In general, you should prefer to restrict none privilege account access to your administrative portal URL’s. When your day to day user figures out one of the administration URL’s and wants to access them, out the box configuration will allow them to do so. This short article will list steps how to prevent users accessing to directory services information.
Let’s start listing admin known portal
URL’s first then take a look how authenticated none privilege user would have
access to such resources and why this would be not the best scenario for your business.
First download this awesome script “ACCESS-O365-ADMIN-URLs-V1.ps1”
from Tech-Net scripting library to help your administrators to access some of
these URL’s more efficiently.
Some of the most used O365 Admin
portal URL List.
Portal Name
|
Portal URL
|
Admin Portal
|
|
Azure Active Directory Admin Center
|
|
Azure Directory
|
|
One Drive Admin Portal
|
|
Teams Admin Portal
|
|
Lync Admin Portal (legacy)
|
|
SharePoint Admin Portal
|
|
TSA ECP Access
|
|
Quarantine Management
|
|
Message Trace
|
Preventing
users to browse on the directory services
- Log
in to Azure portal with global administrator rights
- Use
following URL | https://portal.azure.com/#home
|
- On
the left pane, click | Azure Active Directory |
- Select
| Users| then | User Settings | under Administration Portal|
- Restrict
Access to Azure AD Administration Portal
- Select | YES | and click save
Casey, Dedeal
Azure Solutions Architect
AWS Certified Cloud Practitioner

No comments:
Post a Comment