🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 4
Domain 4 — Module 5 of 6 83%
26 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 4: Plan and Automate Identity Governance Free ⏱ ~14 min read

PIM: Azure Resources, Groups & Audit

Extend PIM to Azure resource roles and group membership, audit PIM activity through logs and reports, and secure break-glass accounts for emergency access.

PIM Beyond Entra Roles

☕ Simple explanation

PIM isn’t just for Entra admin roles — it protects Azure subscriptions and group memberships too.

Think of it this way: in the previous module, we put the admin office keys in a safe (PIM for Entra roles). Now we’re also putting the server room keys (Azure resource roles) and the team badge access (group memberships) in the same safe system.

And we’re setting up security cameras (audit logs) to record who opened the safe, when, and why. Plus, we’re hiding one emergency key under a rock for absolute emergencies (break-glass accounts) — but even that has rules.

PIM extends beyond Entra ID directory roles to cover three governance domains:

  • PIM for Azure resources — manage just-in-time access to Azure subscription, resource group, and resource-level roles (Owner, Contributor, Reader, custom roles)
  • PIM for Groups — manage eligible membership or ownership of Entra security groups and Microsoft 365 groups, enabling indirect just-in-time access to anything the group grants
  • PIM audit and reporting — comprehensive logs of all assignments, activations, approvals, and denials for compliance and investigation

Break-glass accounts are a critical companion to PIM — they provide emergency access when PIM or MFA fails.

PIM for Azure resources

PIM for Azure resources works just like PIM for Entra roles, but targets Azure RBAC roles at any scope:

Scope LevelExamplePIM Use Case
Management groupCompany-wide policiesEligible Owner for top-level governance
SubscriptionProduction subscriptionEligible Contributor for deployments
Resource group”rg-clinical-apps”Eligible Reader for monitoring
Individual resourceA specific VM or storage accountEligible role for that resource only

Key differences from PIM for Entra roles:

FeaturePIM for Entra RolesPIM for Azure ResourcesPIM for Groups
What it managesEntra directory roles (Global Admin, User Admin, etc.)Azure RBAC roles (Owner, Contributor, Reader, custom)Group membership or ownership
ScopeTenant-wideManagement group, subscription, resource group, or resourceThe group itself
Activation portalEntra admin center → PIMEntra admin center → PIM → Azure resourcesEntra admin center → PIM → Groups
LicensingEntra ID P2 or Entra ID GovernanceEntra ID P2 or Entra ID GovernanceEntra ID P2 or Entra ID Governance
SettingsPer Entra rolePer Azure role at each scopePer group
Use caseAdmin role governanceAzure infrastructure access governanceIndirect access to anything the group grants
ℹ️ Scenario: Priya extends PIM to Azure subscription roles

🔐 Priya configures PIM for Meridian Health’s production Azure subscription:

Owner role PIM settings:

  • Maximum activation: 1 hour (Owner is extremely powerful)
  • Require MFA: Yes
  • Require approval: Yes — approved by the Cloud Governance team
  • Require justification: Yes

Contributor role PIM settings:

  • Maximum activation: 4 hours
  • Require MFA: Yes
  • Require approval: No (Contributor is less risky)
  • Require justification: Yes

Eligible assignments:

  • Ravi Patel → Eligible Contributor on the production subscription (activates when deploying)
  • Priya → Eligible Owner (activates for governance changes only)

Now Ravi can deploy to production by activating Contributor for 4 hours, without having standing write access to the production environment.

PIM for Groups

PIM for Groups is powerful because it provides indirect just-in-time access to anything the group controls.

How it works:

  1. You enable a group for PIM (the group must be role-assignable or a security group)
  2. Users get eligible membership or eligible ownership of the group
  3. When they activate, they become a member/owner for the configured duration
  4. The group’s permissions (app assignments, Entra roles, Azure RBAC, SharePoint access) all activate with it

Why this matters: Instead of configuring PIM for each individual role, you can assign multiple roles to a group and manage PIM for the group. One activation grants everything the group provides.

ℹ️ Scenario: PIM for the Security Operations group

🔐 Priya creates a role-assignable security group called “Security Operations Active” that has:

  • Security Reader Entra role
  • Security Operator Entra role
  • Reader role on the Security resource group in Azure

She enables PIM for this group and makes Anika an eligible member.

When Anika needs to investigate a security incident:

  1. Activates membership in “Security Operations Active” (justification + MFA)
  2. Immediately gets Security Reader + Security Operator + Azure Reader
  3. Investigates the incident
  4. Membership deactivates after the configured duration

One activation, three roles. Much simpler than activating three roles individually.

💡 Exam tip: Role-assignable groups

Only role-assignable groups can be assigned Entra directory roles. If you want PIM for Groups to provide just-in-time access to Entra roles, the group must be created as role-assignable (this is set at creation time and cannot be changed later).

For Azure RBAC roles and app assignments, any security group works — role-assignable isn’t required for those scenarios.

PIM audit history and reports

PIM provides comprehensive auditing — every action is logged:

Audit sources:

Log TypeWhat It Captures
PIM audit logRole assignments, activations, deactivations, approvals, denials, setting changes
Entra audit logAll directory changes including PIM-related ones
Sign-in logsWhen activated users sign in during their elevated session

How to access PIM audit data:

  • Entra admin center → PIM → Audit — filtered view of PIM events
  • Entra admin center → PIM → [Role] → Audit — audit for a specific role
  • Identity Governance → Access reviews — review history for PIM-triggered reviews
  • Export to Log Analytics — for long-term retention and KQL queries (covered in next module)
ℹ️ Scenario: Anika audits PIM activations for a client

🛡️ Anika needs to produce a quarterly PIM report for Meridian Health’s compliance team:

  1. Opens PIM → Entra roles → Audit and filters to the last 90 days
  2. Reviews Global Admin activations: who activated, when, justification, duration
  3. Checks for anomalies: activations outside business hours, unusually long durations, multiple activations in short periods
  4. Downloads the audit log as CSV for the compliance report
  5. Reviews PIM alerts: no “Too many Global Admins” alerts, one “Role activated outside of PIM” alert → investigates the direct assignment

She also checks PIM → Azure resources → Audit for Azure role activations and verifies that no production Owner activations exceeded 1 hour.

Break-glass accounts

Break-glass accounts (also called emergency access accounts) are a critical safety net. If PIM, MFA, or your identity provider fails, you need a way to regain access.

What is a break-glass account? A cloud-only Global Administrator account that bypasses your normal security controls — specifically designed for emergencies.

How to set up break-glass accounts correctly:

RequirementDetails
NumberAt least 2 (redundancy)
TypeCloud-only (not federated — must work if federation fails)
MFARequire phishing-resistant MFA (FIDO2 key or CBA) via a dedicated CA policy. Store the FIDO2 key in a physical safe.
Conditional AccessExclude from restrictive CA policies (location blocks, device compliance). Create a dedicated CA policy requiring phishing-resistant MFA for these accounts.
PIM assignmentActive permanent Global Admin — NOT eligible (can’t activate through PIM in an emergency when PIM itself might be down)
PasswordLong, complex, not known to any single person (split between two people or stored in a physical safe)
MonitoringCreate an alert that fires whenever the account signs in
TestingTest at least every 90 days to verify the account works
No regular useNever used for daily tasks — only true emergencies
ℹ️ Scenario: Priya secures Meridian Health's break-glass accounts

🔐 Priya creates two break-glass accounts for Meridian Health:

Account 1: emergency-admin-01@meridianhealth.onmicrosoft.com

  • Cloud-only (uses the .onmicrosoft.com domain, not the federated custom domain)
  • Active permanent Global Admin in PIM
  • MFA: FIDO2 security key stored in the IT manager’s locked drawer
  • Password: 24-character random string, first half known by Priya, second half known by the CTO
  • Excluded from all Conditional Access policies

Account 2: emergency-admin-02@meridianhealth.onmicrosoft.com

  • Same setup but with a different FIDO2 key stored in a different physical location
  • Password halves known by different people than Account 1

Monitoring: Priya creates an alert rule in Azure Monitor that triggers whenever either account signs in → emails the security team immediately.

Testing: Every 90 days, Priya and the CTO assemble the password, sign in with the break-glass account, verify it works, change the password, and log the test.

💡 Exam tip: Break-glass account common questions

The exam frequently tests break-glass account best practices:

  • Must be cloud-only — if your on-premises AD or federation service fails, these accounts still work
  • Exclude from Conditional Access — if a CA policy accidentally locks everyone out, break-glass accounts can fix it
  • Active (not eligible) in PIM — you can’t activate through PIM if PIM itself is the problem
  • At least two accounts — redundancy in case one is compromised or inaccessible
  • Monitor sign-ins — any use should trigger an alert because these accounts should never be used in normal operations

Video Lesson

🎬 Video coming soon

PIM: Azure Resources, Groups & Audit

PIM: Azure Resources, Groups & Audit

~11 min

Key Concepts

Question

What is PIM for Groups and why is it useful?

Click or press Enter to reveal answer

Answer

PIM for Groups lets you make users eligible members (or owners) of a group. When they activate, they get all permissions the group provides — Entra roles, Azure RBAC, app access — through one activation instead of activating each role individually.

Click to flip back

Question

How many break-glass accounts should an organisation have, and why?

Click or press Enter to reveal answer

Answer

At least two. Redundancy ensures you can still access the tenant if one account is compromised, one FIDO2 key is lost, or one password-holder is unavailable. Both should be cloud-only, excluded from Conditional Access, and actively monitored.

Click to flip back

Question

Where can you find PIM audit data?

Click or press Enter to reveal answer

Answer

PIM audit data is available in: 1) PIM → Audit (PIM-specific filtered view), 2) Entra audit logs (all directory changes), 3) Sign-in logs (elevated user sign-ins), 4) Azure Monitor/Log Analytics (for KQL queries and long-term retention).

Click to flip back

Question

What is the key requirement for a group to be assigned Entra directory roles?

Click or press Enter to reveal answer

Answer

The group must be created as a role-assignable group. This is set at creation time and cannot be changed later. Role-assignable groups can be assigned Entra directory roles and used with PIM for just-in-time role access through group membership.

Click to flip back

Knowledge Check

Knowledge Check

Ravi needs just-in-time Contributor access to the production Azure subscription for deployments. Currently he has permanent Contributor. What should Priya configure?

Knowledge Check

Priya is creating break-glass accounts. Which combination of settings is correct?

Knowledge Check

Anika wants to simplify PIM activation for security analysts who need Security Reader, Security Operator, and Azure Reader roles simultaneously. Currently they must activate each role separately. What should she recommend?


Next up: Identity Monitoring: Logs, KQL & Secure Score — how to monitor identity events with logs, write KQL queries for investigation, and improve your security posture with Identity Secure Score.

← Previous

PIM: Protect Your Privileged Roles

Next →

Identity Monitoring: Logs, KQL & Secure Score

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.