Discovery and Insights (preview) for Azure AD roles (formerly Security Wizard)

If you're starting out with Privileged Identity Management (PIM) in your Azure Active Directory (Azure AD) organization, you can use the Discovery and insights (preview) page to get started. This feature shows you who is assigned to privileged roles in your organization and how to use PIM to quickly change permanent role assignments into just-in-time assignments. You can view or make changes to your permanent privileged role assignments in Discovery and Insights (preview). It's an analysis tool and an action tool.

Discovery and insights (preview)

Before your organization starts using Privileged Identity Management, all role assignments are permanent. Users are always in their assigned roles even when they don't need their privileges. Discovery and insights (preview), which replaces the former Security Wizard, shows you a list of privileged roles and how many users are currently in those roles. You can list out assignments for a role to learn more about the assigned users if one or more of them are unfamiliar.

✔️ Microsoft recommends that you keep two break glass accounts that are permanently assigned to the global administrator role. Make sure that these accounts don't require the same multi-factor authentication mechanism as your normal administrative accounts to sign in, as described in Manage emergency access accounts in Azure AD.

Also, keep role assignments permanent if a user has a Microsoft account (in other words, an account they use to sign in to Microsoft services like Skype, or Outlook.com). If you require multi-factor authentication for a user with a Microsoft account to activate a role assignment, the user will be locked out.

Open Discovery and insights (preview)

  1. Sign in to the Azure portal.

  2. Open Azure AD Privileged Identity Management.

  3. Select Azure AD roles and then select Discovery and insights (Preview). Opening the page begins the discovery process to find relevant role assignments.

    Azure AD roles - Discovery and insights page showing the 3 options

  4. Select Reduce global administrators.

    Screenshot that shows the "Discovery and insights (Preview)" with the "Reduce global administrators" action selected.

  5. Review the list of Global Administrator role assignments.

    Reduce global administrators - Roles pane showing all Global Administrators

  6. Select Next to select the users or groups you want to make eligible, and then select Make eligible or Remove assignment.

    Convert members to eligible page with options to select members you want to make eligible for roles

  7. You can also require all global administrators to review their own access.

    Global administrators page showing access reviews section

  8. After you select any of these changes, you'll see an Azure notification.

  9. You can then select Eliminate standing access or Review service principals to repeat the above steps on other privileged roles and on service principal role assignments. For service principal role assignments, you can only remove role assignments.

    Additional Insights options to eliminate standing access and review service principals

Next steps