Microsoft 365 Admin Roles Builder 2026: Global Admin Should Be the Exception

Global Administrator should be the exception, not the operating model. Microsoft 365 and Entra ID include dozens of built-in admin roles, but most tenants only use three to five. The result is predictable: admins either hold Global Admin or have no admin access at all, with nothing in between. This interactive guide helps you map real admin tasks to least-privileged roles, scope them where possible, activate them just in time with PIM, and review them on a regular cadence.

By Tiago Carvalho · Microsoft 365 Architect · Updated 2026

What this guide covers
  • Interactive admin roles builder with 10 inputs and privilege risk scoring across 6 pillars
  • Admin task to least-privileged role mapping framework with scope options
  • Privileged Identity Management (PIM) setup, just-in-time activation and approval workflows
  • Administrative Unit scoped roles for delegated administration
  • Emergency access (break-glass) account setup and monitoring
  • Conditional Access policies for admin roles with phishing-resistant MFA
  • Custom roles in Entra ID: when to create, limitations and governance
  • Access review process with quarterly cadence and ownership
  • Safe rollout phases and 15+ common admin role mistakes from real tenants
If you only remember five things
  1. Global Admin should be limited to break-glass accounts and rare PIM activations.
  2. Every admin task has a least-privileged built-in role. Find it.
  3. PIM converts permanent access into just-in-time access with logging and approval.
  4. Emergency access accounts must exist, be excluded from blocking CA policies, protected with independent phishing-resistant authentication, and tested regularly.
  5. Access reviews catch role drift before it becomes a security problem.
Table of contents

Introduction

In most Microsoft 365 tenants, the admin role model looks the same. A small group of people have Global Administrator. Everyone else has no admin access at all. When someone needs to reset a password, manage a group, or configure a SharePoint setting, they either ask a Global Admin to do it or they get Global Admin themselves. Over time, the number of Global Admins grows. Nobody removes the role after the task is done. Nobody reviews who has it.

This creates two problems. The first is security exposure. Global Administrator can manage almost every administrative setting in Microsoft Entra ID and Microsoft 365. In many scenarios, it can also grant itself or others access paths to sensitive data, including mailbox content, files and application credentials. A compromised Global Admin account should be treated as a full tenant compromise. The second problem is operational. When everyone has the same role, there is no separation of duties, no audit trail that is meaningful, and no way to understand who is responsible for what.

Least privilege only works when admin tasks are mapped to real roles, scoped where possible, activated just in time and reviewed regularly.

Microsoft 365 and Entra ID have over 80 built-in roles. Most tenants use fewer than five. The gap between what is available and what is used is where the risk lives. This guide closes that gap. It provides a structured framework for mapping every admin task to the minimum role required, deciding whether that role should be permanent or eligible, scoping it to an Administrative Unit where appropriate, and building the governance process around it.

This is not a general overview of Entra ID roles. It is a practical decision tool for Microsoft 365 architects, security teams and IT managers who need to reduce their Global Admin count and implement a defensible admin role model.

Important admin roles disclaimer

Disclaimer This guide is a practical admin role design framework based on field experience with Microsoft 365 tenants. It is not a substitute for official Microsoft documentation, licensing agreements, legal advice or compliance guidance. Role availability, permissions and behaviour may change as Microsoft updates Entra ID and Microsoft 365 services.

Key points to keep in mind:

  • Role permissions vary by service and are updated by Microsoft without notice. Always verify current permissions in the Entra admin center before making role assignments.
  • Some roles require specific licensing (Entra ID P2 for PIM, for example). Confirm your licence position before configuring eligible assignments or access reviews.
  • This guide covers Entra ID built-in and custom roles, Microsoft 365 service-specific admin roles, and PIM. It does not cover Azure resource roles (Azure RBAC), which use a separate role system.
  • Administrative Units, custom roles and some PIM features are not available in all Entra ID editions. Check your tenant licence before planning your deployment.
  • The recommendations in this guide are based on common enterprise scenarios. Your specific regulatory, compliance and organisational requirements may require different configurations.

What this guide helps you decide

This guide is designed to answer the specific questions that come up when you sit down to redesign your admin role model. It is structured around decisions, not features.

  • Which role for which task? A mapping of common admin tasks to the minimum built-in role required, what that role can and cannot do, and whether scope restrictions are available.
  • Permanent or eligible? Guidance on which roles should be permanently assigned (very few) and which should be eligible through PIM with just-in-time activation.
  • Tenant-wide or scoped? When to use Administrative Units to limit a role to a subset of users, groups or devices rather than the entire tenant.
  • How many Global Admins? The realistic minimum for operational continuity, the maximum for security, and the break-glass account strategy that sits underneath.
  • What governance process? Review cadence, ownership model, documentation requirements, and what to check in each quarterly review.
  • Where to start? A phased rollout order that reduces risk incrementally without disrupting daily operations.
Who should use this guide Microsoft 365 architects, Entra ID administrators, security teams responsible for identity governance, IT managers planning admin role redesigns, and compliance teams auditing administrative access. If you are responsible for who has admin access in your tenant, this guide is for you.

Before you start

Before redesigning your admin role model, gather the following information. Missing any of these will cause gaps in your plan or surprises during rollout.

Pre-flight checklist

  • Export your current role assignments from Entra ID (Roles and administrators > Export). Count the number of users per role, especially Global Administrator.
  • Identify every account with Global Administrator. For each one, document who uses it, what they use it for, and whether they need it daily, weekly or rarely.
  • Check your Entra ID licence edition. Confirm whether you have Entra ID P1, P2, or Entra ID Governance. PIM requires P2. Access reviews require P2 or Governance.
  • Inventory your break-glass accounts. If you do not have any, flag this as a critical gap to address before removing any Global Admin assignments.
  • Document your current Conditional Access policies that target admin roles. If you have no CA policies for admins, flag this as a gap.
  • List all service-specific admin roles in use (Exchange admin, SharePoint admin, Teams admin, Intune admin, etc.) and who holds them.
  • Identify any third-party tools, scripts or service accounts that authenticate with admin roles. These often break when roles are changed.
  • Confirm whether your tenant uses Administrative Units today. If not, determine whether your delegation model requires them.
  • Review your current access review process. If you do not have one, plan to build one as part of this project.
  • Get stakeholder agreement that the goal is to reduce Global Admin to the minimum viable count and move to least-privileged roles with PIM.

Licensing and prerequisites

Admin role features in Microsoft 365 are gated by your Entra ID licence edition. The table below maps each capability to its minimum licence requirement.

CapabilityMinimum licenceNotes
Built-in Entra ID roles (permanent assignment)Entra ID Free / M365Available in all editions. No additional licence needed for permanent role assignments.
Privileged Identity Management (PIM)Entra ID P2Required for eligible (just-in-time) role assignments, activation workflows, and time-bound access.
PIM approval workflowsEntra ID P2Configurable approvers per role. Requires PIM to be enabled.
Access reviews for rolesEntra ID P2 or Entra ID GovernanceAutomated recurring reviews of role assignments with attestation tracking.
Custom roles in Microsoft Entra IDMicrosoft Entra ID P1 for each user with a custom role assignmentUsed for Microsoft Entra RBAC scenarios. Custom roles can be assigned at tenant scope or supported resource scopes such as application registrations, enterprise applications or groups. They do not replace service-specific RBAC in Exchange, SharePoint, Intune, Defender or Purview. Validate supported permissions before design.
Administrative UnitsEntra ID P1Scope roles to subsets of users, groups or devices. Restricted management AUs require P2.
Conditional Access targeting rolesEntra ID P1CA policies can target users in directory roles. Authentication strength requires P1.
Authentication strength (phishing-resistant MFA)Entra ID P1Require FIDO2, Windows Hello or certificate-based auth for admin roles via CA.
Entra ID Identity ProtectionEntra ID P2Risk-based CA policies that detect and respond to compromised admin accounts.
Workload identitiesMicrosoft Entra Workload ID PremiumRequired to create or modify Conditional Access policies scoped to service principals. Applies to supported single-tenant service principals. Third-party SaaS, multitenant apps and managed identities have limitations and must be validated separately.
Licence planning tip PIM licences are only required for users who are assigned eligible roles. If you have 5 admins using PIM, you need 5 Entra ID P2 licences (or equivalent suite licences like Microsoft 365 E5). You do not need P2 for every user in the tenant.

Admin roles decision framework

The table below maps common admin tasks to the recommended least-privileged built-in role. For each role, it lists what the role can do, what it cannot do, and whether scope restrictions (Administrative Units) are available. Use this as your primary reference when deciding which role to assign.

Admin taskRecommended roleWhat it can doWhat it cannot doScope options
Reset user passwordsHelpdesk AdministratorReset passwords for non-admin users, force sign-out, manage service requestsCannot reset passwords for other admins, cannot manage MFA settings, cannot create usersAdministrative Unit scoping available
Create and manage usersUser AdministratorCreate users, manage profiles, assign licences, manage groups, reset passwords for non-adminsCannot manage admin role assignments, cannot access audit logs, cannot manage CA policiesAdministrative Unit scoping available
Manage Microsoft 365 Groups and Teams groupsGroups AdministratorCreate, update, delete M365 Groups, manage naming policies, expiration policies, group settingsCannot manage security groups in some scenarios, cannot manage Teams-specific settings (channels, policies)Administrative Unit scoping available
Manage Exchange OnlineExchange AdministratorManage mailboxes, transport rules, mail flow, accepted domains, connectors, anti-spamCannot manage Entra ID users directly, cannot access Security or Compliance portals, cannot modify CATenant-wide only (no AU scoping for Exchange)
Manage SharePoint Online and OneDriveSharePoint AdministratorManage sites, sharing settings, storage quotas, hub sites, migration, site permissionsCannot manage Exchange, Entra ID or Intune. Cannot modify CA or security policies.Tenant-wide only
Manage Intune (devices, apps, policies)Intune AdministratorManage devices, compliance policies, configuration profiles, app deployment, autopilotCannot manage Entra ID roles, cannot manage Exchange or SharePoint, cannot modify CA directlyScope tags available within Intune for delegated device management
Manage Defender for Office 365 and security incidentsSecurity AdministratorManage security policies, view security reports, manage incidents in Defender portal, configure alertsCannot manage compliance features (Purview), cannot manage Exchange transport rules, cannot assign rolesTenant-wide only
Read-only security monitoringSecurity ReaderView security dashboards, reports, incidents, alerts, Secure Score. Read access across Defender portals.Cannot make any changes. Read-only across all security surfaces.Tenant-wide only
Manage Microsoft Purview (compliance)Compliance AdministratorManage DLP policies, retention policies, sensitivity labels, information barriers, insider risk settingsCannot manage security features, cannot manage Exchange or SharePoint directly, cannot assign rolesTenant-wide only
Manage Conditional Access policiesConditional Access AdministratorCreate, modify, delete CA policies, manage named locations, authentication strengthCannot manage Entra ID roles, cannot manage MFA registration, cannot access PIMTenant-wide only
Manage application registrationsApplication AdministratorCreate and manage app registrations, enterprise apps, consent policies, app proxyCannot manage CA, cannot assign directory roles, cannot manage users or groupsCan be scoped to specific app registrations via custom roles
Manage Entra ID role assignments and PIMPrivileged Role AdministratorAssign and manage Entra ID role assignments, configure PIM settings, manage eligible and permanent role assignments, manage access reviews for rolesCannot manage Azure resource roles (Azure RBAC). Cannot manage CA policies or authentication methods directly.Tenant-wide only. Treat with same governance as Global Admin.
Manage authentication methods and MFAAuthentication Policy AdministratorManage authentication methods policies, MFA settings, self-service password reset, password protectionCannot reset passwords, cannot manage CA policies, cannot manage usersTenant-wide only
Manage billing and subscriptionsBilling AdministratorManage subscriptions, purchase services, manage payment methods, view invoices, manage support ticketsCannot manage any directory, security or compliance featuresTenant-wide only
Manage Teams settings and policiesTeams AdministratorManage Teams policies, calling, meetings, messaging, Teams devices, voiceCannot manage underlying M365 Groups directly, cannot manage Exchange or SharePointTenant-wide only
Role stacking warning Do not assign multiple high-privilege roles to the same person to avoid using Global Admin. Three powerful roles on one account (User Admin + Exchange Admin + Security Admin) gives that account nearly Global Admin capability without the monitoring that Global Admin receives. If someone needs that many roles, review the task list and consider whether the work should be split across multiple people.
Privileged Role Administrator requires Global Admin-level governance Privileged Role Administrator can assign any Entra ID role to any user, including Global Administrator. This makes it functionally equivalent to Global Admin from a security perspective. Apply the same governance controls: PIM eligible with approval workflow, phishing-resistant MFA, Conditional Access restrictions, and monthly access reviews. Never assign Privileged Role Administrator permanently to a named user account.

Interactive Microsoft 365 Admin Roles Builder

Use this builder to assess your current or planned admin role assignment. Select your parameters across all 10 inputs and the builder will calculate a governance score across 6 pillars, then provide specific recommendations for role selection, PIM configuration, scoping and governance.

Admin Roles Governance Assessment

This builder is a design aid. It does not replace validation in the Entra admin centre or Microsoft documentation.

0
Admin Role Governance Score
out of 100 governance points

Governance breakdown by pillar

Recommended role baseline models

The table below shows recommended role assignments for common admin scenarios. Each row represents a real operational pattern found across Microsoft 365 tenants, with the recommended role, assignment type, and scope.

ScenarioRecommended roleAssignment typeScopeReview cadence
Tier-1 helpdesk (password resets, basic user support)Helpdesk AdministratorPermanent (low risk)Administrative Unit (regional)Quarterly
Identity team (user lifecycle, group management)User AdministratorEligible (PIM)Administrative Unit or tenant-wideQuarterly
Messaging team (Exchange configuration)Exchange AdministratorEligible (PIM)Tenant-wideQuarterly
Collaboration team (SharePoint, OneDrive)SharePoint AdministratorEligible (PIM)Tenant-wideQuarterly
Endpoint team (device management)Intune AdministratorEligible (PIM)Scope tags within IntuneQuarterly
SOC / Security operationsSecurity Administrator + Security ReaderSecurity Reader permanent, Security Admin eligibleTenant-wideMonthly
Compliance and data governanceCompliance AdministratorEligible (PIM)Tenant-wideQuarterly
Finance / licence managementBilling AdministratorPermanent (limited scope)Tenant-wideSemi-annually
Application development teamApplication Administrator or Cloud Application AdministratorEligible (PIM)Scoped to specific app registrations where possibleQuarterly
Emergency accessGlobal AdministratorPermanent (excluded from blocking CA policies, excluded from PIM, independent phishing-resistant auth)Tenant-wideMonthly (test and verify)
Baseline model principle Start with the most restrictive model and expand only when a documented operational need cannot be met by the current role. Never start with Global Admin and try to reduce later. Start with the specific role and validate that it covers the required tasks.

Least privilege in practice

Least privilege is a principle, not a product feature. It means every admin has exactly the permissions they need for the tasks they perform, no more and no less. In practice, implementing least privilege requires three things: task mapping, role selection, and regular review.

Mapping daily tasks to minimum roles

For each admin in your organisation, document the tasks they perform in a typical week. Then map each task to the minimum role that can perform it. You will often find that what looks like a need for Global Admin is actually a need for two or three specific roles.

Daily taskMinimum roleWhy not Global Admin
Reset user passwordsHelpdesk AdministratorGlobal Admin can reset any password including other admins. Helpdesk Admin can only reset non-admin users.
Create new user accountsUser AdministratorGlobal Admin grants access to all directory settings. User Admin is scoped to user lifecycle.
Assign licencesLicense AdministratorLicense Admin can only manage licence assignments. No access to user profiles, groups, or settings.
Manage mail flow rulesExchange AdministratorExchange Admin is limited to Exchange Online. No access to Entra ID, SharePoint or security settings.
Create SharePoint sitesSharePoint AdministratorSharePoint Admin manages sites and sharing. No access to mailboxes, users, or security policies.
Review security alertsSecurity ReaderRead-only access prevents accidental changes while still providing full visibility into security data.
Manage Conditional AccessConditional Access AdministratorScoped to CA policy management only. Cannot modify directory roles or user accounts.
Deploy Intune policiesIntune AdministratorIntune Admin manages devices and policies. Cannot access mail, SharePoint, or identity settings.
The "I need everything" problem When an admin says they need Global Admin because they do everything, the real issue is usually that one person is doing too many different jobs. The solution is not to give them Global Admin. The solution is to split the workload, assign specific roles, and use PIM so they can activate the role they need for the task at hand.

Privileged Identity Management (PIM)

PIM is the mechanism that turns permanent admin access into just-in-time admin access. Instead of a user having Exchange Administrator 24/7, they are eligible for Exchange Administrator and must activate the role when they need it. Activation can require justification, approval, MFA, and can be time-limited (for example, 4 hours).

PIM setup for admin roles

  1. Identify roles for PIM. Every role above Helpdesk Administrator should be eligible, not permanent. The only permanent Global Admin assignments should be emergency access accounts.
  2. Configure activation settings. Set maximum activation duration (recommended: 4 to 8 hours for most roles). Require MFA on activation. Require justification text for every activation.
  3. Configure approval workflows for high-privilege roles. Global Administrator, Privileged Role Administrator, and Application Administrator activations should require approval from a designated approver (not the same person).
  4. Enable notifications. Send email notifications when roles are activated, when roles are assigned, and when activation requests are pending approval.
  5. Set up access reviews. Configure recurring reviews (quarterly recommended) for all eligible role assignments. The reviewer should be the role assignee's manager or a designated identity governance owner.

Just-in-time activation workflow

Admin needs to perform a privileged task
Admin opens PIM in the Entra portal and requests activation
Admin completes MFA and provides justification
If approval required: request sent to approver(s)
Role activates for the configured duration (e.g. 4 hours)
Admin performs the task
Role automatically deactivates after the time window expires
PIM best practice Do not set activation duration to 24 hours. Longer windows mean longer exposure if the session is compromised. Start with 4 hours for service-specific roles and 1 hour for Global Admin or Privileged Role Admin. Adjust based on operational feedback, but always prefer shorter windows.

Scoped and Administrative Unit roles

Administrative Units (AUs) let you scope directory roles to a subset of users, groups or devices rather than the entire tenant. This is essential for organisations with regional IT teams, business unit delegation, or multi-entity structures where a helpdesk in one country should not be able to reset passwords for users in another country.

When to use Administrative Units

  • Regional helpdesk delegation: Create an AU per region or country. Assign Helpdesk Administrator scoped to each AU. The helpdesk team in Germany can only reset passwords for users in the Germany AU.
  • Business unit user management: Create an AU per business unit. Assign User Administrator scoped to each AU. The HR IT team for Finance can only manage users in the Finance AU.
  • Subsidiary or acquired entity isolation: After an acquisition, create an AU for the acquired entity. Delegate user and group management to the acquired entity's existing IT team without giving them access to the parent organisation's users.
  • Device management segmentation: AUs can contain devices. Scope device-related roles to specific device AUs (for example, kiosk devices vs. standard endpoints).

Roles that support AU scoping

Not all roles can be scoped to an AU. The following roles support AU-scoped assignments:

  • Authentication Administrator
  • Groups Administrator
  • Helpdesk Administrator
  • License Administrator
  • Password Administrator
  • User Administrator

Roles like Exchange Administrator, SharePoint Administrator, Security Administrator and Conditional Access Administrator do not support AU scoping. These roles are always tenant-wide.

AU-supported roles list is not exhaustive Microsoft continues to expand the list of roles that support Administrative Unit scoping. The list above covers the most commonly used AU-scoped roles. Always verify current AU support for a specific role in the Entra admin centre (Administrative Units > select an AU > Roles and administrators) before planning your delegation model.
Restricted management AUs Restricted management Administrative Units (available with Entra ID P2) prevent tenant-level admins from managing objects inside the AU. This is useful for protecting executive accounts or highly sensitive service accounts from being modified by tenant-wide User Administrators.

Emergency access (break-glass) accounts

Emergency access accounts are designed to remain usable when normal admin access paths, Conditional Access dependencies, federation, MFA methods or device-based controls are unavailable.

Setup requirements

  • Create at least two emergency access accounts. They should be cloud-only accounts (not synced from on-premises AD, not federated) with the .onmicrosoft.com UPN domain.
  • Assign Global Administrator permanently. These are the only accounts that should have permanent Global Admin.
  • Exclude emergency access accounts from Conditional Access policies that could block emergency access, such as device compliance, location restrictions, session controls or policies dependent on normal admin devices. The goal is to avoid dependency on the same controls that could lock every administrator out of the tenant.
  • Do not leave emergency access accounts weak. Configure independent, phishing-resistant authentication such as FIDO2 security keys or certificate-based authentication, following Microsoft emergency access guidance. At least one account should use an authentication method that does not depend on any other device or service that could be simultaneously unavailable.
  • Exclude from PIM. Emergency access accounts should not require activation. The whole point is immediate access when normal admin paths are unavailable.
  • Use strong credentials and independent phishing-resistant authentication. If passwords are part of the recovery process, store them in separate secure physical locations and test the process regularly. Do not store credentials in any digital system that requires authentication to access.
  • Do not assign to any real person. Emergency access accounts should not be tied to a named individual. Use a generic display name like "Emergency Access 1".
  • Do not assign licences. Emergency access accounts do not need Exchange, Teams or any workload licences.

Monitoring and testing

  • Configure Azure Monitor or Microsoft Sentinel alerts to trigger on any sign-in to a break-glass account. Any sign-in outside a planned test should trigger an incident response.
  • Test break-glass accounts monthly. Sign in, verify Global Admin access works, verify the account is excluded from CA, and document the test.
  • Review break-glass accounts in every quarterly access review. Verify passwords have not been changed, accounts are not disabled, and monitoring is active.
Critical: do not skip emergency access accounts Without emergency access accounts, a single CA policy misconfiguration or MFA outage can lock every admin out of the tenant. Recovery without emergency access accounts requires a Microsoft support case, which can take days and requires proof of tenant ownership. Set up emergency access accounts before making any changes to admin roles or CA policies.

When Global Admin is actually needed

The list of tasks that genuinely require Global Administrator is much shorter than most admins think. Here are the scenarios where Global Admin is the only option:

  • Initial tenant setup: The first account in a new tenant is always Global Admin. Use it to configure the initial security baseline, create service-specific admin accounts, and then reduce your own role.
  • Purchasing and managing subscriptions (when Billing Administrator is not sufficient for the specific action, such as first-time subscription setup).
  • Elevating to manage all Azure subscriptions (the one-time elevation in Entra ID properties).
  • Consenting to certain first-party Microsoft applications that specifically require Global Admin consent.
  • Modifying organisation-wide settings in the Microsoft 365 admin center that are not delegated to any other role (rare, and becoming rarer as Microsoft adds granular roles).
  • Responding to a Microsoft-initiated recovery process that requires Global Admin verification.
  • Break-glass emergency access when no other admin account is available.
The realistic Global Admin count Microsoft recommends fewer than five Global Administrators. Microsoft also recommends two cloud-only emergency access accounts permanently assigned the Global Administrator role. A practical model for many organisations is two emergency access accounts plus a very small number of named administrators using eligible Global Admin through PIM. If you have more than five permanent Global Admins, you almost certainly have roles that should be reassigned to service-specific admins.
Privileged Role Administrator is equivalent to Global Admin Privileged Role Administrator can assign any role, including Global Admin, to any user. Treat it with the same governance as Global Admin: PIM eligible only, approval workflow required, and included in every access review that covers Global Admin. Do not use Privileged Role Administrator as a "lighter" alternative to Global Admin — the security impact is the same.

Everything else has a specific role. Password resets, user management, Exchange configuration, SharePoint administration, security operations, compliance management, Teams administration, Intune management, application management, licence assignment, authentication policy, and Conditional Access all have dedicated built-in roles that do not require Global Admin.

Custom roles in Entra ID

Custom roles let you create a role with a specific set of permissions that does not match any built-in role. They are most commonly used for application management delegation, where you want to allow a team to manage a specific app registration without giving them Application Administrator over all apps.

When to create custom roles

  • No built-in role provides the exact permissions needed (too broad or too narrow).
  • You need to scope application management to specific app registrations.
  • You want to delegate specific app registration tasks (create, update credentials, manage owners) without granting full Application Administrator.
  • You need a read-only role for a specific set of directory objects that does not exist as a built-in role.

Limitations and governance

  • Custom roles in Entra ID support permissions for application registrations, enterprise applications, users, groups, devices and other directory object operations. Microsoft continues to expand the available permission set. However, you cannot create custom roles for service-specific permissions in Exchange, SharePoint, Intune, Purview or Defender. Validate the current list of available permissions in the Entra admin centre before designing a custom role.
  • Each tenant can have up to 5,000 custom roles.
  • Custom roles can be assigned at tenant scope or at individual resource scope (specific app registration).
  • Custom roles are visible in PIM and can be made eligible like built-in roles.
  • Document every custom role: its purpose, the permissions it contains, who requested it, who approved it, and when it should be reviewed.
  • Review custom roles semi-annually. Remove any custom role that is no longer assigned or no longer needed.
Custom role governance Custom roles are easy to create and hard to maintain. Without documentation and regular review, they become orphaned permissions that nobody understands. Before creating a custom role, exhaust all built-in role options. If a built-in role is 90% right, it is usually better to accept the extra 10% of permissions than to create a custom role that must be maintained forever.

Conditional Access for admin roles

Admin accounts are the highest-value targets in any tenant. Conditional Access policies for admin roles should be stricter than policies for regular users. At minimum, named human admin accounts should require phishing-resistant MFA. For interactive admin portal access, a compliant or managed device should also be required where operationally feasible. Emergency access accounts and workload identities need separate controls.

Recommended CA policies for admins

PolicyTargetGrant controlsNotes
Require phishing-resistant MFA for adminsAll users in directory roles (Global Admin, User Admin, Exchange Admin, etc.)Require authentication strength: Phishing-resistant MFA (FIDO2, Windows Hello, certificate-based)Do not use basic MFA (SMS, phone call) for admin roles. These methods are vulnerable to SIM swap and social engineering.
Require compliant device for admin portalsAll admin roles accessing admin portals (Entra, M365 Admin, Exchange Admin Center, etc.)Require device compliance (Intune-managed)Prevents admin access from unmanaged personal devices.
Block admin access from untrusted locationsAll admin rolesBlock access from locations not in the named locations allowlistDefine trusted locations (office networks, VPN exit points). Block all other locations for admin roles.
Require re-authentication for privileged actionsGlobal Admin, Privileged Role AdminSign-in frequency: every 4 hoursForces session refresh. Limits the window of a compromised session.
Block legacy authentication for adminsAll admin rolesBlock access from client apps using legacy authenticationShould already be blocked tenant-wide, but enforce specifically for admin roles as a safety net.
Always exclude emergency access accounts from blocking CA policies Every CA policy that could block emergency access must exclude your emergency access accounts. If emergency access accounts are subject to device compliance, location restrictions or policies dependent on normal admin infrastructure, you lose your emergency access path when that infrastructure is unavailable. This is the most common emergency access mistake and the one with the worst consequences.
Protected actions in Conditional Access Protected actions allow supported Microsoft Entra permissions to require an authentication context through Conditional Access. Use them for supported high-impact operations such as changes to Conditional Access or authentication method policies, but always validate which permissions are currently supported.

Access review process

Role assignments drift over time. People change jobs, projects end, temporary access becomes permanent, and nobody removes the role. Access reviews are the mechanism that catches this drift before it becomes a security problem.

Quarterly review framework

Review itemWho reviewsWhat to checkAction if failed
Global Admin assignmentsCISO or Security LeadCount of permanent GA. Each GA has documented justification. Break-glass accounts are tested.Remove unjustified permanent GA. Convert to PIM eligible or reassign to specific role.
PIM eligible assignmentsRole owner or managerEach eligible assignment is still needed. User still performs the tasks that require the role.Remove eligible assignment if no longer needed. Reduce scope if possible.
Permanent role assignmentsIdentity governance teamEach permanent assignment has justification. Could any be converted to PIM eligible?Convert to PIM eligible. Remove if no longer needed.
Custom rolesApplication owner + identity teamCustom role is still assigned. Permissions are still accurate. No built-in role has been created that replaces it.Delete custom role if unused. Replace with built-in role if one now exists.
Emergency access accountsSecurity teamAccounts can sign in. Excluded from blocking CA policies. Independent phishing-resistant auth configured. Monitoring is active. Last test date documented.Fix exclusion, authentication or monitoring gap. Re-test immediately.
Service accounts with admin rolesApplication ownerService account still needs the role. Credentials are rotated. Account is monitored.Remove role if not needed. Implement managed identity or workload identity if possible.
Automate with Entra access reviews Entra ID access reviews (P2 or Governance licence) can automate the review process. Configure a recurring review for each role, assign reviewers, set auto-apply to remove access if no response is received within the review period, and track compliance over time.

Rollout order

Do not try to redesign your entire admin role model in one change window. Roll it out in phases, validate each phase, and only proceed when the previous phase is stable.

  1. Phase 1: Inventory and document Export all current role assignments. Document who has what, why, and how often they use it. Identify every Global Admin. This is your baseline.
  2. Phase 2: Break-glass accounts Create (or validate) two emergency access accounts with permanent Global Admin. Exclude from blocking CA policies. Configure independent phishing-resistant authentication. Configure monitoring alerts. Test sign-in. This must be in place before any role changes.
  3. Phase 3: Conditional Access for admins Deploy CA policies requiring phishing-resistant MFA and compliant devices for all admin roles. Exclude break-glass accounts. Start in report-only mode, validate for one week, then enforce.
  4. Phase 4: Enable PIM Enable PIM for the tenant (requires P2). Do not change any assignments yet. Configure PIM settings: activation duration, MFA on activation, justification required, notifications.
  5. Phase 5: Convert highest-risk roles to PIM eligible Start with Global Admin. Convert all permanent Global Admin assignments (except break-glass) to PIM eligible. Validate that admins can activate, perform tasks, and deactivation works correctly.
  6. Phase 6: Convert service-specific roles to PIM eligible Move Exchange Admin, SharePoint Admin, Security Admin, Intune Admin, and other high-privilege roles from permanent to PIM eligible. Validate with each team.
  7. Phase 7: Implement scope restrictions Create Administrative Units for regional or business unit delegation. Re-assign Helpdesk Admin, User Admin, and Groups Admin to AU-scoped assignments where appropriate.
  8. Phase 8: Reduce Global Admin count Re-assess every remaining Global Admin assignment. Replace with specific roles where possible. Target: fewer than five total Global Admins, including two emergency access accounts (permanent) plus a very small number of named users (PIM eligible with approval).
  9. Phase 9: Configure access reviews Set up recurring access reviews for all roles. Assign reviewers. Configure auto-apply for no-response. Run the first review cycle and address findings.
  10. Phase 10: Ongoing governance Establish a regular cadence: quarterly reviews, monthly break-glass tests, annual role model assessment. Document the process and assign ownership.

Common mistakes

  1. Giving Global Admin because it is easier than finding the right role. This is the most common mistake. Every Global Admin assignment that exists because "we did not know which role to use" is unnecessary privilege that increases your attack surface.
  2. No emergency access accounts. Without emergency access accounts, a single CA misconfiguration or MFA outage can lock every admin out of the tenant. Recovery through Microsoft support takes days.
  3. Emergency access accounts subject to blocking Conditional Access policies. If your emergency access accounts must satisfy device compliance, location requirements or policies dependent on normal admin devices, they cannot serve as emergency access. Exclude them from CA policies that could block access when normal admin infrastructure is unavailable. Configure independent phishing-resistant authentication instead.
  4. PIM available but not used. Many tenants have Entra ID P2 licences (often through M365 E5) but never configured PIM. The licence cost is already paid. The feature is sitting unused.
  5. 24-hour PIM activation windows. A 24-hour activation is functionally equivalent to permanent assignment. If a session is compromised during that window, the attacker has the role for a full day. Use 4-hour windows for most roles.
  6. No approval workflow for Global Admin activation. If anyone can activate Global Admin through PIM without approval, PIM is reduced to a logging mechanism. High-privilege roles should require approval from a different person.
  7. Stacking multiple high-privilege roles on one account. User Admin + Exchange Admin + Security Admin on one account is effectively Global Admin. If one person needs multiple roles, use PIM so only one is active at a time.
  8. Using shared admin accounts. Shared accounts have no individual accountability. Every admin action should be traceable to a named person. Use named accounts with role assignments, not shared accounts.
  9. Never reviewing role assignments. Roles accumulate over time. People leave, change jobs, or finish projects, but their roles remain. Without regular reviews, you will have role assignments for people who no longer need them.
  10. Admin accounts without MFA. Any admin account without MFA is an open door. Phishing-resistant MFA (FIDO2, Windows Hello) should be the standard for all admin roles, not just Global Admin.
  11. Admins using their admin account for daily email and Teams. Admin accounts should be separate from daily-use accounts. If an admin reads email and browses the web with an account that has Exchange Administrator, a phishing email can lead directly to admin compromise.
  12. Service accounts with Global Admin. Automated tools and service accounts should use the minimum role needed, preferably with managed identities. A service account with Global Admin and a static password is a persistent backdoor.
  13. No monitoring of admin sign-ins. If nobody monitors when admin accounts sign in, where they sign in from, and what they do, a compromised admin account can operate undetected for weeks or months.
  14. Ignoring service-specific admin portals. Exchange, SharePoint, Intune, Defender and Purview all have their own admin roles and portals. Using only Entra ID roles misses the role granularity available within each service.
  15. Custom roles without documentation or review. Custom roles that are created and forgotten become mystery permissions that nobody understands. Document every custom role and review them regularly.
  16. Removing all Global Admins without testing break-glass first. Reducing Global Admin count is the right goal, but removing the last non-break-glass Global Admin before verifying that break-glass accounts work is a lockout risk.

Field notes

The 14 Global Admin tenant

A 2,000-user tenant had 14 permanent Global Admins. When we mapped each person's actual tasks, 11 of them only needed Helpdesk Administrator or User Administrator. Two needed Exchange Administrator. Only the CISO needed occasional Global Admin access, which we moved to PIM eligible. Final count: 2 break-glass + 1 PIM eligible.

PIM resistance from the IT director

The IT director refused PIM because he wanted "instant access when things break". We configured PIM with no approval and a 1-hour window for his Security Administrator role. He found that activation takes 15 seconds. The "things break" scenario he feared happened once in 6 months. He now advocates PIM for every role.

Break-glass saved a tenant

An admin deployed a CA policy that accidentally blocked all admin accounts including the admin who created the policy. The only access path was the break-glass account. It took 4 minutes to sign in and fix the policy. Without it, the estimated recovery time through Microsoft support was 48 to 72 hours.

Service account with Global Admin

A migration tool was configured with a service account that had Global Admin and a password that had not been changed in 3 years. The migration finished 2 years ago. The account was still active. We found it during a role audit and removed it immediately. This is the most common "hidden" risk in every tenant.

Administrative Units for a multi-country org

A company with offices in 8 countries gave their regional helpdesks tenant-wide User Administrator. An admin in Brazil accidentally deleted a user account in Germany. We implemented AU-scoped Helpdesk Administrator per country. Each regional team can only manage users in their own country's AU. No more cross-region incidents.

The role stacking problem

An admin had User Admin + Exchange Admin + SharePoint Admin + Intune Admin. When we asked why, the answer was "we wanted to avoid giving Global Admin". The combined permissions of those four roles covered nearly everything Global Admin can do. We split the workload across three people with one role each.

Quarterly reviews that actually work

The first time a tenant ran an access review, they found 23 role assignments for people who had left the company or changed roles. The assignments had accumulated over 4 years without review. After implementing quarterly reviews, they now find 2 to 3 stale assignments per cycle. The drift never gets out of control.

Phishing-resistant MFA for admins

A tenant required only SMS-based MFA for admin accounts. An attacker SIM-swapped the Exchange Administrator's phone number and gained access to the Exchange admin center. After the incident, they deployed FIDO2 security keys for all admin roles. The cost was less than the incident response.

What to fix first

If you can only do six things this quarter, do these. They are listed in priority order based on security impact and effort required.

PriorityActionWhy it mattersEffortImpact
1Create and test emergency access accountsWithout them, a single mistake can lock you out of your tenant for days.Low (1 to 2 hours)Critical
2Require phishing-resistant MFA for all admin rolesSMS and phone call MFA are not sufficient for admin accounts. FIDO2 or Windows Hello prevents the most common admin compromise vector.Medium (requires key distribution)Critical
3Enable PIM and convert Global Admin to eligiblePermanent Global Admin is the highest-risk configuration in any tenant. PIM eligible with approval workflow reduces the exposure window from 24/7 to minutes.Medium (P2 licence, configuration, training)High
4Audit and reduce Global Admin countEvery unnecessary Global Admin is an additional attack surface. Most tenants can reduce from 5 to 15 permanent GAs to fewer than five total, including two emergency access accounts plus a very small number of PIM eligible named users.Medium (requires role reassignment)High
5Deploy CA policies for admin rolesAdmin accounts should have stricter CA policies than regular users: compliant devices, trusted locations, session limits.Medium (CA policy design and testing)High
6Set up quarterly access reviewsRole assignments drift over time. Automated reviews catch stale assignments before they become a security problem.Low (P2 licence, configuration)Medium

Recommended first 3 actions

If you want to start today, these are the three actions that deliver the most security improvement with the least disruption.

ActionWhat to doExpected outcome
1. Create emergency access accountsCreate 2 cloud-only accounts with .onmicrosoft.com UPN. Assign permanent Global Admin. Exclude from blocking CA policies. Configure independent phishing-resistant authentication (FIDO2 or certificate-based). Store recovery credentials in separate secure physical locations. Configure sign-in monitoring alerts in Azure Monitor or Sentinel. Test sign-in.Emergency access path established. Tenant is protected against admin lockout scenarios.
2. Enable PIM for Global AdminEnable PIM (requires Entra ID P2). Convert all permanent Global Admin assignments (except break-glass) to PIM eligible. Set activation duration to 1 hour. Require MFA on activation. Require justification. Configure approval workflow with CISO or security lead as approver. Enable activation notifications.Global Admin exposure window drops from 24/7 to minutes per activation. Every activation is logged with justification and approver.
3. Deploy phishing-resistant MFA for adminsCreate a CA policy targeting all users in admin directory roles. Require authentication strength: Phishing-resistant MFA. Exclude break-glass accounts. Deploy in report-only for 1 week, then enforce. Distribute FIDO2 security keys or configure Windows Hello for Business for all admins.Admin accounts protected against SIM swap, phone-based phishing, and social engineering attacks on MFA.

What good looks like

Use this checklist to evaluate whether your admin role model meets the standard for a well-governed Microsoft 365 tenant.

  • Global Admin count is fewer than five total: two emergency access accounts (permanent) plus a very small number of named users (PIM eligible with approval workflow).
  • Every admin task is mapped to the minimum built-in role that can perform it. No admin uses Global Admin for service-specific tasks.
  • PIM is enabled and configured for all roles above Helpdesk Administrator. Activation requires MFA and justification. High-privilege roles require approval.
  • Emergency access accounts exist, are excluded from blocking CA policies, use independent phishing-resistant authentication, are monitored with alerts, and are tested monthly with documented results.
  • Conditional Access policies require phishing-resistant MFA and compliant devices for all admin roles. Emergency access accounts are excluded from policies that could block emergency access.
  • Administrative Units are used for regional or business unit delegation. Helpdesk and User Administrator roles are scoped to AUs where the operational model requires it.
  • No shared admin accounts exist. Every admin action is traceable to a named individual.
  • Service accounts with admin roles use managed identities where possible. Static credentials are rotated on a defined schedule and monitored.
  • Quarterly access reviews are configured for all admin roles. Reviewers are assigned. Auto-apply is enabled for no-response. Findings are tracked and resolved.
  • Admin sign-ins are monitored. Anomalous sign-in activity triggers alerts. Sign-in logs are retained for at least 90 days.
  • Custom roles are documented with purpose, permissions, owner, and review date. No orphaned custom roles exist.
  • The admin role model is documented, owned by a named individual or team, and reviewed annually for alignment with organisational changes.

Save as PDF

Use your browser's built-in print function to save this guide as a PDF. The layout is print-optimised: the sidebar navigation and interactive buttons are hidden, tables avoid page breaks, and the builder results (if generated) are included.

To save: Press Ctrl + P (Windows/Linux) or Cmd + P (Mac), select "Save as PDF" as the destination, and click Save.

Print tip: Run the builder assessment before printing if you want the results included in the PDF. The assessment results will be visible in the printed version.

Microsoft references

Conditional Access Policy Builder 2026

Design and validate Conditional Access policies with an interactive builder. Covers authentication strength, device compliance, location-based controls and session management for admin and user scenarios.

M365 Tenant Health Scorecard 2026

Assess your Microsoft 365 tenant health across identity, devices, data, apps and infrastructure. Includes scoring, benchmarks and remediation priorities.

Microsoft 365 Licensing Decision Builder 2026

Map your feature requirements to the right Microsoft 365 licence. Covers E3 vs E5, add-on licencing for PIM, Defender and Purview, and cost optimisation.

PAW vs Conditional Access 2026

Compare Privileged Access Workstations and Conditional Access as admin protection strategies. Covers when each approach is appropriate, how they complement each other, and implementation guidance.

Zero Trust Security Blueprint for Microsoft 365 2026

End-to-end Zero Trust architecture for Microsoft 365. Covers identity, devices, apps, data, infrastructure and network with implementation phases and maturity levels.

Microsoft Secure Score: What to Fix First 2026

Prioritise Secure Score recommendations by security impact and implementation effort. Includes a decision framework for which actions to take first and which to defer.

Conditional Access Exclusions Audit 2026

Audit and remediate CA policy exclusions. Covers identifying over-excluded policies, break-glass account validation, and building a sustainable exclusion governance process.

This guide is part of the Security and Compliance series at tiagoscarvalho.com

Previous
Previous

Sensitivity Labels Decision Builder 2026: Classification Is Governance, Not Just Marking

Next
Next

Microsoft Defender for Office 365 Policy Builder 2026: Standard, Strict or Custom (Copy)