Skip to main content
Version: 2.1.0

MT.1069 - Restrict non-admin users from creating security groups.

Overview

Description

Verifies that security group creation is restricted to admin users only in the Entra ID tenant.

Why This Matters

Restricting security group creation to administrators ensures proper governance, maintains the principle of least privilege, and supports regulatory compliance requirements.

Remediation action

This setting can be changed via user settings in the Microsoft Entra or Azure portal or via Microsoft Graph API / Graph PowerShell Module.

Admin Portal:

  1. Go to Entra Admin Center
  2. Navigate to Users → User settings
  3. Set Users can create security groups to No
  4. Click Save

Use the following PowerShell commands to restrict security group creation:

# Connect to Microsoft Graph with appropriate permissions
Connect-MgGraph -Scopes "Policy.ReadWrite.Authorization"

# Get the current authorization policy
$authPolicy = Get-MgPolicyAuthorizationPolicy

# Update the policy to restrict security group creation
$params = @{
defaultUserRolePermissions = @{
allowedToCreateSecurityGroups = $false
}
}

Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId $authPolicy.Id -BodyParameter $params

Test Metadata

FieldValue
Test IDMT.1069
SeverityLow
SuiteMaester
CategoryEntra
PowerShell testTest-MtSecurityGroupCreationRestricted
TagsEntra, Group, MT.1069

Source

  • Pester test: tests/Maester/Entra/Test-MtSecurityGroupCreationRestricted.Tests.ps1
  • PowerShell source: powershell/public/maester/entra/Test-MtSecurityGroupCreationRestricted.ps1