Organize subscriptions into management groups and assign roles to users - Microsoft Defender for Cloud (2024)

  • Article

Manage your organization’s security posture at scale by applying security policies to all Azure subscriptions linked to your Microsoft Entra tenant.

For visibility into the security posture of all subscriptions linked to a Microsoft Entra tenant, you'll need an Azure role with sufficient read permissions assigned on the root management group.

Organize your subscriptions into management groups

Overview of management groups

Use management groups to efficiently manage access, policies, and reporting on groups of subscriptions, and effectively manage the entire Azure estate by performing actions on the root management group. You can organize subscriptions into management groups and apply your governance policies to the management groups. All subscriptions within a management group automatically inherit the policies applied to the management group.

Each Microsoft Entra tenant is given a single top-level management group called the root management group. This root management group is built into the hierarchy to have all management groups and subscriptions fold up to it. This group allows global policies and Azure role assignments to be applied at the directory level.

The root management group is created automatically when you do any of the following actions:

  • In the Azure portal, select Management Groups.
  • Create a management group with an API call.
  • Create a management group with PowerShell. For PowerShell instructions, see Create management groups for resource and organization management.

Management groups aren't required to onboard Defender for Cloud, but we recommend creating at least one so that the root management group gets created. After the group is created, all subscriptions under your Microsoft Entra tenant will be linked to it.

For a detailed overview of management groups, see the Organize your resources with Azure management groups article.

View and create management groups in the Azure portal

  1. Sign in to the Azure portal.

  2. Search for and select Management Groups.

  3. To create a management group, select Create, enter the relevant details, and select Submit.

    • The Management Group ID is the directory unique identifier that is used to submit commands on this management group. This identifier isn't editable after creation as it is used throughout the Azure system to identify this group.

    • The display name field is the name that is displayed within the Azure portal. A separate display name is an optional field when creating the management group and can be changed at any time.

Add subscriptions to a management group

You can add subscriptions to the management group that you created.

  1. Sign in to the Azure portal.

  2. Search for and select Management Groups.

  3. Select the management group for your subscription.

  4. When the group's page opens, select Subscriptions.

  5. From the subscriptions page, select Add, then select your subscriptions and select Save. Repeat until you've added all the subscriptions in the scope.

    Important

    Management groups can contain both subscriptions and child management groups. When you assign a user an Azure role to the parent management group, the access is inherited by the child management group's subscriptions. Policies set at the parent management group are also inherited by the children.

Assign Azure roles to other users

Assign Azure roles to users through the Azure portal

  1. Sign in to the Azure portal.

  2. Search for and select Management Groups.

  3. Select the relevant management group.

  4. Select Access control (IAM), open the Role assignments tab and select Add > Add role assignment.

  5. From the Add role assignment page, select the relevant role.

  6. From the Members tab, select + Select members and assign the role to the relevant members.

  7. On the Review + assign tab, select Review + assign to assign the role.

Assign Azure roles to users with PowerShell

  1. Install Azure PowerShell.

  2. Run the following commands:

    # Login to Azure as a Global Administrator userConnect-AzAccount
  3. When prompted, sign in with global admin credentials.

    Organize subscriptions into management groups and assign roles to users - Microsoft Defender for Cloud (5)

  4. Grant reader role permissions by running the following command:

    # Add Reader role to the required user on the Root Management Group# Replace "user@domian.com” with the user to grant access toNew-AzRoleAssignment -SignInName "user@domain.com" -RoleDefinitionName "Reader" -Scope "/"
  5. To remove the role, use the following command:

    Remove-AzRoleAssignment -SignInName "user@domain.com" -RoleDefinitionName "Reader" -Scope "/" 

Remove elevated access

Once the Azure roles are assigned to the users, the tenant administrator should remove itself from the user access administrator role.

  1. Sign in to the Azure portal.

  2. In the navigation list, select Microsoft Entra ID and then select Properties.

  3. Under Access management for Azure resources, set the switch to No.

  4. To save your setting, select Save.

Next steps

On this page, you learned how to organize subscriptions into management groups and assign roles to users. For related information, see:

  • Permissions in Microsoft Defender for Cloud
Organize subscriptions into management groups and assign roles to users - Microsoft Defender for Cloud (2024)
Top Articles
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6282

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.