Azure Active Directory) is the identity and access control plane for Microsoft 365, Azure, and Intune. It is the system that decides who can sign in, from where, on what device, and what they are allowed to do once authenticated.
Authentication and single sign-on
Entra ID authenticates users for Microsoft 365, Azure, and thousands of SaaS applications via SAML, OAuth 2.0, and OIDC federation. SSO means one sign-in session grants access to all integrated apps — users are not prompted per application once the Entra token is established.
Conditional Access enforcement
CA policies evaluate every sign-in attempt against conditions — user risk, device compliance state, location, application sensitivity — and grant, block, or require additional verification. CA is the primary enforcement layer for Zero Trust in Microsoft environments.
Device identity and management
Entra ID maintains device objects for every Entra-joined, hybrid-joined, and Entra-registered device. Device objects carry compliance state from Intune, BitLocker recovery keys, and group memberships used for CA policy evaluation and Intune group targeting.
Privileged access governance
Privileged Identity Management (P2) provides just-in-time role activation with approval workflows and time limits — replacing always-on Global Admin assignments. Combined with access reviews, PIM gives audit teams a defensible record of who had privileged access and when.
App registration and API access control
Enterprise applications and app registrations define how third-party and custom applications authenticate against the Microsoft identity platform. Permission scopes and admin consent control what each application can access — a misconfigured app registration is a common lateral movement path.
Identity governance and lifecycle
Entitlement Management (P2) automates access package assignment for new joiners, movers, and leavers. Access reviews periodically certify group and role membership. Lifecycle Workflows trigger automated tasks — provisioning, deprovisioning, manager notifications — based on HR events.
Device identity
Entra Joined vs Hybrid Joined vs Entra Registered
Device join state determines how the device authenticates, what CA policies apply, and whether Intune can fully manage it. Getting the join type wrong is one of the most common sources of policy not applying and Conditional Access blocking unexpected users.
Cloud-native — recommended for new deployments
Entra Joined
- What it is
- Device joins Entra ID only — no on-premises AD domain join. The identity plane is entirely in the cloud. Primary user signs in with a work or school account during OOBE.
- Best for
- New device deployments using Autopilot, cloud-first environments with no requirement for on-premises resource access via Kerberos, and remote-first workforces.
- Intune management
- Full MDM enrollment via Intune is the standard management path. Device compliance state feeds directly into Conditional Access with no hybrid sync delay.
- On-premises resource access
- Requires line-of-sight to Entra ID via internet. On-premises file shares and printers require Kerberos Cloud Trust or NTLM passthrough — not automatic.
- CA device filter
- "Require Entra joined device" CA grant control applies. Devices show as compliant or not compliant based on Intune policy — no hybrid join grace period.
Mixed on-premises / cloud
Hybrid Joined
- What it is
- Device is joined to both on-premises AD and Entra ID via Microsoft Entra Connect sync. The device object exists in both directories, linked by the objectGUID.
- Best for
- Environments with existing AD infrastructure, on-premises LOB applications requiring Kerberos, or fleets in migration from SCCM co-management to full Intune.
- Entra Connect dependency
- Hybrid join registration requires Entra Connect (or Cloud Sync for smaller environments) to be healthy. A stale or broken sync will prevent new devices from registering and existing devices from updating their certificate.
- CA compliance delay
- Compliance state from Intune propagates to Entra ID device object via sync — typically within minutes but dependent on sync cycle. A device can appear compliant in Intune but not yet in Entra during the window.
- Policy conflict risk
- Hybrid-joined devices can receive both GPO and Intune policy. Audit for management authority conflicts on Windows Update, BitLocker, and Defender settings.
BYOD / user-enrolled
Entra Registered
- What it is
- Device registers a work account (Settings > Access Work or School) without full domain or Entra join. The device object exists in Entra but the device OS is not under full MDM control.
- Best for
- BYOD scenarios where users access Microsoft 365 apps (Outlook, Teams) from personal devices. MAM (app protection policies) can enforce data controls without full device management.
- Intune management scope
- Entra-registered devices can enroll in Intune via the Company Portal for user-initiated MDM enrollment — but this is opt-in, not automatic at registration. MAM-only is the more common BYOD stance.
- CA grant limitation
- "Require Entra joined or hybrid joined device" CA grant does NOT match registered-only devices. Use "Require approved client app" or "Require app protection policy" grants for BYOD-compatible access control.
- Opt-in MDM preview
- A 2026 preview allows admins to block automatic MDM enrollment triggered during Microsoft account sign-in — important for tenants where BYOD devices should not automatically enroll under corporate MDM policy.
Conditional Access
Conditional Access and Device Compliance
Conditional Access is the enforcement mechanism — it reads signals from Entra ID and Intune and decides what a sign-in is allowed to do. Building a CA baseline correctly is the single highest-impact identity security action in a Microsoft 365 environment.
Report-only mode before enforcement
Every new CA policy should run in Report-only mode for at least two weeks before switching to On. Use the CA Insights and Reporting workbook in Entra > Monitoring to see which sign-ins would have been blocked — identify service accounts, break-glass accounts, and application service principals before the policy affects them.
Emergency access (break-glass) accounts
Emergency access accounts must be excluded from every CA policy — including MFA and device compliance requirements. These accounts exist to recover the tenant if all other admin access is lost. Store the credentials offline, configure alerts for any sign-in from these accounts, and test them quarterly.
Require compliant device grant
"Require device to be marked as compliant" uses Intune compliance state. It only works for Intune-managed devices — it will block Entra-registered BYOD devices that have never enrolled in MDM. Scope the policy to Microsoft 365 apps and exclude device platforms you are not yet managing.
Named locations and trusted networks
Define office IP ranges as Trusted Named Locations in Entra > Security > Named locations. CA policies can then use "Any location except trusted" as the condition — requiring MFA or compliant device from any network that is not an approved office location without blocking office-based users.
Sign-in frequency and session controls
Session controls set how long a token is valid before re-authentication is required. Set sign-in frequency to 1 hour for high-sensitivity apps (Entra admin portal, Exchange admin). Persistent browser session: Never for shared or kiosk devices. Continuous Access Evaluation (CAE) revokes tokens in near-real-time on policy changes.
Authentication strengths
Authentication strength CA policies require a specific authenticator type — phishing-resistant (hardware key or Windows Hello for Business) rather than any MFA. Require phishing-resistant MFA for any access to the Entra admin portal, Azure, and other privileged surfaces. This resists MFA fatigue and adversary-in-the-middle attacks that standard TOTP does not.
Licensing
Entra ID P1 vs P2 — What Each Licence Unlocks
P1 covers Conditional Access, SSPR, and group-based licensing. P2 adds the three capabilities that matter most for privileged access and compliance: PIM, Identity Protection, and Access Reviews.
Entra ID P1
Included in Microsoft 365 Business Premium, E3, F3
- Conditional Access — full policy engine with all grant and session controls
- Self-Service Password Reset (SSPR) with on-premises writeback
- Group-based licensing and dynamic group membership rules
- Application proxy for on-premises app publishing
- Hybrid identity with Entra Connect sync and cloud sync
- Microsoft Entra MFA (per-user or Conditional Access driven)
- Banned password list and smart lockout
Entra ID P2
Included in Microsoft 365 E5, E5 Security; add-on for E3
- Everything in P1, plus:
- Privileged Identity Management (PIM) — JIT role activation, approval workflows, time-limited assignments
- Entra ID Identity Protection — risk-based Conditional Access, user and sign-in risk policies
- Access Reviews — periodic certification of group, role, and application membership
- Entitlement Management — access packages, auto-assignment policies, connected organisations
- Lifecycle Workflows — automated joiner/mover/leaver task orchestration
- PIM for Groups — extend JIT activation to group membership, not just directory roles
Privileged access
Privileged Identity Management (PIM)
PIM eliminates standing privileged access — the practice of keeping accounts permanently in Global Admin, Exchange Admin, or other high-privilege roles. Instead, eligible users activate roles on demand, for a defined time window, with optional approval and justification required.
Eligible vs Active role assignments
Eligible assignments give a user the ability to activate a role — they do not have it permanently. Active assignments grant the role continuously (avoid except for break-glass and automation service principals). Audit your directory for permanent Active assignments as a first step when enabling PIM.
Role activation settings
Configure per-role: maximum activation duration (recommend 1–4 hours for admin roles), require MFA or phishing-resistant MFA on activation, require justification text, require approval from one or more designated approvers. For highly sensitive roles (Global Admin, Privileged Role Admin), require approval from a second named person.
Approval workflows
Designated approvers receive an email and Teams notification when activation is requested. Approvers review the justification and approve or deny via the PIM portal or the MyAccess portal. Set approval timeout to 4–8 hours so requests do not pend indefinitely — unapproved requests expire automatically.
PIM for Groups
PIM can manage membership in Entra ID security groups, not just directory roles. Use this to provide JIT access to groups that are used for CA policy exclusions, Intune assignment targets, or SharePoint permissions — without granting a permanent directory role. Requires P2 and the group to be a role-assignable group.
Access Reviews for privileged roles
Configure recurring access reviews for all PIM-eligible role assignments — quarterly is the standard frequency for admin roles. Reviews are sent to the role member, their manager, or a designated reviewer. Memberships that are not reviewed or approved within the review window are automatically removed if you configure auto-removal on deny.
PIM alerts and audit log
PIM generates built-in alerts for: roles with too many permanent admins, roles not using PIM, duplicate role assignments, and stale eligible assignments. The PIM audit log records every activation, approval, denial, and assignment change — export to Log Analytics for retention beyond the default 30-day portal view.
Deep-Dive Tutorials
Exchange Online SMTP AUTH Basic Authentication 2026 Migration Planning
A practical operational guide for planning Exchange Online SMTP AUTH Basic Authentication and credential-based Exchange Online PowerShell automation migrations, covering inventory, EAC and Entra checks, mailbox and tenant settings, OAuth, High Volume Email, Azure Communication Services Email, relay caveats, app-only PowerShell, managed identity, rollback, and prevention controls.
32 min read · Advanced
Migrating AzureAD and MSOnline PowerShell Scripts to Microsoft Graph PowerShell SDK
A practical migration guide for replacing production AzureAD and MSOnline PowerShell scripts with Microsoft Graph PowerShell SDK, covering module strategy, delegated and app-only authentication, managed identity, permission discovery, cmdlet mapping, paging, OData filters, eventual consistency, throttling, beta endpoint risk, logging, rollback, and prevention checks.
34 min read · Advanced
Microsoft 365 Admin Centre Mandatory MFA Readiness for Admins
A practical operational guide for Microsoft 365 admin centre mandatory MFA readiness, covering affected admins, break-glass accounts, security defaults, Conditional Access, per-user MFA, phishing-resistant methods, Graph PowerShell audits, sign-in checks, service-style admin accounts, Phase 2 tooling impact, safe rollout, and recovery planning.
22 min read · Advanced
Deploying Windows LAPS with Microsoft Intune: A Complete Walkthrough
A step-by-step guide to rolling out Windows Local Administrator Password Solution across your Intune-managed fleet, including policy configuration, reporting, and migration from legacy LAPS.
14 min read · Intermediate
App registrations
App Registrations, Enterprise Apps, and Consent Risk
App registrations define how applications authenticate against the Microsoft identity platform. Enterprise applications are the tenant-specific service principals created when an app registration is used — or when a third-party SaaS app is added to the tenant. Misconfigured permissions and over-consented apps are a persistent attack surface.
App registration vs Enterprise application
An app registration is the identity definition — client ID, redirect URIs, certificate or secret. An enterprise application (service principal) is the tenant-specific instance of that app, where permissions are granted and user assignment is configured. When you add a SaaS app from the gallery, Entra creates an enterprise application service principal in your tenant.
Delegated vs Application permissions
Delegated permissions run in the context of a signed-in user — the app can do what the user can do, scoped by the permission. Application permissions run as the app identity itself, without a user — they require admin consent and can access all resources in scope regardless of who is signed in. Application permissions with write scope (User.ReadWrite.All, Mail.Send) are high-risk and should be assigned sparingly.
Admin consent vs user consent
User consent (if permitted by tenant policy) allows individual users to grant low-risk delegated permissions to apps. Admin consent is required for application permissions and for any permission flagged as requiring admin consent. Configure the tenant user consent policy (Entra > Enterprise applications > Consent and permissions) to restrict or disable user consent entirely for high-security tenants.
Application credential expiry
Client secrets expire — typically after 1–2 years. When a secret expires, any automation, script, or integration using that credential stops working. Track expiry dates via Entra > App registrations > Owned applications > Certificates & secrets. Prefer certificate credentials over secrets for non-interactive apps — certificates are harder to leak and can be rotated without re-deploying the secret value.
Risky OAuth grants — consent phishing
Consent phishing attacks trick users into granting OAuth permissions to malicious apps. Review Entra > Enterprise applications > All applications > filter by "User consent" to see apps users have consented to. Revoke suspicious grants via Remove-MgServicePrincipalAppRoleAssignment or the portal. Enable admin consent workflow to gate all app consent through an approval process.
Quarterly app permission audit
Run Get-MgServicePrincipal | Where-Object { $_.AppRoles.Count -gt 0 } to list all apps with application permissions. Cross-reference with the app owners and assess whether each permission scope is still required. Remove app registrations for decommissioned services — orphaned registrations with valid credentials are a long-term compromise risk.
Device objects
BitLocker Key Escrow and Device Object Checks
Entra ID stores BitLocker recovery keys and device registration certificates in the device object. These are the device-side checks most commonly needed when troubleshooting Conditional Access failures, compliance state mismatches, or BitLocker lockouts.
Finding a device object in Entra
Entra ID > Devices > All devices. Filter by device name, operating system, join type, or compliance state. The device detail page shows join type, registration time, last activity, Intune management state, and the Recovery Keys tab for BitLocker keys. Use Get-MgDevice -Filter "displayName eq 'DEVICE-NAME'" for scripted lookups.
BitLocker recovery key location
For Entra-joined and hybrid-joined devices with BitLocker policy configured to escrow to Entra: Devices > [device name] > Recovery Keys tab shows the key ID and the recovery key itself (visible to users with sufficient RBAC). If Recovery Keys tab is empty, the key has not escrowed — see the BitLocker troubleshooting guide for the force-escrow procedure.
Stale device objects
Devices that have been re-imaged, renamed, or re-enrolled create new Entra device objects. The old object retains its last compliance state and may hold a now-invalid BitLocker key or group membership. Identify stale objects using Get-StaleDevices — cross-referencing Intune last check-in with Entra last activity date. Delete stale objects after confirming the current device object is healthy.
Device registration certificate renewal
Hybrid-joined devices register a device certificate in Entra ID that is renewed automatically by the Automatic-Device-Join scheduled task. If the renewal fails (Entra Connect sync issue, certificate store problem, or network access to sts.windows.net blocked), the device will eventually fail CA device-based checks. Run dsregcmd /status on the device to verify AzureAdJoined state and certificate validity.
dsregcmd — the first diagnostic tool
dsregcmd /status on any Windows machine shows join type (AzureAdJoined, DomainJoined, WorkplaceJoined), the device certificate thumbprint, SSO state, and whether the PRT (Primary Refresh Token) is present. A missing PRT is why a device cannot satisfy device-based CA controls even if it appears joined. Run as the affected user — PRT is user-scoped.
Compliance state propagation delay
Intune marks a device compliant, but Entra ID still shows it as non-compliant. Compliance state syncs from Intune to the Entra device object within minutes under normal conditions. Trigger a manual device sync in Intune (Devices > [device] > Sync), then wait 5–10 minutes before re-testing CA. If the state does not update, check the Intune device configuration status and the Entra Connect sync health.
Scripts & Automation
Get-StaleDevices
Identifies devices inactive for a configurable threshold across Intune, Entra ID, and on-premises Active Directory. Outputs CSV and HTML reports with remediation actions.
PowerShell
Export-IntuneDeviceReport
Uses the Microsoft Graph API to export a full Intune device inventory including compliance state, OS version, last check-in, and primary user to CSV or JSON.
PowerShell
Monitoring
Reporting and Audit Logs
Entra ID sign-in and audit logs are the primary evidence source for access investigations, compliance audits, and identity incident response. Default retention is 30 days in the portal — export to Log Analytics or a SIEM for longer-term retention.
Sign-in logs
Entra > Monitoring & health > Sign-in logs. Every interactive, non-interactive, and service principal sign-in is recorded with the applied CA policies, authentication methods used, device compliance state, location, and failure reason. Filter by user, application, or IP. Non-interactive sign-ins (background token refresh) are in a separate tab — often the source of unexpected CA failures.
Audit logs
Entra > Monitoring & health > Audit logs. Records all administrative operations: role assignments, group membership changes, app consent grants, user creation and deletion, CA policy changes. Audit log entries include the initiating user, target, and changed properties. Use the date range filter and "Initiated by (actor)" column to trace changes made during a specific incident window.
Diagnostic settings — export to Log Analytics
Entra > Diagnostic settings > Add diagnostic setting. Select SignInLogs, AuditLogs, RiskyUsers, and UserRiskEvents. Send to a Log Analytics workspace. Retention in Log Analytics is configurable up to 730 days (vs 30 days in the Entra portal). Essential for compliance audit retention requirements and SIEM integration.
Microsoft Entra Workbooks
Entra > Monitoring > Workbooks provides pre-built Log Analytics workbooks: Conditional Access gap analyser, sign-in health, risky sign-ins, and authentication methods. The CA gap analyser shows sign-ins that succeeded without any CA policy applying — helps identify users or apps that have fallen through policy targeting gaps.
Identity Protection risk reports
Entra > Protection > Identity Protection. Risky users report shows accounts flagged for leaked credentials, impossible travel, or anomalous activity. Risky sign-ins shows individual sign-in events with risk reason. Dismiss false positives after investigation — dismissing without investigation skips the risk remediation for the user.
Graph API — sign-in log queries
GET /auditLogs/signIns?$filter=createdDateTime ge 2026-01-01 and status/errorCode ne 0 returns failed sign-ins. Combine with $select to retrieve only needed fields. Use application permissions AuditLog.Read.All for non-interactive script access. The beta endpoint exposes more fields including applied CA policy detail and authentication step information.
Troubleshooting
Windows Autopilot Device Not Importing: Hardware Hash CSV, Duplicate Records, and Profile Assignment
A practical troubleshooting guide for Windows Autopilot import failures, covering hardware hash collection, CSV validation, duplicate records, tenant permissions, Intune Connector checks, deployment profile assignment, dynamic groups, Graph, safe retry, and recovery.
22 min read · Intermediate
Intune Device Not Syncing: Last Check-in Stale, Sync Button Not Helping, or Policies Not Arriving
A practical troubleshooting guide for Windows devices that stop syncing with Intune, covering portal checks, MDM enrolment state, Company Portal, scheduled tasks, event logs, registry evidence, IME health, network issues, Entra device objects, Graph checks, safe retry, and recovery.
21 min read · Intermediate
Microsoft Entra Dynamic Group Not Updating: Users, Devices, and Intune Assignments
A practical troubleshooting guide for Microsoft Entra dynamic groups that do not update, including rule syntax, user and device attributes, Graph checks, processing delays, Intune assignment impact, Autopilot targeting, stale device objects, and safe recovery.
20 min read · Intermediate
Intune Remediation Script Not Running, Detecting, Remediating, or Reporting
A practical troubleshooting guide for Intune Remediations that do not run, detect, remediate, or report correctly, covering licensing, exit codes, schedules, IME logs, PowerShell context, reporting delay, retry, and rollback.
18 min read · Intermediate
Common problems
Where Entra ID Configurations Go Wrong
Most Entra ID problems in production fall into a small set of repeating patterns — mostly around CA policy targeting, device join state, and sync health.
CA policy blocks service accounts and automation
A new CA policy requiring MFA or device compliance inadvertently applies to service accounts used by Azure Automation, third-party integrations, or on-premises scripts. Service principals and automation accounts must be explicitly excluded from MFA and device-based CA policies — they cannot satisfy interactive challenges. Use workload identity CA policies for service principal sign-in control.
No break-glass account — admin locked out
A CA policy requiring compliant device applies to all users including Global Admins. The admin's device falls out of compliance due to a pending update or certificate issue. Without a break-glass account excluded from the policy, no admin can access the Entra portal to fix the policy. Create two break-glass accounts, store credentials offline, and exclude them from every CA policy.
Hybrid join failing silently — device not appearing in Entra
The Automatic-Device-Join scheduled task runs but the device does not appear in Entra. Usually caused by SCP (Service Connection Point) misconfiguration in AD, Entra Connect sync not running, or network access to device registration endpoints blocked. Run dsregcmd /status and check the "AzureAdJoined" field and any error codes in the output.
Stale Entra Connect sync — compliance state not updating
Intune marks devices compliant but CA continues to block them. Entra Connect sync has stalled (check Entra > Entra Connect Health). Compliance state writes back from Intune through the Entra device object — if sync is not running, the device object does not update. Restart the Microsoft Entra Connect Sync (ADSync) service and verify the next sync cycle completes.
PIM eligible assignment not activating — MFA prompt failing
User tries to activate a PIM role but the MFA prompt fails because their authenticator method is not compatible with the authentication strength requirement set on that role. Check the PIM role settings for the authentication context requirement and verify the user has registered a compatible method (hardware FIDO2 key or Windows Hello if phishing-resistant is required).
App consent granted too broadly — user-consented apps with write permissions
A user consented to a third-party OAuth app that requested Mail.Send or Files.ReadWrite.All. The app is now sending mail as the user or reading all their OneDrive files. Review Enterprise applications > User consent report. Revoke the grant and enable the admin consent workflow to prevent future broad consent grants without admin approval.
SSPR not working — writeback not configured
Users attempt self-service password reset but the change does not write back to on-premises AD. Password writeback requires Entra Connect with the Password writeback option enabled, the Entra Connect service account having the required AD permissions, and the user's on-premises account not being excluded from writeback scope.
Dynamic group membership not updating
A device or user meets the dynamic group membership rule criteria but is not added to the group within the expected time. Dynamic group processing can take up to 24 hours for large tenants. Check Entra > Groups > [group] > Membership processing status for errors. Test the rule against the specific user or device using the Validate rules function before assuming the rule is correct.
Reading path
Recommended AdminSignal Reading Path
Work through content in this order to build a complete Entra ID security configuration — from Conditional Access baseline through privileged access governance.
- 1
Configuring Conditional Access for a Microsoft 365 Tenant: The Complete Policy Map
Start here. Covers the full CA baseline — MFA, compliant device enforcement, emergency access accounts, and the correct order to build and test policies without locking anyone out.
- 2
Deploying Windows LAPS with Microsoft Intune
Local admin credential management feeds directly into Entra device security posture. Covers Intune LAPS policy, Entra ID key storage, retrieval permissions, and legacy migration.
- 3
BitLocker Recovery Key Not Backed Up to Entra ID
Verify your BitLocker keys are actually in Entra ID device objects — and learn to detect and force-escrow keys before a user lockout makes it urgent.
- 4
Intune Compliance Policy Not Evaluating
Compliance state drives CA device grant decisions. This troubleshooting guide covers the four most common reasons a device is stuck in Not evaluated — which shows as non-compliant to CA.
- 5
Entra ID Premium P1 vs P2: Is the Upgrade Worth It?
Understand which P2 capabilities (PIM, Identity Protection, Access Reviews) apply to your environment before committing to the licence cost — or building a business case for it.
- 6
Export-IntuneDeviceReport — Script Library
Entra Graph API query for device inventory and compliance state — the starting point for building your own Entra-connected reporting scripts.
Official docs
Key Microsoft Documentation
Authoritative references for Entra ID configuration, Conditional Access, PIM, and identity governance. Use alongside AdminSignal guides for policy syntax and service-specific limits.
Microsoft Entra ID documentation ↗
Core identity documentation — authentication, hybrid identity, groups, SSPR, and device management.
Conditional Access documentation ↗
Policy building, conditions, grant controls, session controls, and the named locations reference.
Privileged Identity Management ↗
PIM setup, role assignment settings, approval workflow configuration, and access review integration.
App registrations quickstart ↗
Register an app, configure redirect URIs, add certificates or secrets, and assign API permissions.
Entra ID audit logs ↗
Audit log schema, filter options, retention limits, and export to Log Analytics or Event Hub.
Identity governance overview ↗
Entitlement Management, access packages, access reviews, and Lifecycle Workflows — all P2 features.