Configure privileged access management

Completed

Configuring Privileged Access Management (PAM) in Microsoft Purview allows organizations to enforce structured access controls, reducing risks associated with standing administrative permissions.

Prerequisites

Before configuring PAM, ensure the following prerequisites are met:

  • Microsoft 365 subscription: Verify that your organization's subscription includes support for PAM. Check subscription details.
  • Appropriate roles: Ensure you have the Global Administrator or Exchange Administrator role to configure PAM.
  • Plan access groups: Determine approvers and system accounts for privileged access requests.

Steps to configure privileged access management

Follow these steps to set up PAM in your organization:

1. Create an approver's group

Approver groups are responsible for reviewing and authorizing privileged access requests. Setting up a mail-enabled security group ensures requests are routed appropriately.

  1. Sign into the Microsoft 365 admin center using your admin credentials.

  2. Navigate to Teams & groups > Active teams & groups using your admin credentials.

  3. Select the Security groups tab, then choose Add a mail-enabled security group.

    Screenshot showing how to add a mail-enabled security group.

  4. On the Set up the basics page, enter the following details:

    • Name: Provide a descriptive name for the group.
    • Description: Add a brief description of the group's purpose.
  5. On the Assign owners page, assign an owner for the group.

  6. On the Add members page, add individuals who will act as approvers.

  7. On the Edit settings page, configure the group email address.

  8. Select Create group. Wait a few minutes for the group to be fully configured.

2. Enable privileged access management

Enabling PAM activates the approval workflows, ensuring that sensitive administrative tasks require elevated permissions granted through controlled processes.

Enable privileged access management using the Microsoft 365 Admin Center

  1. Sign into the Microsoft 365 Admin Center.

  2. Go to Settings > Org settings > Security & privacy > Privileged access.

    Screenshot showing where to access the Privileged access setting.

  3. Select the checkbox for Allow privileged access requests and choose a default approval group.

  4. Assign the approver's group created in Step 1 as the default approval group.

    Screenshot showing how to assign an approval group.

  5. Save and close the settings.

Enable privileged access management using PowerShell

Use the Enable-ElevatedAccessControl cmdlet in Exchange Online PowerShell to enable privileged access management and assign the approver group. This ensures that privileged tasks require approval and defines the group responsible for approving these requests:

Enable-ElevatedAccessControl -AdminGroup '<default approver group>' -SystemAccounts @('<systemAccountUPN1>','<systemAccountUPN2>')

Example:

Enable-ElevatedAccessControl -AdminGroup 'pamapprovers@fabrikam.onmicrosoft.com' -SystemAccounts @('sys1@fabrikamorg.onmicrosoft.com', 'sys2@fabrikamorg.onmicrosoft.com')

The -AdminGroup parameter specifies the mail-enabled security group for approvals, while the -SystemAccounts parameter excludes specific accounts from privileged access controls, allowing essential system operations to continue uninterrupted.

3. Create access policies

Access policies define the rules under which privileged access is granted. These policies ensure that elevated permissions are provided only when necessary and under defined conditions.

Create an access policy using the Microsoft 365 Admin Center

  1. Navigate to Settings > Org settings > Security & privacy > Privileged access.

  2. Select Create policies and manage requests > Manage policies > Add policy.

  3. Configure the policy:

    • Policy type: Task, Role, or Role Group

    • Policy scope: Exchange

    • Policy name: Select from available options

    • Approval type: Manual or Auto

    • Approvers: Select the approver's group, if the Approval type is set to Manual

    Screenshot showing the fields to add a privileged access management policy.

  4. Select Create to add a new privileged access management policy.

Create an access policy using Exchange Management PowerShell

Use the New-ElevatedAccessApprovalPolicy cmdlet in PowerShell to create a privileged access policy. This policy defines the conditions under which elevated tasks are approved and executed:

New-ElevatedAccessApprovalPolicy -Task 'Exchange\<exchange management cmdlet name>' -ApprovalType <Manual, Auto> -ApproverGroup '<default/custom approver group>'

Example:

New-ElevatedAccessApprovalPolicy -Task 'Exchange\New-MoveRequest' -ApprovalType Manual -ApproverGroup 'mbmanagers@fabrikamorg.onmicrosoft.com'
  • -Task: Specifies the Exchange cmdlet that requires privileged access approval.
  • -ApprovalType: Determines whether the approval is handled manually by an approver group (Manual) or automatically (Auto).
  • -ApproverGroup: Identifies the mail-enabled security group responsible for approving requests when -ApprovalType is set to Manual.

4. Test and use privileged access management

Testing ensures that the configured policies and workflows operate as intended, allowing users to submit requests and approvers to act on them.

  • Submit a request: Users can request elevated permissions for tasks by navigating to the Privileged access section in the Microsoft 365 Admin Center or by using PowerShell.

  • Approve a request: Approvers review and act on requests via email notifications or directly in the Microsoft 365 Admin Center.

Configuring privileged access management ensures secure and temporary administrative permissions for sensitive tasks. By creating approver groups, enabling PAM, and defining access policies, organizations can enforce the principle of least privilege and enhance their security posture. Regular audits and reviews further strengthen PAM's effectiveness in safeguarding critical configurations and data.