AZ-100/AZ-103 – Manage Azure Active Directory (AD) – Study Notes #18

This article covers the “Manage Azure Active Directory (AD)” section of the AZ-100 and AZ-103 Exams and is part of my AZ-100 Study Notes series.


Some features in this module will require at least an active “Enterprise Mobility + Security E5” licence and a “Azure AD Premium P2” trial in order to actually try yourself. These can be activated via notifications on features that require them or by searching for the licences + trial which will take you to pages to set up trials.

Add custom domains

Every Azure AD tenant comes with a default domain in the format *domainName*.onmicrosoft.com, although the default cannot be changed, it is possible to add new domains.

To add a custom domain to AAD, navigate to Azure Active Directory and then select “Custom domain names” in the “Manage” menu. You can then click “Add custom domain” and specify the new domain to add.

Example of setting up a new domain

Once you click “Add Domain” you will be taken to a page which provides a TXT or MX record which must be set up on the DNS provider for your domain. Once that’s done click Verify and the domain will be added.

Example showing a custom domain (spandcrm.com) configured with AAD

More information on this can be found at – https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/add-custom-domain#add-your-custom-domain-name-to-azure-ad

Configure Azure AD Identity Protection, Azure AD Join, and Enterprise State Roaming

Azure AD Identity Protection

Azure AD Identity Protection provides an overview of flagged users and risks detected using Azure machine learning algorithms and allows you to set conditional access policies to protect users.

To configure AAD Identity Protection –

  1. Search for “Azure AD Identity Protection”
  2. Click “Onboard” in the “Settings” menu and then select the directory to associate and click “Create”.

Azure AD Premium P2 is required to use AAD Identity Protection.

More information on this can be found at – https://docs.microsoft.com/en-gb/azure/active-directory/identity-protection/enable

Azure AD Join

To configure Azure AD Join navigate to AAD then select “Devices” in the “Manage” menu. Then select “Device Settings” which will allow you to configure various setting for joining devices to AAD.

Examples of some of the options for device configuration with AAD

More detailed information on how to set up various things can be found at – https://docs.microsoft.com/en-us/azure/active-directory/devices/device-management-azure-portal

Enterprise State Roaming

Enterprise State Roaming is configured in the Devices menu as covered above.

Detailed information on this can be found at – https://docs.microsoft.com/en-us/azure/active-directory/devices/enterprise-state-roaming-enable

Configure self-service password reset

To configure Self-Service password resets you can navigate to AAD then select “Password reset” in the “Manage” menu.

From here you can enable SSPR for none, selected or all users.

You can also configure various required authentication methods and enforce the number of methods required before allowing a reset.

Example showing configured authentication methods for self-service password reset

More information on this can be found at – https://docs.microsoft.com/en-us/azure/active-directory/authentication/quickstart-sspr and at https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks

Implement conditional access policies

A common best practice is to enable Multi-Factor Authentication when logging in or connecting from an untrusted network, this is what conditional access policies facilitates.

Conditional Access uses the concept of “Named Locations” as trusted locations in order to identity untrusted networks. These are configured within Conditional Access by selecting “Named locations” in the “Manage” menu and are defined as either IP ranges or Countries/Regions.

Example of a policy configured to require MFA upon sign-in from any non trusted location, done by excluding trusted locations

More information on this can be found at – https://docs.microsoft.com/en-gb/azure/active-directory/conditional-access/untrusted-networks

Manage multiple directories

To create a new directory (AAD tenant) select “create a resource” then search for “Azure Active Directory” then click Create. From here, define an Organization name, and an Initial domain name which will serve as the base domain for the new instance and select a location.

Example of creating a new directory

Deleting a tenant requires quite a bit more effort, and the following requirements must be met –

  • There can be no users in the tenant except one global administrator.
  • There can be no applications in the tenant.
  • There can be no multi-factor authentication providers linked to the tenant.
  • There can be no subscriptions for any Microsoft Online Services such as Microsoft Azure, Office 365, or Azure AD Premium associated with the tenant.

To delete a tenant –

  1. Navigate to the tenant/directory you want to delete.
  2. Navigate to Azure Active Directory and select “Delete directory” in the overview.
  3. Azure will now perform various checks and inform you whether you can delete the tenant or if you’re required to perform further actions. Some checks will require a refresh of the browser window before they will pass if they’ve previously failed.
  4. Click Delete.
Example of the checks required to delete an Azure Tenant/Directory

The Microsoft documentation is fairly sparse on this with a lot of the links I’ve found on various other blogs no longer pointing to anything of use due to a recent rewrite of the documentation it seems. The link below is worth looking at for an overview though – https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis

This goes over creation of new directories – https://docs.microsoft.com/en-us/power-bi/developer/create-an-azure-active-directory-tenant

Perform an access review

Depending on what you specifically want to review you will do it in either Azure AD Access Reviews, Azure AD Enterprise Apps or Azure AD PIM –

Access rights of usersReviewers can beReview created inReviewer experience
Security group members
Office group members
Specified reviewers
Group owners
Self review
Azure AD access reviews
Azure AD groups
Access panel
Assigned to a connected appSpecified reviewers
Self review
Azure AD access reviews
Azure AD enterprise apps (in preview)
Access panel
Azure AD roleSpecified reviewers
Self review
Azure AD PIMAzure portal
Azure resource roleSpecified reviewers
Self review
Azure AD PIMAzure portal

To enable Access Reviews –

  1. Navigate to “All services” and search for “Access reviews”.
  2. Select “Onboard” in the “Access reviews” menu.
  3. Click “Onboard Now” in the next page.

To create an Access Review –

  1. Once access reviews are onboarded, navigate back to it and select “Access reviews” in the “Access reviews” menu.
  2. Select “New access review”.
  3. Provide a name and start date.
  4. Provide a frequency to run the review, defaults to One Time.
  5. If a frequency is selected provide a duration and when to end it by.
  6. Select the Application or Group to review.
  7. Click Start.
  8. The review will now run and be set to the “Starting” status.
  9. Once it changes to “Active” you can view results by selecting the review.

There is a very detailed doc on this at – https://docs.microsoft.com/en-gb/azure/active-directory/governance/access-reviews-overview

Advertisement

One thought on “AZ-100/AZ-103 – Manage Azure Active Directory (AD) – Study Notes #18

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.