แก้ไข

แชร์ผ่าน


What are Microsoft Entra recommendations?

Keeping track of all the settings and resources in your tenant can be overwhelming. The Microsoft Entra recommendations feature helps monitor the status of your tenant so you don't have to. These recommendations help ensure your tenant is in a secure and healthy state while also helping you maximize the value of the features available in Microsoft Entra ID.

Microsoft Entra recommendations now include Identity Secure Score recommendations. These recommendations provide similar insights into the security of your tenant. Identity Secure Score recommendations include secure score points, which are calculated as an overall score based on several security factors. For more information, see What is Identity Secure Score.

All these Microsoft Entra recommendations provide you with personalized insights with actionable guidance to:

  • Help you identify opportunities to implement best practices for Microsoft Entra related features.
  • Improve the state of your Microsoft Entra tenant.
  • Optimize the configurations for your scenarios.

This article gives you an overview of how you can use Microsoft Entra recommendations.

How does it work?

On a daily basis, Microsoft Entra ID analyzes the configuration of your tenant. During this analysis, Microsoft Entra ID compares the configuration of your tenant with security best practices and recommendation data. If a recommendation is flagged as applicable to your tenant, the recommendation appears in the Recommendations section of the Microsoft Entra identity overview area. The recommendations are listed in order of priority so you can quickly determine where to focus first.

Screenshot of the Overview page of the tenant with the Recommendations option highlighted.

Your Identity Secure Score, which appears at the top of the page, is a numerical representation of the health of your tenant. Recommendations that apply to the Identity Secure Score are given individual scores in the table at the bottom of the page. These scores are added up to generate your Identity Secure Score. For more information, see What is Identity Secure Score.

Screenshot of the Identity Secure Score.

Each recommendation contains a description, a summary of the value of addressing the recommendation, and a step-by-step action plan. If applicable, impacted resources associated with the recommendation are listed, so you can resolve each affected area. If a recommendation doesn't have any associated resources, the impacted resource type is Tenant level, so your step-by-step action plan impacts the entire tenant and not just a specific resource.

Recommendation availability and license requirements

The recommendations listed in the following table are currently available in public preview or general availability. The license requirements for recommendations in public preview are subject to change. The table provides the impacted resources and links to available documentation.

Recommendation Impacted resources Required license Availability
Enable Microsoft Purview Adaptive Protection and the Insider Risk condition in Conditional Access Users Microsoft Entra Premium P2 Generally available
Convert per-user MFA to Conditional Access MFA Users All licenses Generally available
Migrate applications from AD FS to Microsoft Entra ID Applications All licenses Generally available
Migrate apps and service principals from Azure AD Graph to Microsoft Graph Applications All licenses Public preview
Migrate from ADAL to MSAL Applications All licenses Generally available
Migrate from MFA server to Microsoft Entra MFA Tenant level All licenses Generally Available
Migrate to Microsoft Authenticator Users All licenses Preview
Minimize MFA prompts from known devices Users All licenses Generally available
Remove unused applications Applications Microsoft Entra Workload ID Premium Public preview
Remove unused credentials from applications Applications Microsoft Entra Workload ID Premium Public preview
Renew expiring application credentials Applications Microsoft Entra Workload ID Premium Public preview
Renew expiring service principal credentials Applications Microsoft Entra Workload ID Premium Public preview

Microsoft Entra only displays the recommendations that apply to your tenant, so you might not see all supported recommendations listed.

The Microsoft Entra recommendations feature is the Microsoft Entra specific implementation of Azure Advisor, which is a personalized cloud consultant that helps you follow best practices to optimize your Azure deployments. Azure Advisor analyzes your resource configuration and usage data to recommend solutions that can help you improve the cost effectiveness, performance, reliability, and security of your Azure resources.

Microsoft Entra recommendations use similar data to support you with the roll-out and management of Microsoft's best practices for Microsoft Entra tenants to keep your tenant in a secure and healthy state. The Microsoft Entra recommendations feature provides a holistic view into your tenant's security, health, and usage.

Email notifications (preview)

Microsoft Entra recommendations now generate email notifications when a new recommendation is generated. This new preview feature sends emails to a predetermined set of roles for each recommendation. For example, recommendations that are associated with the health of your tenant's applications are sent to users who have the Application Administrator role.

The following table lists the Microsoft built-in roles that receive email notifications for each recommendation:

Recommendation Title Target Roles
AAD Connect Deprecated Hybrid Identity Administrator
Convert per-user MFA to Conditional Access MFA Security Administrator
Designate more than one Global Administrator Global Administrator
Do not allow users to grant consent to unreliable applications Global Administrator
Do not expire passwords Global Administrator
Enable password hash sync if hybrid Hybrid Identity Administrator
Enable policy to block legacy authentication Conditional Access Administrator, Security Administrator
Enable self-service password reset Authentication Policy Administrator
Ensure all users can complete multifactor authentication Conditional Access Administrator, Security Administrator
Long lived credentials in applications Global Administrator
Migrate Applications from the retiring Azure AD Graph APIs to Microsoft Graph Application Administrator
Migrate applications from AD FS to Microsoft Entra ID Application Administrator, Authentication Administrator Hybrid Identity Administrator
Migrate authentication methods off the legacy MFA & SSPR policies Global Administrator
Migrate from ADAL to MSAL Application Administrator
Migrate from MFA Server to Microsoft Entra MFA Global Administrator
Migrate service principals from the retiring Azure AD Graph APIs to Microsoft Graph Application Administrator
MS Graph versioning Global Administrator
Optimize tenant MFA Security Administrator
Protect all users with a sign-in risk policy Conditional Access Administrator, Security Administrator
Protect all users with a user risk policy Conditional Access Administrator, Security Administrator
Protect your tenant with Insider Risk Conditional Access policy Conditional Access Administrator, Security Administrator
Remove overprivileged permissions for your applications Global Administrator
Remove unused applications Application Administrator
Remove unused credentials from applications Application Administrator
Renew expiring application credentials Application Administrator
Renew expiring credentials for service principals Application Administrator
Require MFA for administrative roles Conditional Access Administrator, Security Administrator
Review inactive users with Access Reviews Identity Governance Administrator
Secure and govern your apps with automatic user and group provisioning Application Administrator, IT Governance Administrator
Use least privileged administrative roles Privileged Role Administrator
Verify App Publisher Global Administrator

If your organization is using Privileged Identity Management (PIM), the recipients must be elevated to the role indicated in order to receive the email notification. If no one is actively assigned to the role, no emails are sent. For this reason, we recommend checking the recommendations regularly to ensure that you are aware of any new recommendations.