5.1.4.3 (L1) Ensure the GA role is not added as a local administrator during Entra join

Information

This setting controls whether the Global Administrator role is automatically added to the local administrators group on a device during the Microsoft Entra join process.

The recommended state is No.

System administrators may be inclined to use over-privileged accounts for convenience when managing devices. Enforcing this control helps discourage that behavior by requiring administrative actions to be performed using accounts specifically designated for local administration. This promotes adherence to the principle of least privilege and reduces the risk associated with using high-level roles for routine tasks. For example, using a Global Administrator account to authenticate to a compromised endpoint and continue performing tasks significantly increases the risk of broader organizational compromise.

Solution

To remediate using the UI:

- Navigate to Microsoft Entra admin center https://entra.microsoft.com/.
- Click to expand Entra ID > Devices select Device settings.
- Set Global administrator role is added as local administrator on the device during Microsoft Entra join (Preview) to No.

Impact:

Restricting the default behavior and requiring manual assignment to least privilege roles introduces minor administrative overhead. During the Microsoft Entra join process, the Microsoft Entra Joined Device Local Administrator role is automatically added to the device's local administrators group and should be used instead.

See Also

https://workbench.cisecurity.org/benchmarks/24619

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

References: 800-53|AC-2, 800-53|AC-3, 800-53|AC-6, 800-53|AC-6(1), 800-53|AC-6(7), 800-53|AU-9(4)

Plugin: microsoft_azure

Control ID: cfee3c36f9a1664a7f231d38f514626ccc6cc80453ba36903a56c4836c8ac92f