Bsure Documentation
back to bsure.io
  • Welcome
  • Installation
    • Overview
    • Prerequisites
    • Installation Instructions
  • Technical Description
    • Design Principles
    • Azure Managed Application
    • Permissions Required
    • Security​
      • Public IP and Storage Account Key considerations
    • Technical Architecture
    • Dataflow and visibility
  • User guides
    • Overview
    • Main Dashboard
    • Users
      • Dashboard
      • Members
      • Guests
      • Data Quality
      • Properties
      • Sign-in Map
      • Sign-in Locations
      • Drilldown
    • Microsoft Licenses
      • Cost Dashboard
      • Licenses Overview
      • Subscription Overview
      • Inactive and Disabled Users
      • Overlapping licenses
      • Cost Allocation
      • Drilldown
      • Price Settings
      • Add Your Own Prices
        • Average SKU Price Calculator
    • Applications
      • Usage
      • Cost
      • Sign-in Locations
        • Successful sign-ins from blocked countries?
    • Groups
    • Security
      • Dashboard
      • Authentiation Methods
      • Entra ID Roles
      • Service Principals
    • Devices
      • Windows Dashboard
      • Windows Inactive Devices
      • Windows OS
      • Windows Management
      • Devices per Person
      • Drilldown
    • Share the Power BI App
      • Share App only
      • Give Access to the Power BI Workspace
      • Share the Storage Account Access Key
      • Share with External Users
    • Update Power BI App
    • Glossary
  • Pricing & Billing
    • Pricing
    • Billing
  • Support
    • Support
    • Frequently Asked Questions
    • Troubleshooting
    • Release Notes
    • New features
      • User purpose property
  • Partners
    • Partner sell an offering including the app to the customers
    • Customer have a strict data protection regime
    • Partner uses the app without customer knowledge
    • General considerations
  • Policies
    • Privacy Policy
    • Terms & Conditions
  • RECOMMENDED ACTIONS
    • Recommended actions
      • Review Entra ID role assignments and create a strategy to offer such roles
      • Review and remove all inactive or unwanted accounts
        • Bulk deletion of users in Entra ID
      • Protect all users with MFA
      • Review and clean up applications with excessive permissions
Powered by GitBook
On this page
  1. User guides
  2. Security

Dashboard

The Security Dashboard has two parts. The upper part shows you key security related content, while the lower part has a sign-in map displaying where your users sign in from.

PreviousSecurityNextAuthentiation Methods

Last updated 1 year ago

Security tiles

  • User accounts: User accounts not logged in last 90 days should be reviewed to ensure that they should still be active, and if not they should be disengaged

  • Guest accounts: Inactive guest accounts should be removed as a guest account with rights can be just as dangerous as a member of the company

  • Multi-factor Authentication: Users without multi factor authentication configured could be a security risk. What will happen if someone guess the correct password to one of these accounts? Break the glass accounts should also have a separate MFA method configured ref .

  • Administrative privileges: Users with administrative privileges will provide you with information on active assigned to users or applications

  • Service principals: Service Principals is often used when integrating third party solutions with Entra ID. They have an application id and a secret just as a member user have username and password. These Service Principals skips all security measures such as conditional access and the can be used from everywhere. Giving these "users" high permissions, such as read all mailboxes, create users and such means that you should monitor usage of these Service Principals. Where do the sign in from and did you know that these permissions was given the holder of the application id and the corresponding secret value? Consider adopting

Sign in map

Simply a world map showing which countries your member users have successfully signed in from the last 14 days. Look at the map for unwanted sign-ins from specific countries such as i.e Russia or China

https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/security-emergency-access
Entra ID roles
Microsoft best practice guidance