Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Introduction and Overview Microsoft 365 Admin Center

    Introduction and Overview Microsoft 365 Admin Center

    April 15, 2025

    The Microsoft 365 Admin Center is the centralized web-based portal administrators use to manage Microsoft 365 services for their organization. It provides a single access point for managing users, licenses, apps, and services like Exchange Online, Outlook, SharePoint, Teams, and more.

    Image1

    Key Functions of the Admin Center

    • User Management: Add, remove, or edit user accounts and assign licenses.
    • License Management: Purchase, assign, and monitor licenses across the organization.
    • Service Health Monitoring: View the status of Microsoft services and receive incident reports.
    • Billing and Subscriptions: Manage subscriptions, payment methods, and invoices.
    • Security & Compliance: Access tools to enforce data protection, compliance policies, and user security.
    • Reports & Insights: Generate usage, adoption, and security trends reports.
    • Role-Based Access Control (RBAC): For better governance, assign different admin roles, such as Global Admin, User Admin, Billing Admin, etc.
    • Settings Configuration: Configure settings for Microsoft Teams, Exchange, and SharePoint services.

    10 Best Practices for User and Group Management in Microsoft 365

    Effectively managing users and groups is key to maintaining security, compliance, and operational efficiency within Microsoft 365. Below are 10 best practices to follow:

    Image2

    1. Follow the Principle of Least Privilege

    • Assign only the permissions a user needs to perform their job.
    • Use role-based access control (RBAC) instead of giving everyone Global Admin rights.
    • Delegated roles like User Admin, Groups Admin, Helpdesk Admin, etc., as needed.

    2. Standardize User Creation

    • Use a user creation template or naming convention (e.g., firstname.lastname@company.com).
    • Automate user provisioning through tools like Azure AD Connect or Microsoft Entra ID.
    • Set password policies and MFA (Multi-Factor Authentication), and assign licenses upon creation.

    3. Organize Users with Security and Microsoft 365 Groups

    • Use:
      • Microsoft 365 Groups for collaboration in Teams, Outlook, and SharePoint.
      • Security Group for resource access control (e.g., OneDrive, SharePoint).
      • -Mail-Enabled Security Groups are available when email is needed with access control.
    • Avoid group sprawl by regularly reviewing unused or duplicate groups.

    4. Use Dynamic Groups Where Possible

    • Dynamic groups automatically add or remove users based on attributes such as department or job title.
    • Helps keep access rights consistent and minimizes manual errors.

    5. Review and Audit Access Regularly

    • Perform periodic access reviews using Azure AD Access Reviews.
    • Audit group memberships, admin roles, and license assignments.

    6. Implement Group Naming Policies

    • Create consistent and clear group names, e.g., ‘HR-Team-M365’, ‘IT-Admins.’
    • Use Entra ID (Azure AD) naming policies to enforce this automatically.

    7. Monitor and Log User Activity

    • Use Microsoft 365 audit logs and Microsoft Purview to track user and admin actions.
    • Enable logging for sign-ins, password resets, file access, etc.

    8. Secure Admin Accounts

    • Use Privileged Identity Management (PIM) to elevate roles only when needed.
    • Require MFA for all admin accounts.
    • Consider dedicated admin accounts separate from users’ day-to-day login accounts.

    9. Use Expiration Policies for Guest Users and Groups

    • Set expiration policies to automatically clean up old groups or guest accounts.
    • Helps reduce risk and clutter in your directory.

    10. Document Changes and Procedures

    • Maintain internal documentation for user/group management procedures.
    • Helps onboard new IT staff and ensures consistency across the team.

    Managing Licenses and Subscriptions in the Microsoft 365 Admin Center

    Image3

     

    1. Accessing License and Subscription Information

    1. Sign in at [admin.microsoft.com] with admin credentials.
    2. Navigate to:
      1. Billing > Your Products – to view active subscriptions.
      2. Billing > Licenses – to view how many licenses are available, assigned, or unused.
      3. Users > Active Users – to manage user license assignments directly.

    2. Assigning Licenses to Users

    1. Go to Users > Active Users.
    2. Select a user and click Licenses and Apps.
    3. You can choose the subscription (e.g., Microsoft 365 E3) and turn on/off specific apps like Teams, SharePoint, etc.
    4. Click Save changes.

    3. Assigning Licenses to Groups (Recommended for Automation)

    1. Use Group-based licensing (requires Azure AD P1 or P2).
    2. Go to Groups > Active Groups.
    3. Select a security or Microsoft 365 group, then choose Licenses.
    4. Assign the desired license(s) and click Save.

    Note: When users join the group, licenses are auto-assigned. When they leave, licenses are removed.

    4. Managing Subscriptions

    1. Go to Billing > Your Products to:
      1. View subscription names (e.g., Microsoft 365 Business Premium).
      2. Check the number of licenses purchased and in use.
      3. Renew or cancel subscriptions.
      4. Add or reduce license count.
      5. Assign add-ons like Audio Conferencing, Defender for Office 365, etc.

    5. Monitoring License Usage

    1. Navigate to Billing > Licenses to:
      1. View total vs. assigned vs. available licenses.
      2. Download usage reports.
      3. Go to Reports > Usage for more insights into how services (like Teams or OneDrive) are used.

    6. Removing/Reassigning Licenses

    1. When a user leaves:
      1. Go to Users > Active Users> select the user.
      2. Remove the license and optionally delete the account.

    Best practice tip: Transfer any data (email, OneDrive) before deletion or license removal.

    7. Setting License Expiration Alerts

    1. Enable billing notifications under Billing > Billing Notifications.
    2. Set up alerts in Microsoft Purview or Defender for unused or about-to-expire licenses.

    Role-Based Access Control (RBAC) in Microsoft 365

    What is RBAC?

    Role-based access Control in Microsoft 365 allows you to assign specific permissions to users based on their job roles without giving them full administrative access. This is a best practice for security, compliance, and operational efficiency.

    Image4

    Where is RBAC Configured?

    RBAC is configured in:

    • Microsoft 365 Admin Center
    • Microsoft Entra ID (formerly Azure AD)
    • Exchange Admin Center (EAC)
    • Security & Compliance Center

    Key Admin Roles in Microsoft 365

    Image6

    • Global Administrator: Has full access to all M365 services and settings. Use sparingly.
    • User Administrator: Manage user accounts, groups, and licenses.
    • Group Administrator: Manage Microsoft 365 groups and distribution lists.
    • Helpdesk Administrator: Reset passwords and manage support tickets.
    • Billing Administrator: Manage subscriptions, billing, and payments.
    • Compliance Administrator: Access Microsoft Purview and Data Loss Prevention (DLP) settings.
    • Security Administrator: Manage security settings and Microsoft Defender.
    • Exchange Administrator: Configures mailboxes, transport rules, and Exchange settings.
    • SharePoint Administrator: Manage SharePoint sites and settings.
    • Teams Administrator: Configure Microsoft Teams policies, voice, and settings.

    How to Assign Roles in the Microsoft 365 Admin Center

    1. Go to [admin.microsoft.com
    2. Navigate to Users > Active Users
      1. Click on the user → go to Roles
      2. Choose either:
        1. Global Admin
        2. Privileged Role
      3.  Or search for a specific role
    3. Click Save changes

    Advanced RBAC with Microsoft Entra (Azure AD)

    For finer control, use:

    • PIM (Privileged Identity Management): Grant “just-in-time” access to roles
    • Custom roles: Create your own roles with specific permissions
    • Administrative units (AUs): Delegate control based on geography, department, etc.

    Best Practices for RBAC in Microsoft 365

    • Use the least privilege model: Minimize attack surface.
    • Assign roles to groups: Easier to manage at scale.
    • Monitor role assignments regularly: Catch role creep and misconfigurations.
    • Use PIM for elevated roles: Limit exposure of critical permissions.
    • Document who has what role: For transparency and audits.

    Understanding Security & Compliance in Microsoft 365

    Microsoft 365 provides robust tools under the Microsoft Purview (formerly Security & Compliance Center) and Microsoft Defender platforms to help organizations secure data, detect threats, and ensure compliance.

    Image5

    1. Core Security Features

    Microsoft Defender for Office 365

    • Protects against phishing, malware, and ransomware
    • Features: Safe Attachments, Safe Links, Threat Investigation & Response

    Multi-Factor Authentication (MFA)

    • Requires users to verify identity via a second factor (e.g., phone, app)

    Conditional Access

    • Control resource access based on user location, device compliance, risk level, etc.

    Identity Protection

    • Detects risky sign-ins and users using machine learning

    Microsoft Defender for Endpoint

    • Advanced threat protection for devices
    • Includes endpoint detection and response (EDR)

    Secure Score

    • Microsoft’s security health check for your environment
    • Recommend actions to improve your security posture

    2. Compliance Features via Microsoft Purview

    Data Loss Prevention (DLP)

    • Monitors and restricts sharing of sensitive data (e.g., credit card numbers, SSNs)
    • Works across Exchange, SharePoint, OneDrive, Teams

    Information Protection & Sensitivity Labels

    • Classify and protect content based on its sensitivity
    • Applies encryption, watermarks, or access controls automatically

    Retention Policies

    • Keeps or deletes data based on business or legal requirements
    • Applies to email, Teams, OneDrive, SharePoint

    eDiscovery

    • Allows legal teams to search and preserve data for investigations or litigation

    Audit Logging

    • Tracks user and admin activity (e.g., file access, sign-in attempts)
    • Essential for forensic analysis and incident response

    Insider Risk Management

    • Detects potential insider threats like data leaks or policy violations

    Compliance Score

    • Tracks your compliance with standards like GDPR, HIPAA, ISO 27001

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBoosting Queue Management with Laravel’s JobQueueing Event
    Next Article Convert a text file from UTF-8 encoding to ANSI using Python in AWS Glue

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-52971 – WordPress Cross-Site Request Forgery (CSRF)

    Common Vulnerabilities and Exposures (CVEs)

    Laravel AI Chat Starter Kit

    Development

    CVE-2025-38167 – “NTFS3 Linux Kernel Null Pointer Dereference Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    New Veeam RCE flaw lets domain users hack backup servers

    Security

    Highlights

    CVE-2025-3874 – WordPress Simple Shopping Cart Insecure Direct Object Reference

    May 1, 2025

    CVE ID : CVE-2025-3874

    Published : May 1, 2025, 12:15 p.m. | 53 minutes ago

    Description : The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 due to lack of randomization of a user controlled key. This makes it possible for unauthenticated attackers to access customer shopping carts and edit product links, add or delete products, and discover coupon codes.

    Severity: 6.5 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-47891 – Apache Struts Command Injection

    May 14, 2025

    CVE-2025-5430 – AssamLook CMS SQL Injection Vulnerability

    June 2, 2025

    Microsoft Build: GitHub Copilot coding agent, Azure AI Foundry updates, support for MCP, and more

    May 19, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.