ArtikelRahmen V5 MS365 ENTRAID V3

Microsoft Entra is much more than just the successor to the classic directory service (formerly Azure AD). In the uniform administration portal, you have full control: Here you control identities, authorizations and access rights centrally in one place.

MS365 MS ENTRA LOGO white

For you as an administrator, this means one thing above all: maximum transparency and a massive gain in security for your environment. Especially with regard to data protection (GDPR) and modern zero-trust architectures, Entra is the heart of your IT strategy.

In this series of articles, we’ll walk you through the most important configurations step-by-step, from the basics to pro governance.

🆕 Update: Since the cloud is constantly changing, we are constantly reviewing this guide. Nevertheless, a look at the official Microsoft documentation is mandatory to stay up to date with critical changes.

📅 Booth | 23.12.2025


Entra Admin Center

The Microsoft Entra Admin Center home page gives you quick insights (e.g., expiring client secrets or number of Global Admins), actionable recommendations, and links to learning modules.

Use these dashboards actively to not only manage data protection in your organization, but to strengthen it in the long term.

» To the article: Microsoft Entra ID – The Entry



User Settings

Managing user permissions is often a balancing act: If you share too much, security gaps arise. If you restrict too much, productivity suffers and your mailbox is overflowing with tickets.

We configure the three most important areas: the internal permissions, the external collaboration (guests) and the user features.

» To the article: Configuring user settings



Group Settings

Effective controls are essential when managing groups. A “group” is rarely just a list of names – behind it are often teams, SharePoint pages and entire file repositories. Without maintenance, massive data protection risks arise here (shadow IT, orphaned data).

We clarify three things: The creation (Who may?), the end (When will the deletion take place?) and the order (Which names are taboo?).

» To the article: Group Settings & Lifecycle



Device settings and security

Devices are the new security perimeter. Whether it’s a company laptop or a private smartphone (BYOD), as soon as a device accesses your data, it needs to be managed. In this article, we’ll harden the “join” of devices and ensure that users don’t accidentally become full administrators on their PCs – an essential step towards GDPR compliance.

» To the article: Device Security & Settings



Conditional Access

With Conditional Access, you define precise guardrails: Access to company data is no longer blanket, but context-based. The “if-then” principle for your security: For example, access to sensitive data is only granted if the device is managed and the user has securely authenticated. This is essential for compliance with strict data protection regulations.

» To the article: Setting up Conditional Access



Authentication Methods

If Conditional Access is the bouncer, then the authentication methods are your users’ IDs. The days when a simple password was enough are over. We’ll configure how your users are allowed to sign in. We rely on modern, phishing-resistant methods (such as FIDO2 or number matching) and switch off outdated, insecure technologies such as SMS.

» To the article: Authentication methods



APPS – Consent & Permissions

Thoughtless app approvals are a massive risk: A quick click on “Accept” and company data flows to third-party providers. By restricting user consent and replacing it with an admin workflow, you effectively stop shadow IT at the root. This allows you to maintain full control over the application landscape.

» To the article: Consent and permissions



Corporate branding & login look

Trust begins with login. Individual branding is much more than just aesthetics – it is an effective measure against phishing. When users see their usual company logo, fake standard login masks are immediately noticeable. In this step, we configure the corporate design and integrate the legally required links to imprint and data protection directly into the registration process.

» To the article: Custom branding



Monitoring and integrity

A clean configuration is only half the battle – in everyday operations, you need to know what’s happening in your tenant. If a login fails or a Conditional Access policy kicks in unexpectedly, the logs are your first port of call for troubleshooting.

We look at the two most important pillars:

  1. Sign-in logs: Who registered when, from where and with what? Was the access successful or was it blocked?
  2. Audit Logs: Who made changes to the tenant (e.g., created users, changed groups, adjusted policies)?

Important for your planning (licenses & roles): To gain access to these logs, you need at least the “Security Reader” or “Global Reader” role. Also note the retention periods: In the free edition , Microsoft only stores the logs for 7 days. From a P1/P2 license, you have access to the last 30 days and can export the data for long-term archiving.

In the detailed article, we show you how to read the logs correctly and perform error analyses efficiently.

» To the article: Microsoft 365 EntraID | Monitoring and integrity



OTHER CONSIDERATIONS

– Governance and monitoring

The previous settings harden your tenant against attacks. But security is not a one-off project, but a permanent condition. How do you ensure that permissions remain clean for years?


image 45

Here are the “Advanced” topics of identity governance:

1. Privileged Identity Management (PIM) (License Requirement: Entra ID P2) The permanent “Global Administrator” is an enormous risk.

  • The solution: With PIM, you only assign admin rights “just-in-time” (on demand) and for a limited period of time.
  • The added value: Every admin access is logged and must be justified.

Lifecycle Workflows & Access Reviews Employees come and go. Old authorizations often remain (“corpses”).

  • Lifecycle workflows: Automate the “leaver” process.
  • Access Reviews: Regularly automatically prompt managers to confirm their employees’ access.

Monitoring & SIEM Integration Entra ID stores logs for only 30 days by default.

  • The strategy: Connect Entra ID to a SIEM (such as Microsoft Sentinel) or a Log Analytics Workspace to retain data for years and generate alerts in the event of anomalies (e.g., “Impossible Travel”).

Security as a process

The technical configuration is the foundation. But data protection only comes alive through regular reviews (audits), clean processes for entry and exit (JML) and seamless monitoring. Use the dashboards in the Entra Admin Center not only for configuration, but as a daily cockpit for the health status of your identities.


image 44
:
Microsoft Trust CenterGDPR-Microsoft Cloud Services
Microsoft eBookGDPR compliance best practices
Microsoft Entra Admin CenterFeatures, Navigation, and Uses
Microsoft Learn – GDPRPrivacy Policy Information
DPIA Azure for the GDPRConducting Data Protection Impact Assessments
User Profile Management in EntraUser Profile Management Guide
Microsoft Entra Setup GuidesSetup and Management Guides
Microsoft ComplianceCompliance and Regulatory Requirements
GDPR simplified: guide for small business
Microsoft Entra ID GovernancePrivacy, security, and compliance in the Microsoft Trust Center
Microsoft Trust CenterPrivacy, Security, and Compliance

This post is also available in: Deutsch English

Be the first to comment

Leave a Reply

Your email address will not be published.


*