How many Global Administrators should an organisation have?
Microsoft recommends between 2 and 5 named Global Administrators, plus 2 break-glass (emergency-access) accounts that are monitored but excluded from MFA and Conditional Access. Most Australian mid-market tenants Frontrow audits run between 8 and 30 Global Administrators, often inherited from years of role assignments without review.
What is Privileged Identity Management (PIM)?
PIM is a Microsoft Entra ID P2 feature that turns privileged role assignments from active to eligible. Instead of holding the role permanently, the user activates it just-in-time when they need it, with an approval workflow, MFA challenge, justification, and audit trail. ASD's Information Security Manual and Microsoft's privileged-access deployment guidance both recommend PIM as the baseline.
What is a Privileged Access Workstation (PAW)?
A PAW is a separate, hardened device used only for privileged administrative tasks. The PAW is locked down, has restricted browsing and email (or none at all), is fully managed via Microsoft Intune, and admin sign-ins are gated to require it. The PAW prevents a compromised general-use device from giving an attacker privileged access. Microsoft's PAW deployment guidance and ASD ISM both reference this control.
What are break-glass accounts?
Break-glass accounts are emergency-access admin accounts that exist outside the normal authentication and Conditional Access policies. The purpose is to allow recovery if the tenant's MFA, Conditional Access, or PIM stack fails. Microsoft recommends two break-glass accounts in the .onmicrosoft.com domain, with credentials stored in a physical safe, excluded from CA enforcement, and aggressively monitored for any sign-in activity.
Why does the same person need a separate admin account?
Admin accounts and user accounts have different threat profiles. A user account is exposed to phishing, malicious email attachments, web-based attacks, and password reuse. An admin account should be isolated from those exposures: blocked from web browsing and email, signed in from a managed device only. The classic guidance is one identity per privilege boundary.
Is this overkill for a small business?
The break-glass discipline and 2-to-5 Global Administrator count apply at any size. PAW deployment is more substantial work and is typically scoped to organisations with regulated data, government adjacency, or critical infrastructure. PIM works at any tenant size and is included in any P2 licence. Frontrow scopes the recommendations to match the organisation's risk profile.
How is this self-assessment validated?
Every scoring threshold cites a primary source: Microsoft Learn for PIM, PAW and Entra ID role best practices; ASD Information Security Manual for the Australian baseline; CIS Microsoft 365 Foundations Benchmark. Methodology authored by Daniel Brown (5x Microsoft MVP), Graeme Lodge (Managing Director), and Sam Williams (Investor & Executive Consultant).
What does Frontrow's verified privileged access audit include?
A direct review of Entra ID role assignments, PIM configuration, Conditional Access scoped to admin roles, audit logging configuration and break-glass discipline via Microsoft Graph (rather than self-reported answers), inventory of high-risk standing assignments, and a remediation plan with PIM rollout, scoped role migration, and PAW pattern. Indicative pricing on request.