đź“‹ Microsoft Entra Documentation Changes

Daily summary for changes since March 23rd 2026, 9:27 PM PDT

Report generated on March 24th 2026, 9:27 PM PDT

📊 Summary

37
Total Commits
0
New Files
36
Modified Files
0
Deleted Files
15
Contributors

📝 Modified Documentation Files

+9 / -9 lines changed
Commit: Editorial cleanup: 12 GSA kenwith-owned articles (25 fixes)
Changes:
Before
After
|Nudity | Sites that contain full or partial nudity that aren't necessarily overtly sexual in intent.|
|Pornography/sexually explicit |Sites that contain explicit sexual content. Includes adult products such as sex toys, CD-ROMs, and videos, adult services such as videoconferencing, escort services, and strip clubs, erotic stories, and textual descriptions of sexual acts. |
|Remote Access| Sites that enable users to remotely control and access computers or devices over the internet, facilitating support, collaboration, and management from a distance. |
|Self-harm |Sites that promote actions that are relating to harming oneself, such as suicide, anorexia, bulimia, and so on. |
|Sex education | Sites relating to sex education, including subjects such as respect for partner, abortion, contraceptives, sexually transmitted diseases, and pregnancy. |
|Tasteless |Sites with offensive or tasteless content, including profanity. |
|Violence | Sites that contain images or text depicting or advocating physical assault against humans, animals, or institutions. Sites of gruesome nature. |
|Code repositories| Sites that host and manage source code repositories, enabling version control, collaboration, and code sharing among developers.|
|Computers + technology |Sites that contain information such as product reviews, discussions, and news about computers, software, hardware, peripheral, and computer services. |
|Education | Sites sponsored by educational institutions and schools of all types including distance education. Includes general educational and reference materials such as dictionaries, encyclopedias, online courses, teaching aids and discussion guides. |
|Finance | Sites related to banking, finance, payment or investment, including banks, brokerages, online stock trading, stock quotes, fund management, insurance companies, credit unions, credit card companies, and so on. |
|Forums + newsgroups | Sites for sharing information in the form of newsgroups, forums, bulletin boards. Doesn't include personal blogs. |
|Government | Sites run by governmental or military organizations, departments, or agencies, including police departments, fire departments, customs bureaus, emergency services, civil defense, and counterterrorism organizations. |
|Health + medicine | Sites containing information pertaining to health, healthcare services, fitness, and well-being, including information about medical equipment, hospitals, drugstores, nursing, medicine, procedures, prescription medications, and so on. |
|Job search | Sites containing job listings, career information, assistance with job searches (such as resume writing, interviewing tips, and so on), employment agencies, or head hunters. |
|News | Sites covering news and current events such as newspapers, newswire services, personalized news services, broadcasting sites, and magazines. |
|Nonprofits + NGOs | Sites devoted to clubs, communities, unions, and non-profit organizations. Many of these groups exist for educational or charitable purposes. |
|Personal sites | Sites about or hosted by personal individuals, including those hosted on commercial sites such as Blogger, AOL, and so on. |
|Private IP addresses | Sites that are private IP addresses as defined in RFC 1918, that is, hosts that don't require access to hosts in other enterprises (or require limited access) and whose IP address might be ambiguous between enterprises but are well-defined within a certain enterprise. |
|Professional networking | Sites that enable professional networking for online communities. |
|Nudity | Sites that contain full or partial nudity that aren't necessarily overtly sexual in intent.|
|Pornography/sexually explicit |Sites that contain explicit sexual content. Includes adult products such as sex toys, CD-ROMs, and videos, adult services such as videoconferencing, escort services, and strip clubs, erotic stories, and textual descriptions of sexual acts. |
|Remote Access| Sites that enable users to remotely control and access computers or devices over the internet, facilitating support, collaboration, and management from a distance. |
|Self-harm |Sites that promote actions that are relating to harming oneself, such as suicide, anorexia, bulimia. |
|Sex education | Sites relating to sex education, including subjects such as respect for partner, abortion, contraceptives, sexually transmitted diseases, and pregnancy. |
|Tasteless |Sites with offensive or tasteless content, including profanity. |
|Violence | Sites that contain images or text depicting or advocating physical assault against humans, animals, or institutions. Sites of gruesome nature. |
|Code repositories| Sites that host and manage source code repositories, enabling version control, collaboration, and code sharing among developers.|
|Computers + technology |Sites that contain information such as product reviews, discussions, and news about computers, software, hardware, peripheral, and computer services. |
|Education | Sites sponsored by educational institutions and schools of all types including distance education. Includes general educational and reference materials such as dictionaries, encyclopedias, online courses, teaching aids and discussion guides. |
|Finance | Sites related to banking, finance, payment or investment, including banks, brokerages, online stock trading, stock quotes, fund management, insurance companies, credit unions, credit card companies. |
|Forums + newsgroups | Sites for sharing information in the form of newsgroups, forums, bulletin boards. Doesn't include personal blogs. |
|Government | Sites run by governmental or military organizations, departments, or agencies, including police departments, fire departments, customs bureaus, emergency services, civil defense, and counterterrorism organizations. |
|Health + medicine | Sites containing information pertaining to health, healthcare services, fitness, and well-being, including information about medical equipment, hospitals, drugstores, nursing, medicine, procedures, prescription medications. |
|Job search | Sites containing job listings, career information, assistance with job searches (such as resume writing, interviewing tips), employment agencies, or head hunters. |
|News | Sites covering news and current events such as newspapers, newswire services, personalized news services, broadcasting sites, and magazines. |
|Nonprofits + NGOs | Sites devoted to clubs, communities, unions, and non-profit organizations. Many of these groups exist for educational or charitable purposes. |
|Personal sites | Sites about or hosted by personal individuals, including those hosted on commercial sites such as Blogger, AOL. |
|Private IP addresses | Sites that are private IP addresses as defined in RFC 1918, that is, hosts that don't require access to hosts in other enterprises (or require limited access) and whose IP address might be ambiguous between enterprises but are well-defined within a certain enterprise. |
|Professional networking | Sites that enable professional networking for online communities. |
Modified by Ortagus Winfrey on Mar 24, 2026 11:30 AM
đź“– View on learn.microsoft.com
+7 / -7 lines changed
Commit: Updates
Changes:
Before
After
 
**What’s changing**
 
Beginning June 1 2026, Microsoft Entra ID will block any attempt by Microsoft Entra Connect Sync or Cloud Sync from hard-matching a new user object from Active Directory to an existing cloud-managed Microsoft Entra ID user object that holds [privileged roles](https://docs.azure.cn/en-us/entra/identity/role-based-access-control/permissions-reference#all-roles).
 
**This means:**
 
* If a cloud managed user already has [onPremisesImmutableId (sourceAnchor)](../identity/hybrid/connect/plan-connect-design-concepts.md#sourceanchor) set and is assigned a privileged role, Microsoft Entra Connect Sync or Cloud Sync will no longer be able to take over the Source of Authority of that user by hard-matching with an incoming user object from Active Directory.  
* This safeguard prevents attackers from taking over privileged cloud managed users in Microsoft Entra by manipulating attributes of user objects in Active Directory. 
 
**What’s not changing**
 
* Hard match operations for non-privileged accounts aren't affected.  
* [Soft match](../identity/hybrid/connect/how-to-connect-install-existing-tenant.md?source=recommendations#hard-match-vs-soft-match) behavior isn't affected.  
 
**Customer action required**
 
**What’s changing**
 
Beginning **June 1, 2026**, Microsoft Entra ID will block any attempt by Entra Connect Sync or Cloud Sync from hard-matching a new user object from Active Directory to an existing cloud-managed Entra ID user object that hold [Microsoft Entra roles](../identity/role-based-access-control/permissions-reference.md).
 
**This means**:
 
- If a cloud managed user already has [onPremisesImmutableId (sourceAnchor)](..//identity/hybrid/connect/plan-connect-design-concepts.md#sourceanchor) set and is assigned a Microsoft Entra role, Microsoft Entra Connect Sync or Cloud Sync will no longer be able to take over the Source of Authority of that user by hard-matching with an incoming user object from Active Directory.
- This safeguard prevents attackers from taking over privileged cloud managed users in Entra by manipulating attributes of user objects in Active Directory.
 
**What’s not changing**
 
- Hard match operations for cloud users without Microsoft Entra roles are not affected.   
- [Soft match](../identity/hybrid/connect/how-to-connect-install-existing-tenant.md?source=recommendations#hard-match-vs-soft-match) behavior isn't affected.
- Ongoing sync from Active Directory to Entra ID for previously hard-matched objects will not be affected.   
 
**Customer action required**
+4 / -4 lines changed
Commit: Editorial cleanup: 12 GSA kenwith-owned articles (25 fixes)
Changes:
Before
After
 
![Screenshot showing an example of the expected final configuration file.](media/troubleshoot-connectors/connector-logging-config-final-example.png)
 
After you enable logging, attempt to access the resource from the Global Secure Access client in order to reproduce the error. Then, review the log file for errors.
 
 
 
The updater service is healthy if it's running and there are no errors recorded in the event log (Applications and Services logs -> Microsoft -> Microsoft Entra private network -> Updater -> Admin).
 
> [!IMPORTANT]
> Only major versions are released for auto-upgrade. We recommend updating your connector manually only if it's necessary. For example, you can't wait for a major release, because you must fix a known problem or you want to use a new feature. For more information on new releases, the type of the release (download, auto-upgrade), bug fixes, and new features see, [Microsoft Entra private network connector: Version release history](reference-version-history.md).
 
To manually upgrade a connector:
 
- Download the latest version of the connector. (Find it in the Microsoft Entra admin center at **Global Secure Access** > **Connect** > **Connectors**)
- The installer restarts the Microsoft Entra private network connector services. In some cases, a reboot of the server might be required if the installer can't replace all files. Therefore we recommend closing all applications (that is, Event Viewer) before you start the upgrade.
- Run the installer. The upgrade process is quick and doesn't require providing any credentials and the connector isn't re-registered.
**Can private network connector services run in a different user context than the default?**
 
![Screenshot showing an example of the expected final configuration file.](media/troubleshoot-connectors/connector-logging-config-final-example.png)
 
After you enable logging, attempt to access the resource from the Global Secure Access client to reproduce the error. Then, review the log file for errors.
 
 
 
The updater service is healthy if it's running and there are no errors recorded in the event log (Applications and Services logs -> Microsoft -> Microsoft Entra private network -> Updater -> Admin).
 
> [!IMPORTANT]
> Only major versions are released for auto-upgrade. Update your connector manually only if it's necessary. For example, you can't wait for a major release, because you must fix a known problem or you want to use a new feature. For more information on new releases, the type of the release (download, auto-upgrade), bug fixes, and new features see, [Microsoft Entra private network connector: Version release history](reference-version-history.md).
 
To manually upgrade a connector:
 
- Download the latest version of the connector. (Find it in the Microsoft Entra admin center at **Global Secure Access** > **Connect** > **Connectors**)
- The installer restarts the Microsoft Entra private network connector services. In some cases, a reboot of the server might be required if the installer can't replace all files. Therefore close all applications (that is, Event Viewer) before you start the upgrade.
- Run the installer. The upgrade process is quick and doesn't require providing any credentials and the connector isn't re-registered.
**Can private network connector services run in a different user context than the default?**
+3 / -3 lines changed
Commit: Editorial cleanup: 12 GSA kenwith-owned articles (25 fixes)
Changes:
Before
After
---
title: Enable Compliant Network Check with Conditional Access
description: Learn how to require known compliant network locations in order to connect to your secured resources with Conditional Access.
ms.topic: how-to
ms.date: 03/13/2026
ms.reviewer: smistry
 
Organizations that use Conditional Access along with the Global Secure Access can prevent malicious access to Microsoft apps, third-party SaaS apps, and private line-of-business (LoB) apps using multiple conditions to provide defense-in-depth. These conditions might include strong factor authentication, device compliance, location, and others. Enabling these conditions protects your organization against user identity compromise or token theft. Global Secure Access introduces the concept of a compliant network within Microsoft Entra ID Conditional Access. This compliant network check ensures users connect via the Global Secure Access service for their specific tenant and are compliant with security policies enforced by administrators.
 
The Global Secure Access Client installed on devices or users behind configured remote networks allows administrators to secure resources behind a compliant network with advanced Conditional Access controls. This compliant network feature makes it easier for administrators to manage access policies, without having to maintain a list of egress IP addresses and removes the requirement to hairpin traffic through organization's VPN in order to maintain source IP anchoring and apply IP-based Conditional Access policies.
For more information about Conditional Access, see [What is Conditional Access?](../identity/conditional-access/overview.md)
 
## Compliant network check enforcement
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../identity/role-based-access-control/permissions-reference.md#conditional-access-administrator).
1. Browse to **Entra ID** > **Conditional Access**.
1. Select **Create new policy**.
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
1. Under **Assignments**, select **Users or workload identities**.
1. Under **Include**, select **All users**.
1. Under **Exclude**, select **Users and groups** and choose your organization's [emergency access or break-glass accounts](#user-exclusions).
---
title: Enable Compliant Network Check with Conditional Access
description: Learn how to require known compliant network locations to connect to your secured resources with Conditional Access.
ms.topic: how-to
ms.date: 03/13/2026
ms.reviewer: smistry
 
Organizations that use Conditional Access along with the Global Secure Access can prevent malicious access to Microsoft apps, third-party SaaS apps, and private line-of-business (LoB) apps using multiple conditions to provide defense-in-depth. These conditions might include strong factor authentication, device compliance, location, and others. Enabling these conditions protects your organization against user identity compromise or token theft. Global Secure Access introduces the concept of a compliant network within Microsoft Entra ID Conditional Access. This compliant network check ensures users connect via the Global Secure Access service for their specific tenant and are compliant with security policies enforced by administrators.
 
The Global Secure Access Client installed on devices or users behind configured remote networks allows administrators to secure resources behind a compliant network with advanced Conditional Access controls. This compliant network feature makes it easier for administrators to manage access policies, without having to maintain a list of egress IP addresses and removes the requirement to hairpin traffic through organization's VPN to maintain source IP anchoring and apply IP-based Conditional Access policies.
For more information about Conditional Access, see [What is Conditional Access?](../identity/conditional-access/overview.md)
 
## Compliant network check enforcement
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../identity/role-based-access-control/permissions-reference.md#conditional-access-administrator).
1. Browse to **Entra ID** > **Conditional Access**.
1. Select **Create new policy**.
1. Give your policy a name. Create a meaningful standard for the names of your policies.
1. Under **Assignments**, select **Users or workload identities**.
1. Under **Include**, select **All users**.
1. Under **Exclude**, select **Users and groups** and choose your organization's [emergency access or break-glass accounts](#user-exclusions).
+3 / -3 lines changed
Commit: Editor's feedback - Allow list & block list fixes - Microsoft 365 Defender portal -> Microsoft Defender portal
Changes:
Before
After
title: Compliance Administrator
description: Compliance Administrator
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
---
 
Users with this role have permissions to manage compliance-related features in the Microsoft Purview portal, Microsoft 365 admin center, Azure, and Microsoft 365 Defender portal. Assignees can also manage all features within the Exchange admin center and create support tickets for Azure and Microsoft 365. For more information, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| ----- | ---------- |
| [Microsoft Purview portal](/purview/purview-portal) | Protect and manage your organization's data across Microsoft 365 services<br>Manage compliance alerts |
| [Microsoft Purview Compliance Manager](/purview/compliance-manager) | Track, assign, and verify your organization's regulatory compliance activities |
| [Microsoft 365 Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | Manage data governance<br>Perform legal and data investigation<br>Manage Data Subject Request<br><br>This role has the same permissions as the [Compliance Administrator role group](/microsoft-365/security/office-365-security/scc-permissions) in Microsoft 365 Defender portal role-based access control. |
| [Intune](/mem/intune/fundamentals/role-based-access-control) | View all Intune audit data |
| [Microsoft Defender for Cloud Apps](/defender-cloud-apps/manage-admins) | Has read-only permissions and can manage alerts<br>Can create and modify file policies and allow file governance actions<br>Can view all the built-in reports under Data Management |
 
title: Compliance Administrator
description: Compliance Administrator
ms.topic: include
ms.date: 03/24/2026
ms.custom: include file
---
 
Users with this role have permissions to manage compliance-related features in the Microsoft Purview portal, Microsoft 365 admin center, Azure, and Microsoft Defender portal. Assignees can also manage all features within the Exchange admin center and create support tickets for Azure and Microsoft 365. For more information, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| ----- | ---------- |
| [Microsoft Purview portal](/purview/purview-portal) | Protect and manage your organization's data across Microsoft 365 services<br>Manage compliance alerts |
| [Microsoft Purview Compliance Manager](/purview/compliance-manager) | Track, assign, and verify your organization's regulatory compliance activities |
| [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | Manage data governance<br>Perform legal and data investigation<br>Manage Data Subject Request<br><br>This role has the same permissions as the [Compliance Administrator role group](/microsoft-365/security/office-365-security/scc-permissions) in Microsoft Defender portal role-based access control. |
| [Intune](/mem/intune/fundamentals/role-based-access-control) | View all Intune audit data |
| [Microsoft Defender for Cloud Apps](/defender-cloud-apps/manage-admins) | Has read-only permissions and can manage alerts<br>Can create and modify file policies and allow file governance actions<br>Can view all the built-in reports under Data Management |
 
+3 / -3 lines changed
Commit: Editor's feedback - Allow list & block list fixes - Microsoft 365 Defender portal -> Microsoft Defender portal
Changes:
Before
After
title: Global Reader
description: Global Reader
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users in this role can read settings and administrative information across Microsoft 365 services but can't take management actions. Global Reader is the read-only counterpart to Global Administrator. Assign Global Reader instead of Global Administrator for planning, audits, or investigations. Use Global Reader in combination with other limited admin roles like Exchange Administrator to make it easier to get work done without the assigning the Global Administrator role. Global Reader works with Microsoft 365 admin center, Exchange admin center, SharePoint admin center, Teams admin center, Microsoft 365 Defender portal, Microsoft Purview portal, Azure portal, and Device Management admin center.
 
Users with this role **cannot** do the following:
 
> Global Reader role has the following limitations:
>
>- OneDrive admin center - OneDrive admin center does not support the Global Reader role
>- [Microsoft 365 Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) - Global Reader can't do content search or see Secure Score.
>- [Teams admin center](/microsoftteams/manage-teams-in-modern-portal) - Global Reader cannot read **Teams lifecycle**, **Analytics & reports**, **IP phone device management**, and **App catalog**. For more information, see [Use Microsoft Teams administrator roles to manage Teams](/microsoftteams/using-admin-roles).
>- [Privileged Access Management](/purview/privileged-access-management) doesn't support the Global Reader role.
>- [Azure Information Protection](/azure/information-protection/what-is-information-protection) - Global Reader is supported [for central reporting](/azure/information-protection/reports-aip) only, and when your Microsoft Entra organization isn't on the [unified labeling platform](/azure/information-protection/faqs#how-can-i-determine-if-my-tenant-is-on-the-unified-labeling-platform).
title: Global Reader
description: Global Reader
ms.topic: include
ms.date: 03/24/2026
ms.custom: include file
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users in this role can read settings and administrative information across Microsoft 365 services but can't take management actions. Global Reader is the read-only counterpart to Global Administrator. Assign Global Reader instead of Global Administrator for planning, audits, or investigations. Use Global Reader in combination with other limited admin roles like Exchange Administrator to make it easier to get work done without the assigning the Global Administrator role. Global Reader works with Microsoft 365 admin center, Exchange admin center, SharePoint admin center, Teams admin center, Microsoft Defender portal, Microsoft Purview portal, Azure portal, and Device Management admin center.
 
Users with this role **cannot** do the following:
 
> Global Reader role has the following limitations:
>
>- OneDrive admin center - OneDrive admin center does not support the Global Reader role
>- [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) - Global Reader can't do content search or see Secure Score.
>- [Teams admin center](/microsoftteams/manage-teams-in-modern-portal) - Global Reader cannot read **Teams lifecycle**, **Analytics & reports**, **IP phone device management**, and **App catalog**. For more information, see [Use Microsoft Teams administrator roles to manage Teams](/microsoftteams/using-admin-roles).
>- [Privileged Access Management](/purview/privileged-access-management) doesn't support the Global Reader role.
>- [Azure Information Protection](/azure/information-protection/what-is-information-protection) - Global Reader is supported [for central reporting](/azure/information-protection/reports-aip) only, and when your Microsoft Entra organization isn't on the [unified labeling platform](/azure/information-protection/faqs#how-can-i-determine-if-my-tenant-is-on-the-unified-labeling-platform).
+2 / -2 lines changed
Commit: stale-article-refresh-march-2026
Changes:
Before
After
title: Protect enterprise generative AI apps with prompt injection protection (preview)
description: "Protect your enterprise generative AI apps from prompt injection attacks with Microsoft's AI Gateway prompt injection protection."
ms.topic: how-to
ms.date: 03/23/2026
ms.author: jayrusso
author: HULKsmashGithub
ms.reviewer: KaTabish
## Known limitations
 
- Prompt Injection Protection currently supports only text prompts. It doesn't support files.
- Prompt Injection Protection supports only JSON-based generative AI apps. It doesn't support apps that use URL-based encoding, like Gemini.
- Prompt Injection Protection supports prompts up to 10,000 characters. Anything longer is truncated.
 
## Related content
title: Protect enterprise generative AI apps with prompt injection protection (preview)
description: "Protect your enterprise generative AI apps from prompt injection attacks with Microsoft's AI Gateway prompt injection protection."
ms.topic: how-to
ms.date: 03/24/2026
ms.author: jayrusso
author: HULKsmashGithub
ms.reviewer: KaTabish
## Known limitations
 
- Prompt Injection Protection currently supports only text prompts. It doesn't support files.
- Prompt Injection Protection supports only JSON-based generative AI apps.
- Prompt Injection Protection supports prompts up to 10,000 characters. Anything longer is truncated.
 
## Related content
Modified by John Flores on Mar 24, 2026 4:28 PM
đź“– View on learn.microsoft.com
+2 / -2 lines changed
Commit: [ZT Assessment] Update 21844
Changes:
Before
After
author: MicrosoftGuyJFlo
ms.service: entra-id
ms.topic: include
ms.date: 10/28/2025
ms.custom: Identity-Secure-Recommendation
# minimumlicense: Free
# sfipillar: Protect identities and secrets
---
Threat actors frequently target legacy management interfaces such as the Azure AD PowerShell module (AzureAD and AzureADPreview), which don't support modern authentication, Conditional Access enforcement, or advanced audit logging. Continued use of these modules exposes the environment to risks including weak authentication, bypass of security controls, and incomplete visibility into administrative actions. Attackers can exploit these weaknesses to gain unauthorized access, escalate privileges, and perform malicious changes.
 
Block the Azure AD PowerShell module and enforce the use of Microsoft Graph PowerShell or Microsoft Entra PowerShell to ensure that only secure, supported, and auditable management channels are available, which closes critical gaps in the attack chain.
 
**Remediation action**
 
author: MicrosoftGuyJFlo
ms.service: entra-id
ms.topic: include
ms.date: 03/24/2026
ms.custom: Identity-Secure-Recommendation
# minimumlicense: Free
# sfipillar: Protect identities and secrets
---
Threat actors frequently target legacy management interfaces such as the Azure AD PowerShell module (AzureAD and AzureADPreview), which don't support modern authentication, Conditional Access enforcement, or advanced audit logging. Continued use of these modules exposes the environment to risks including weak authentication, bypass of security controls, and incomplete visibility into administrative actions. Attackers can exploit these weaknesses to gain unauthorized access, escalate privileges, and perform malicious changes.
 
Block the Azure AD PowerShell module (appID: 1b730954-1685-4b74-9bfd-dac224a7b894) and enforce the use of Microsoft Graph PowerShell or Microsoft Entra PowerShell to ensure that only secure, supported, and auditable management channels are available, which closes critical gaps in the attack chain.
 
**Remediation action**
 
+2 / -2 lines changed
Commit: PR review fix
Changes:
Before
After
---
title: Deploy passkeys with the Conditional Access Optimization Agent
description: Learn how to use the Conditional Access Optimization Agent to safely deploy a passkey program to roll out phishing-resistant authentication methods.
author: shlipsey3
ms.author: sarahlipsey
- Security Administrator
- SharePoint Administrator
- Teams Administrator
- User Administrator
---
title: Deploy passkeys with the Microsoft Entra Conditional Access Optimization Agent
description: Learn how to use the Conditional Access Optimization Agent to safely deploy a passkey program to roll out phishing-resistant authentication methods.
author: shlipsey3
ms.author: sarahlipsey
- Security Administrator
- SharePoint Administrator
- Teams Administrator
- User Administrator
+2 / -2 lines changed
Commit: Editor's feedback - Allow list & block list fixes - Microsoft 365 Defender portal -> Microsoft Defender portal
Changes:
Before
After
title: Global Administrator
description: Global Administrator
ms.topic: include
ms.date: 03/23/2026
ms.custom: include file
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role have access to all administrative features in Microsoft Entra ID, as well as services that use Microsoft Entra identities like the Microsoft 365 Defender portal, the Microsoft Purview portal, Exchange Online, SharePoint Online, and Skype for Business Online. Global Administrators can view Directory Activity logs. Furthermore, Global Administrators can [elevate their access](/azure/role-based-access-control/elevate-access-global-admin) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Microsoft Entra tenant. The person who signs up for the Microsoft Entra organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
 
> [!NOTE]
> As a best practice, Microsoft recommends that you assign the Global Administrator role to fewer than five people in your organization. For more information, see [Best practices for Microsoft Entra roles](../best-practices.md).
title: Global Administrator
description: Global Administrator
ms.topic: include
ms.date: 03/24/2026
ms.custom: include file
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role have access to all administrative features in Microsoft Entra ID, as well as services that use Microsoft Entra identities like the Microsoft Defender portal, the Microsoft Purview portal, Exchange Online, SharePoint Online, and Skype for Business Online. Global Administrators can view Directory Activity logs. Furthermore, Global Administrators can [elevate their access](/azure/role-based-access-control/elevate-access-global-admin) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Microsoft Entra tenant. The person who signs up for the Microsoft Entra organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
 
> [!NOTE]
> As a best practice, Microsoft recommends that you assign the Global Administrator role to fewer than five people in your organization. For more information, see [Best practices for Microsoft Entra roles](../best-practices.md).
+2 / -2 lines changed
Commit: Editor's feedback - Allow list & block list fixes - Microsoft 365 Defender portal -> Microsoft Defender portal
Changes:
Before
After
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role have permissions to manage security-related features in the Microsoft 365 Defender portal, Microsoft Entra ID Protection, Microsoft Entra Authentication, Azure Information Protection, and Microsoft Purview portal. For more information about Office 365 permissions, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| --- | --- |
| [Microsoft 365 Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | Monitor security-related policies across Microsoft 365 services<br>Manage security threats and alerts<br>View reports |
| [Microsoft Entra ID Protection](~/id-protection/overview-identity-protection.md) | All permissions of the Security Reader role<br>Perform all ID Protection operations except for resetting passwords |
| [Privileged Identity Management](~/id-governance/privileged-identity-management/pim-configure.md) | All permissions of the Security Reader role<br>**Cannot** manage Microsoft Entra role assignments or settings |
| [Microsoft Purview portal](/purview/purview-portal) | Manage security policies<br>View, investigate, and respond to security threats<br>View reports |
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role have permissions to manage security-related features in the Microsoft Defender portal, Microsoft Entra ID Protection, Microsoft Entra Authentication, Azure Information Protection, and Microsoft Purview portal. For more information about Office 365 permissions, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| --- | --- |
| [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | Monitor security-related policies across Microsoft 365 services<br>Manage security threats and alerts<br>View reports |
| [Microsoft Entra ID Protection](~/id-protection/overview-identity-protection.md) | All permissions of the Security Reader role<br>Perform all ID Protection operations except for resetting passwords |
| [Privileged Identity Management](~/id-governance/privileged-identity-management/pim-configure.md) | All permissions of the Security Reader role<br>**Cannot** manage Microsoft Entra role assignments or settings |
| [Microsoft Purview portal](/purview/purview-portal) | Manage security policies<br>View, investigate, and respond to security threats<br>View reports |
+2 / -2 lines changed
Commit: Editor's feedback - Allow list & block list fixes - Microsoft 365 Defender portal -> Microsoft Defender portal
Changes:
Before
After
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role can manage alerts and have global read-only access on security-related features, including all information in Microsoft 365 Defender portal, Microsoft Entra ID Protection, Privileged Identity Management, and Microsoft Purview portal. For more information about Office 365 permissions, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| --- | --- |
| [Microsoft 365 Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | All permissions of the Security Reader role<br/>View, investigate, and respond to security threats alerts<br/>Manage security settings in Microsoft 365 Defender portal |
| [Microsoft Entra ID Protection](~/id-protection/overview-identity-protection.md) | All permissions of the Security Reader role<br>Perform all ID Protection operations except for configuring or changing risk-based policies, resetting passwords, and configuring alert e-mails. |
| [Privileged Identity Management](~/id-governance/privileged-identity-management/pim-configure.md) | All permissions of the Security Reader role |
| [Microsoft Purview portal](/purview/purview-portal) | All permissions of the Security Reader role<br>View, investigate, and respond to security alerts |
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role can manage alerts and have global read-only access on security-related features, including all information in Microsoft Defender portal, Microsoft Entra ID Protection, Privileged Identity Management, and Microsoft Purview portal. For more information about Office 365 permissions, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| --- | --- |
| [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | All permissions of the Security Reader role<br/>View, investigate, and respond to security threats alerts<br/>Manage security settings in Microsoft Defender portal |
| [Microsoft Entra ID Protection](~/id-protection/overview-identity-protection.md) | All permissions of the Security Reader role<br>Perform all ID Protection operations except for configuring or changing risk-based policies, resetting passwords, and configuring alert e-mails. |
| [Privileged Identity Management](~/id-governance/privileged-identity-management/pim-configure.md) | All permissions of the Security Reader role |
| [Microsoft Purview portal](/purview/purview-portal) | All permissions of the Security Reader role<br>View, investigate, and respond to security alerts |
+2 / -2 lines changed
Commit: Editor's feedback - Allow list & block list fixes - Microsoft 365 Defender portal -> Microsoft Defender portal
Changes:
Before
After
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role have global read-only access on security-related feature, including all information in Microsoft 365 Defender portal, Microsoft Entra ID Protection, Privileged Identity Management, and the ability to read Microsoft Entra sign-in reports and audit logs, and in Microsoft Purview portal. For more information about Office 365 permissions, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| --- | --- |
| [Microsoft 365 Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | View security-related policies across Microsoft 365 services<br>View security threats and alerts<br>View reports |
| [Microsoft Entra ID Protection](~/id-protection/overview-identity-protection.md) | View all ID Protection reports and Overview |
| [Privileged Identity Management](~/id-governance/privileged-identity-management/pim-configure.md) | Has read-only access to all information surfaced in Microsoft Entra Privileged Identity Management: Policies and reports for Microsoft Entra role assignments and security reviews.<br>**Cannot** sign up for Microsoft Entra Privileged Identity Management or make any changes to it. In the Privileged Identity Management portal or via PowerShell, someone in this role can activate additional roles (for example, Privileged Role Administrator), if the user is eligible for them. |
| [Microsoft Purview portal](/purview/purview-portal) | View security policies<br>View and investigate security threats<br>View reports |
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
This is a [privileged role](../privileged-roles-permissions.md). Users with this role have global read-only access on security-related feature, including all information in Microsoft Defender portal, Microsoft Entra ID Protection, Privileged Identity Management, and the ability to read Microsoft Entra sign-in reports and audit logs, and in Microsoft Purview portal. For more information about Office 365 permissions, see [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions).
 
| In | Can do |
| --- | --- |
| [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) | View security-related policies across Microsoft 365 services<br>View security threats and alerts<br>View reports |
| [Microsoft Entra ID Protection](~/id-protection/overview-identity-protection.md) | View all ID Protection reports and Overview |
| [Privileged Identity Management](~/id-governance/privileged-identity-management/pim-configure.md) | Has read-only access to all information surfaced in Microsoft Entra Privileged Identity Management: Policies and reports for Microsoft Entra role assignments and security reviews.<br>**Cannot** sign up for Microsoft Entra Privileged Identity Management or make any changes to it. In the Privileged Identity Management portal or via PowerShell, someone in this role can activate additional roles (for example, Privileged Role Administrator), if the user is eligible for them. |
| [Microsoft Purview portal](/purview/purview-portal) | View security policies<br>View and investigate security threats<br>View reports |
+1 / -1 lines changed
Commit: stale-article-refresh-march-2026
Changes:
Before
After
author: HULKsmashGithub
ms.topic: reference
ms.service: global-secure-access
ms.date: 03/09/2026
ms.reviewer: abhijeetsinha
 
#customer intent: As an IT admin, I want to know which certifications Global Secure Access supports so that I can ensure compliance with industry standards.
author: HULKsmashGithub
ms.topic: reference
ms.service: global-secure-access
ms.date: 03/24/2026
ms.reviewer: abhijeetsinha
 
#customer intent: As an IT admin, I want to know which certifications Global Secure Access supports so that I can ensure compliance with industry standards.
+0 / -2 lines changed
Commit: Remove author/ms.author overrides from 5 GSA articles (transfer to folder-level)
Changes:
Before
After
---
title: How to Customize Global Secure Access Block Page
description: Use custom block pages to display organization-specific messaging internet access policies block users from accessing websites.
author: fgomulka
ms.author: frankgomulka
ms.topic: how-to
ms.date: 09/24/2025
ms.reviewer: kenwith
---
title: How to Customize Global Secure Access Block Page
description: Use custom block pages to display organization-specific messaging internet access policies block users from accessing websites.
ms.topic: how-to
ms.date: 09/24/2025
ms.reviewer: kenwith