Microsoft Identity and Access Management Solutions
Introduction
This lab explores core components of Microsoftโs identity and access management solutions, including Microsoft Entra ID (formerly Azure AD), Self-Service Password Reset (SSPR), Conditional Access, and Privileged Identity Management (PIM). Through hands-on tasks, I configured user settings, enabled audit logging, enforced access policies, and managed privileged roles to strengthen cloud security posture.
Objectives
- Configure Microsoft Entra ID user settings and roles
- Enable Microsoft 365 audit logging and file monitoring
- Implement Self-Service Password Reset (SSPR)
- Create Conditional Access policies
- Manage privileged roles using PIM
Prerequisites
- Azure subscription with admin access
- Skillable lab environment
- Familiarity with Microsoft 365 and Azure Portal
Walkthrough
Task 1: Sign In to Microsoft Entra Admin Center
- Accessed the Microsoft Entra admin portal
- Verified tenant and user access
๐ธ Screenshot:entra-signin.pngโ Admin sign-in to Microsoft Entra

Task 2: Explore User Settings
- Navigated to Users > All Users
- Reviewed user roles and authentication methods
- Modified settings for selected accounts
๐ธ Screenshot:entra-user-settings.pngโ Viewing user settings

Task 3: Enable Microsoft 365 Audit Logging
- Opened Microsoft 365 Defender > Audit
- Verified audit logging was already enabled
- Enabled file monitoring for compliance
๐ธ Screenshot:audit-log-enabled.pngโ Audit log status

๐ธ Screenshot: file-monitoring-enabled.png โ File monitoring enabled

Task 4: Configure Self-Service Password Reset (SSPR)
- Accessed Password Reset > Properties
- Enabled SSPR for all users
- Defined authentication methods (email, phone)
๐ธ Screenshot:sspr-properties.pngโ SSPR configuration

Task 5: Test SSPR Functionality
- Simulated password reset from user portal
- Verified multi-factor authentication prompts
- Confirmed successful password change
๐ธ Screenshot:sspr-reset-process.pngโ Reset process flow

Task 6: Create Conditional Access Policy
- Navigated to Security > Conditional Access
- Created policy targeting risky sign-ins
- Required MFA for access to sensitive apps
๐ธ Screenshot:conditional-access-policy.pngโ Policy creation

Task 7: Assign Conditions and Controls
- Selected user group and cloud apps
- Applied sign-in risk condition
- Enabled control: Require MFA
๐ธ Screenshot:conditional-access-controls.pngโ Assigning controls

Task 8: Test Conditional Access Enforcement
- Attempted sign-in from unmanaged device
- Triggered MFA prompt
- Verified access was granted only after compliance
๐ธ Screenshot:conditional-access-test.pngโ Policy enforcement test

Task 9: Explore Privileged Identity Management (PIM)
- Accessed Microsoft Entra > PIM
- Reviewed eligible and active roles
- Assigned just-in-time access to Global Administrator
๐ธ Screenshot:pim-dashboard.pngโ PIM dashboard overview

Task 10: Activate Role and Review Audit Logs
- Activated Global Admin role for limited duration
- Verified approval workflow
- Reviewed audit logs for role activation
๐ธ Screenshot:pim-role-activation.pngโ Role activation flow

๐ธ Screenshot: pim-audit-log.png โ Audit log review
