The 5 Species You’ll Meet in Entra — and How to Optimize Them

 [Insert National Geographic Narrator Here…]

Welcome… to the vast and vibrant land of Entra — a sprawling digital ecosystem teeming with life. Here, hundreds of species coexist in a delicate balance, each playing a unique role in the survival of the tenantlands. Some are harmless grazers. Some are apex predators. Some are invasive species that should have been removed seasons ago.

Today, we embark on an expedition deep into this identity wilderness to study several of the most fascinating creatures you’ll encounter. Observe closely. Take notes. And do not forget to feed the Admin on your way out.


The Default User (defaultious homosapiens)

The everyday creature who just wants their email to work.

Habitat: Roams freely across Outlook plains and Teams barrens. Occasionally wanders into SharePoint by accident.

Conservation Status: Vulnerable

The defaultious homosapiens is a gentle, hardworking species. They thrive in predictable environments and become distressed when confronted with unexpected MFA prompts or anything resembling a security warning. Their natural predator, hackeri evilonus, hunts them relentlessly.

Typical traits

  • Uses one device (usually outdated)
  • Confuses Microsoft accounts with work accounts
  • Treats MFA prompts like an annoyance
  • Has never clicked “Review permissions” before consenting to an app

How to protect them

  • Phishing‑resistant MFA (FIDO2, WHfB)
  • Lifecycle Workflows for clean onboarding/offboarding
  • Baseline Conditional Access
  • Group‑based access for simplicity

Why they matter

They make up the majority of the population — and the majority of your risk. Protect them, and the whole ecosystem stabilizes.


The Executive (executi demandustoomuchus)

The creature with the most access and the least tolerance for friction.

Habitat: Highly migratory. Rarely stays in the same area for more than 24 hours.

Conservation Status: Least Concern (but extremely high maintenance)

This species is majestic yet unpredictable. They carry powerful privileges and move swiftly between devices, networks, and continents. Their mating call is “Why can’t I access this?” followed by “Fix it now.”

Typical traits

  • Uses four devices interchangeably
  • Connects from airports, hotels, and conference Wi‑Fi
  • Has more roles than they should
  • Gets phished more than anyone else

How to optimize them

  • Risk‑based Conditional Access
  • PIM for all privileged roles
  • FIDO2 keys for travel
  • Dedicated VIP support workflows

Why they matter

They are prized targets for predators — and the loudest when something breaks. Managing them requires care.


The Shadow Admin (whoareyouiti whydoyous)

An invasive species with unexpected — and often dangerous — privileges.

Habitat: Lurks in the shadows of Azure AD roles, often unnoticed until audit season.

Conservation Status: Critically Endangered (or should be)

This elusive creature is the result of ancient rituals such as “just give them Global Admin for a minute.” They often forget they possess these powers, making them unpredictable and hazardous to the environment.

Typical traits

  • Holds GA, Exchange Admin, SharePoint Admin, and Teams Admin
  • Doesn’t use any of them
  • Logs in from unmanaged devices
  • Has never heard of PIM

How to optimize them

  • Audit role assignments
  • Move all roles into PIM
  • Remove standing access
  • Use Access Reviews

Why they matter

Shadow admins are responsible for many ecosystem collapses. Remove them, and the tenantlands flourish.


The Service Account (servicus overprivilegi)**

Not human — but often more dangerous than one.

Habitat: Deep within automation pipelines, Graph API thickets, and unattended scripts.

Conservation Status: Overpopulated

This species is essential to the ecosystem, but when left unchecked, it multiplies rapidly and consumes far more permissions than necessary. Many are born without owners, destined to roam the tenantlands unsupervised.

Typical traits

  • Granted Directory.ReadWrite.All “just to get it working”
  • Secrets never rotated
  • No owner assigned
  • No monitoring

How to optimize them

  • Use Managed Identities
  • Assign least‑privilege Graph permissions
  • Rotate secrets automatically
  • Tag owners and enforce Access Reviews

Why they matter

Service principals are the new domain admins. Govern them, or they will govern you.


The Actual Admin (awesomedeus coolioses)

The keystone species holding the entire ecosystem together.

Habitat: Audit log caves, Conditional Access cliffs, and PowerShell riverbanks.

Conservation Status: Near Threatened

This rare and noble creature understands the ecosystem better than any other. They maintain balance, enforce order, and clean up the messes left by every other species. Without them, the tenantlands would collapse into chaos.

Typical traits

  • Creates “safe” policies that still break something
  • Lives in audit logs
  • Uses PowerShell and Graph more than the portal
  • Has strong opinions about Microsoft licensing

How to optimize them

  • Use PIM for all admin roles
  • Maintain break‑glass accounts
  • Automate repetitive tasks
  • Document everything

Why they matter

They are the only species capable of restoring balance when disaster strikes.


Bonus Species: The Guest User (guesta getouta)

An invasive species that can be harmless — or catastrophic.

Habitat: Appears suddenly in Teams channels, SharePoint sites, and external collaboration zones.

Conservation Status: Invasive

Guest users drift into the tenantlands through file shares, meeting invites, and cross‑tenant collaboration. Some are helpful. Some are forgotten. Some have more access than your employees. All must be monitored.

Typical traits

  • Created automatically when someone shares a file
  • No lifecycle, no owner, no governance
  • Often persists long after the project ends
  • Sometimes granted internal roles “just to get something working”
  • Uses unmanaged, unmonitored devices

How to optimize them

  • Access Reviews for all guest‑accessible groups and apps
  • Conditional Access requiring MFA and compliant/verified devices
  • Cross‑tenant access settings
  • Entitlement Management with auto‑expiring access packages
  • Restrict guest permissions

Why they matter

They are the front door to your tenant — and attackers know it.


Bringing It All Together

As the sun sets over the tenantlands, the Entra ecosystem continues its delicate dance. Each species — from the humble Default User to the mighty Actual Admin — plays a vital role in maintaining balance.

Designing identity around personas, rather than just policies, creates an environment that is:

  • more secure
  • more predictable
  • easier to govern
  • and far less chaotic

Protect the ecosystem, and the ecosystem will protect you.

Until next time, explorers.

Comments

Popular posts from this blog

Using Power Automate to Update Contact Information

Using Custom Connectors and Microsoft Graph API's to Manage Licenses in Power Automate - Part One

Using Custom Connectors and Microsoft Graph API's to Manage Licenses in Power Automate - Part Two