Create users:
You can create users using the Azure portal, Azure CLI, PowerShell, or via synchronization from an on-premises Active Directory.
Required fields include username, display name, password, usage location, and optionally a directory role.
Portal steps:
Go to Azure Active Directory > Users > New user
Fill in user details
Click Create
Update users:
You can edit user attributes such as name, contact info, job title, group memberships, or roles.
Delete users:
Deleted users go to the “Deleted users” container and remain recoverable for 30 days (soft delete period).
Azure AD roles control administrative privileges.
Common roles:
Global Administrator: Full permissions in Azure AD
User Administrator: Can manage users and groups
Billing Administrator: Can manage subscriptions and billing
How to assign a role:
Go to Azure Active Directory > Users > Select the user
Click Assigned roles > Add assignment
Choose a role, click Add
Manual reset by Admin:
Self-Service Password Reset (SSPR):
Allows users to reset their own passwords after verifying their identity.
To enable SSPR:
Go to Azure AD > Password reset
Enable for all or selected users
Configure authentication methods (email, phone, questions)
Security groups: Manage access to Azure resources
Microsoft 365 groups: Include shared mailbox, calendar, files (collaboration features)
Create a group via portal:
Navigate to Azure AD > Groups > New group
Choose:
Group type (Security / Microsoft 365)
Group name
Membership type (Assigned, Dynamic)
Click Create
Assigned membership:
Dynamic membership:
Use rules based on user/device attributes to auto-assign membership.
Example rule: user.department -eq "Finance" adds all Finance users to the group.
Assign licenses (e.g., Microsoft 365, Azure AD Premium) to a group.
Azure automatically adds/removes licenses as users enter or exit the group.
Steps:
Go to Azure AD > Groups > Select group
Click Licenses > Assignments
Select and assign product licenses
Azure AD registered:
Azure AD joined:
Hybrid Azure AD joined:
View and manage devices under Azure AD > Devices.
You can:
Enable/disable a device
Delete stale devices
Configure device compliance policies
Require MFA for device join
Apply Conditional Access policies (e.g., only compliant devices can access Teams or SharePoint)
Administrative Units (AUs)** are logical containers in Azure AD that help delegate administration of subsets of users, groups, or devices to specific admins—without granting them rights over the entire directory.
This is especially useful in large organizations, such as:
A university with different faculties
A company with multiple regional departments
A Helpdesk admin in “New York” should manage only New York employees.
An IT admin in “Engineering” can reset passwords only for users in that department.
AUs contain users, groups, and devices.
You can assign scoped roles (like User Administrator) only within an AU.
A single user/device can be a member of multiple AUs.
AUs do not affect access or policies—they only control administrative boundaries.
Go to Azure AD > Administrative units > + Add.
Provide a name and description.
Add users or groups to the AU.
Assign scoped admin roles to users within that AU.
Azure AD External Identities allow users outside your organization to access your Azure resources or applications securely.
This feature enables Business-to-Business (B2B) and Business-to-Consumer (B2C) collaboration.
A B2B guest user is someone from another Azure AD tenant (or even a non-Microsoft account) who gets invited to your directory.
Guests use their own credentials (no need to manage their passwords).
They appear in your directory with UserType = Guest.
Access is controlled via RBAC, groups, or Conditional Access.
You can invite guests through:
Azure Portal:
Go to Azure AD > Users > New guest user.
Enter email and optional message.
Assign access as needed (e.g., to groups or apps).
Microsoft Teams / SharePoint (via sharing interface)
PowerShell / B2B APIs (for bulk invitation)
Use Access Reviews to periodically check if guests still need access.
Apply Conditional Access policies (e.g., require MFA for guests).
Use Terms of Use for compliance (guest users must accept policies).
Restrict invitation rights (e.g., only admins can invite guests).
Configure from:Azure AD > External Identities > External collaboration settings
You can control:
Who can invite guests
Guest user permissions (e.g., limited access to directory)
Restrictions on domains (e.g., block certain email domains)
RBAC (Role-Based Access Control) is the core authorization mechanism in Azure. It controls who can perform what actions on which resources.
RBAC is a permission model that allows administrators to:
Grant only the minimum required permissions to users, groups, service principals, or managed identities.
Control actions like read, write, delete on specific Azure resources.
RBAC = Security Principal + Role Definition + Scope
Security Principal: The identity receiving permissions.
Role Definition: A set of permissions grouped into a role.
Reader, Contributor, Owner, or a custom role.Scope: The level at which permissions apply.
Management group
Subscription
Resource group
Resource
Scopes are hierarchical:
Assigning a role at the subscription level means all resource groups and resources under that subscription inherit the role.
| Role | Description |
|---|---|
| Owner | Full access to everything, including RBAC |
| Contributor | Full access to manage resources, but can’t assign roles |
| Reader | Read-only access to resources |
| User Access Administrator | Can manage RBAC assignments, but not resources themselves |
You can assign roles using:
Azure Portal
Azure CLI
Azure PowerShell
ARM templates
Navigate to the resource, resource group, or subscription.
Click Access control (IAM) in the left menu.
Click the Role assignments tab, then click + Add > Add role assignment.
Select:
Role (e.g., Reader)
User, group, or service principal
Scope
Click Save.
Example:
az role assignment create --assignee <userEmailOrObjectId> \
--role "Contributor" \
--scope "/subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>"
Assign roles at the lowest possible scope needed.
Use groups instead of assigning roles to individuals.
Regularly review and audit role assignments.
If no built-in role matches your exact needs, you can define your own custom role.
A custom role is defined in a JSON file and includes:
Allowed Actions
Optional NotActions
AssignableScopes where the role is valid
{
"Name": "Storage Read Only",
"IsCustom": true,
"Description": "Can read storage accounts.",
"Actions": [
"Microsoft.Storage/storageAccounts/read"
],
"NotActions": [],
"AssignableScopes": [
"/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
]
}
You can create this custom role using PowerShell or Azure CLI.
Follow the Principle of Least Privilege: grant only the minimum permissions required.
Avoid assigning Owner role unless absolutely necessary.
Perform regular audits using:
Azure Activity Logs
Access Reviews (if using Azure AD Premium P2)
Azure provides tools to help you organize resources, manage access, enforce policies, and control costs across your environment. This section explains how.
A subscription is an agreement with Microsoft to use Azure services, tied to a billing account.
Each subscription has:
Unique ID
Billing scope
Quota limits (number of VMs, storage capacity, etc.)
You can have multiple subscriptions for:
Different departments or projects
Separation of environments (Dev/Test/Prod)
Different billing or regulatory needs
Subscriptions can be created through:
Azure portal (by billing administrator)
Microsoft 365 admin center (if using Microsoft Customer Agreement)
Azure CLI / PowerShell for enterprise accounts
Roles like Owner, Contributor, or Reader can be assigned at the subscription level to control who can manage resources within that subscription.
Example: Assign the “Contributor” role to the DevOps team at the subscription level so they can manage all resources inside it.
You can rename subscriptions for clarity (e.g., "Marketing Dev Subscription").
Move resources between subscriptions if needed (must meet move conditions).
Cancel subscriptions if they are no longer needed (possible through the portal or billing portal).
Management groups help you organize multiple Azure subscriptions into a hierarchy.
Use cases:
Apply policies across many subscriptions
Group subscriptions by department, region, or environment
Apply RBAC and Azure Policy at the management group level
Each management group:
Can contain subscriptions or other management groups
Can have RBAC and policies applied, inherited by children
Is structured in a tree format
Root Management Group
├── CorpGroup
│ ├── Sub-Marketing
│ └── Sub-Sales
├── DevGroup
│ └── Sub-DevOps
You must be assigned the Management Group Contributor or Owner role to create and manage them.
Use them to apply governance at scale.
The root management group is created automatically for each tenant (can be renamed).
Tags are key-value pairs used to label and organize Azure resources for:
Cost management
Automation
Resource organization
Example:
Environment = Production
Department = Finance
Owner = John.Doe
You can apply tags:
When creating a resource
After deployment using the portal, CLI, or PowerShell
Automatically using Azure Policy
Use consistent naming standards
Use automation tools like Azure Policy to enforce tag requirements
Use tag-based billing reports in Cost Management
Resource locks prevent accidental deletion or modification of resources.
There are two types:
ReadOnly: Can view but cannot update or delete.
CanNotDelete: Can update but not delete.
Protect critical production resources (e.g., databases or storage accounts).
Prevent developers from deleting shared infrastructure by mistake.
Go to the resource or resource group.
Click Locks in the left menu.
Click + Add, choose the type, and provide a name.
Azure Policy is a governance tool that helps you enforce rules and effects over your Azure resources, ensuring they comply with your organization’s standards.
It allows you to:
Control what can or cannot be deployed
Audit existing resources for non-compliance
Automatically remediate non-compliant resources
| Term | Description |
|---|---|
| Policy definition | A rule stating what is allowed or denied (e.g., only specific VM sizes allowed) |
| Policy assignment | Attaches a policy to a scope (resource group, subscription, etc.) |
| Parameters | Values you can input when assigning a policy (e.g., allowed regions) |
| Initiative | A collection of policies grouped together under one assignment |
Allow only specific Azure regions.
Enforce tagging rules (e.g., every resource must have Department tag).
Audit usage of public IPs.
Deny certain VM SKUs or storage SKUs.
Go to Azure Policy in the portal.
Select Definitions to view built-in policies.
Choose a policy and click Assign.
Select a scope (subscription, resource group, etc.).
Configure parameters (if applicable).
Click Review + Create.
When defining a policy, you choose its effect, such as:
Deny – prevents resource creation or changes
Audit – logs non-compliant resources but doesn’t block them
DeployIfNotExists – deploys a resource if it doesn't exist
Modify – changes the resource configuration automatically
Azure Blueprints are used to package and deploy a set of governance components together in one reusable bundle.
A blueprint may include:
Resource groups
Role assignments
Policy assignments
ARM templates
They’re ideal for:
Setting up standardized environments
Enforcing compliance across multiple subscriptions
Deploy a production environment with:
NSG policies
Audit policies
Specific tags
Contributor access for operations team
Create templates for new departments or projects
Create a blueprint: Define what resources, policies, and RBAC should be included.
Publish the blueprint definition.
Assign it to a subscription or management group.
Once assigned, Azure enforces the blueprint and tracks compliance.
Azure Cost Management + Billing helps you:
Track spending over time
Break down costs by subscription, resource group, service
Export data to Excel or Power BI
Tip: Tag resources by department or project for tag-based cost tracking.
You can define budgets for:
Subscriptions
Resource groups
Tags (e.g., Environment = Dev)
Then set alerts to notify stakeholders when spending hits:
50%
75%
100% of the budget
Cost Analysis: Visualize and explore spending by category.
Azure Advisor: Offers cost-saving recommendations, such as:
Rightsizing VMs
Deleting unused disks
Reserving resources for predictable workloads
Azure now enforces MFA by default for all users under security defaults.
Security Defaults: A set of preconfigured identity security settings (including mandatory MFA) applied automatically in new tenants unless explicitly disabled.
Users will be prompted for MFA during high-risk sign-ins or after registration.
You can configure Conditional Access policies for granular MFA enforcement beyond defaults.
Exam Tip: Know how to enable/disable security defaults and how to enforce MFA using Conditional Access.
Cloud-only users are created and managed directly in Azure AD.
Synced users come from on-premises Active Directory via Azure AD Connect.
Key limitations for synced users:
Cannot change user properties like UPN or password in Azure AD (must do it on-prem).
Cannot enable SSPR independently in some configurations.
Cannot be deleted in Azure unless Azure AD Connect is removed or writeback is enabled.
Exam Tip: Know which attributes are read-only for synced users and where changes must be made.
SSPR and MFA can use the same authentication methods, such as:
Phone call
Mobile app notification
If a user has completed MFA registration, they do not need to register separately for SSPR.
Admins should review combined registration settings to simplify user experience.
Exam Tip: Understand that enabling MFA improves SSPR success rates, but the two are configured separately.
SSPR for cloud-only users requires Azure AD Premium P1.
Without Premium P1:
Users can’t use SSPR unless they are administrators.
Only admins can reset passwords using Azure portal.
Exam Tip: Licensing is a commonly overlooked detail. Know which features require P1 vs P2.
The Contributor role allows full management of resources but NOT role assignments.
Only Owner or User Access Administrator can assign RBAC roles.
Exam Trap: "Can a Contributor assign roles?" → No.
Can assign or remove access (RBAC) but cannot modify resources themselves.
Scope-limited: can only assign roles within the scope they are granted.
| Azure AD Role | Scope | Example |
|---|---|---|
| Applies to Azure AD (identity layer) | Tenant-wide | User Administrator, Global Admin |
| Azure RBAC Role | Applies to Azure resources | Scoped to resource, group, or subscription |
Exam Tip: Don't confuse a Global Admin (Azure AD) with Owner (Azure RBAC)—they have no cross-over unless explicitly granted.
| Feature | Azure Policy | Azure Blueprints |
|---|---|---|
| Purpose | Enforce compliance rules on resources | Deploy collections of artifacts (policy, RBAC, templates) |
| Granularity | Fine-grained | High-level bundles |
| Use case | Day-to-day governance | New subscription setup |
Blueprints are in "maintenance mode", meaning no new features will be added.
Microsoft recommends using:
Azure Landing Zones
Azure Policy + Bicep/ARM templates instead
Exam Tip: You should know that Blueprints are being deprecated in practice, even if still mentioned in legacy content.
Advisor provides recommendations in four major areas:
High Availability
Security
Performance
Cost Optimization
Examples:
Resize or shut down underused VMs
Move workloads to reserved instances
Enable backup for critical resources
Exam Tip: Know that Advisor is not a monitoring tool but a recommendation engine.
You can define budgets and create alerts when usage crosses thresholds (e.g., 50%, 90%).
However, alerts do not block spending or resource creation.
To enforce spending controls, combine budgets with Azure Policy, such as:
{
"if": {
"field": "Microsoft.Resources/subscriptions/billingAmount",
"greaterThan": 1000
},
"then": {
"effect": "deny"
}
}
Exam Tip: Budget alerts are advisory only. Only Policy can enforce hard limits.
A user can create and manage virtual machines in a subscription but cannot create or manage users in Microsoft Entra ID. Why does this happen?
Because Azure RBAC roles control access to Azure resources, while Microsoft Entra ID roles control directory-level permissions such as managing users.
Azure RBAC roles (for example Contributor or Virtual Machine Contributor) allow management of Azure resources such as VMs, storage, and networks within a subscription or resource group. However, identity-related operations like creating users, resetting passwords, or assigning directory roles are governed by Microsoft Entra ID roles such as User Administrator or Global Administrator. A user assigned a resource-level RBAC role will not automatically receive directory permissions. This separation ensures security boundaries between infrastructure administration and identity administration.
Demand Score: 88
Exam Relevance Score: 92
Why might a newly assigned RBAC role not immediately allow a user to access a resource in Azure?
Because RBAC role assignments can take several minutes to propagate across Azure services.
When an RBAC role assignment is created, Azure must propagate the permission across multiple authorization systems. During this propagation period, which can take up to several minutes, users may still experience access denied errors. In practice, users should sign out and sign back in to refresh their access tokens. Additionally, Azure CLI or PowerShell sessions may require token refresh or reauthentication. This behavior is common when administrators assign roles at subscription or resource group scope and expect immediate access.
Demand Score: 83
Exam Relevance Score: 90
An administrator wants to ensure that all resources created in a subscription must include a tag called “CostCenter”. Which Azure feature should be used?
Azure Policy.
Azure Policy enforces organizational standards by evaluating resources against defined rules. A policy can require that specific tags exist before a resource is deployed. If the required tag is missing, the policy can deny the deployment or automatically add the tag using a modify policy effect. This helps maintain governance and cost tracking across large environments. RBAC controls permissions, but it does not enforce configuration compliance. Azure Policy is specifically designed for compliance enforcement across subscriptions or management groups.
Demand Score: 86
Exam Relevance Score: 95
What is the purpose of management groups in Azure governance?
Management groups allow administrators to organize multiple subscriptions and apply governance policies at scale.
Management groups sit above subscriptions in the Azure hierarchy. They enable centralized governance by allowing policies, RBAC assignments, and compliance rules to be applied to multiple subscriptions simultaneously. This is particularly useful for large enterprises managing dozens or hundreds of subscriptions. Instead of configuring policies individually per subscription, administrators can assign them at the management group level so all child subscriptions inherit them automatically. This simplifies governance and ensures consistent compliance across the organization.
Demand Score: 79
Exam Relevance Score: 90
An administrator wants to prevent accidental deletion of a critical resource group. Which Azure feature should be implemented?
A resource lock with the Delete lock type.
Azure resource locks protect critical resources from accidental modification or deletion. A Delete lock allows users to read and modify the resource but prevents deletion. There is also a ReadOnly lock, which prevents both modification and deletion. Resource locks apply at the subscription, resource group, or individual resource level and inherit downward. They are commonly used for production environments to protect critical infrastructure components such as virtual networks, storage accounts, or resource groups.
Demand Score: 76
Exam Relevance Score: 87