Override Access for Protected Objects
You can grant specific Active Directory users, groups, or computers permission to access objects protected by Shields Up. This allows for controlled exceptions during a Shields Up activation, ensuring that essential accounts retain access to critical resources.
Removing an object from the Override Access list revokes its ability to access protected Tier Zero and system resources when Shields Up is enabled.
To override access:
-
From the left navigation menu, choose Security | Prevention.
-
Select the Shields Up tab.
-
Click the Add Override Access button in the action bar or select a protected domain.
-
From the Add Override Access flyout, enter Active Directory users, groups, or computers that should be allowed to access protected objects while Shields Up is active. Selecting an object will add it to the grid.
-
Use the Remove button to delete entries from the grid.
-
Click Save to confirm your selections.
To remove override access:
-
From the left navigation menu, choose Security | Prevention.
-
Select the Shields Up tab.
-
Select a domain.
-
From the domain details, select the required user, computer, or group and select Remove.
-
Select Remove Override Access to confirms the action and revoke the override access.
Privileged Objects
Privileged objects are the most critical assets within Microsoft Entra ID. Within the Microsoft enterprise access model, Privileged objects in Entra ID include permissions that can delegate management of resources, modify credentials, authentication or authorization policies, and access restricted data.
Security Guardian supports the following Privileged types:
-
Groups
-
Roles
-
Service Principals
-
Tenants
-
Users
The Privileged Objects provider (Security Guardian or BloodHound Enterprise), identifies Entra ID Privileged objects within the Microsoft 365 tenant(s). These objects are then collected and displayed in Security Guardian.
Privileged Objects List
The Privileged Objects list displays all of the Privileged objects that have been collected by the Privileged objects provider (Security Guardian or BloodHound Enterprise) as well as any that have been manually-added by users.
|
NOTE: If BloodHound Enterprise is configured and you see the message No New Privileged Objects, check the BloodHound Enterprise Configuration Status from within On Demand Audit. Review the configuration connection message details to determine whether the connection to SpecterOps has been successful. Review the Last Configuration Received, Next Configuration Synchronization, and the status of the configuration. |
To access the Privileged Objects list:
From the On Demand left navigation menu, choose Security | Privileged Objects. The following information displays for each Privileged object:
|
NOTE: If you click the Filter button, you can filter displayed results by any one of these criteria. |
From the Privileged Objects list, you can:
Viewing Privileged Object Details
To view a Privileged object's details:
From the Dashboard Uncertified Privileged Objects tile or from the Privileged Objects list, click the object's Display Name.
The following Object Properties are identified for the selected Privileged object:
-
Certification Status
-
Added By (Security Guardian, BloodHound Enterprise or User)
-
Display Name
-
Object ID
-
Object Type
-
Principal Name, Tenant, and Tenant ID (for Tenant objects)
-
Service Principal type (for Service Principal objects)
-
|
NOTE: This field may be populated only if On Premises Sych is enabled. |
-
Role Template ID (for Role objects)
-
User Type (for User objects)
-
Security Identified (for Group objects)
-
Principal Name
-
On Premises Name (for User and Group objects, if On Premises Synch is enabled)
-
On Premises SID for User and Group objects, if On Premises Synch is enabled)
-
On Premises Domain (for User and Group objects, if On Premises Synch is enabled)
-
Date Added
|
NOTE: This field displays the signed-in user's local date and time. |
-
Information Last Updated
Below the object properties are one or more object-specific sections:
For Tenants: Objects with control of <tenant_name>
For Roles: Active Assignments
For Service Principals and Users:
For groups:
Why Privileged?
This section provides the reason why the object is considered Privileged. If the object was added by the provider (Security Guardian or Bloodhound Enterprise), the reason is returned by the provider. If the object was manually added by a user, the reason is "Manually added as Tier Zero" or "manually added as Privileged" by <user_principal_that_added_object>".