AZ_MG_ADD_MEMBER
Summary
FSProtect ACL Alias
AZ_MG_ADD_MEMBER
Entra ID (Azure AD) Alias
Add Members (Microsoft Graph)
Affected Object Types
AZ Group
Exploitation Certainty
Certain
Graph Permission / Role
Ability to add group members through Microsoft Graph using delegated scopes and/or application permissions (app role assignments) such as: GroupMember.ReadWrite.All, Group.ReadWrite.All, Directory.ReadWrite.All For role-assignable groups, permissions that allow directory role management operations (e.g., RoleManagement.ReadWrite.Directory) may be required depending on configuration and policy
Description
AZ_MG_ADD_OWNER represents the ability for a principal to add new owners to a Microsoft Entra group via Microsoft Graph. By adding themselves (or a controlled identity) as an Owner of a sensitive group, an attacker can:
Gain full administrative control over the group (manage members, owners, and group settings).
Add or remove other owners to maintain persistence.
If the group is role-assignable (
isAssignableToRole = true), indirectly control directory roles and any access granted through that group (including downstream Azure RBAC assignments where that group is used).
Therefore, any identity with add-owner capability on sensitive groups can quickly escalate privileges by taking ownership of privileged or role-assignable groups.
Identification
PowerShell (Microsoft Graph)
Azure GUI
Open Microsoft Entra admin center → Identity → Applications → Enterprise applications.
Select the application (service principal) that is in scope.
Open Permissions (or API permissions).
Under Microsoft Graph:
Review Application permissions for:
Directory.ReadWrite.AllGroup.ReadWrite.AllGroupMember.ReadWrite.AllRoleManagement.ReadWrite.Directory
Record every service principal that has any of these permissions, and identify the business owner and justification.
Exploitation
PowerShell
Azure GUI
(Images referenced in the original content are retained inline where they appeared.)
Mitigation
Reduce who can grant group membership via Microsoft Graph application permissions
Go to Microsoft Entra admin center → Identity → Applications → Enterprise applications.
Select the target application (service principal / managed identity).
Open Permissions (or API permissions).
Under Microsoft Graph → Application permissions, locate any of the following high-impact permissions:
Directory.ReadWrite.AllGroup.ReadWrite.AllGroupMember.ReadWrite.AllRoleManagement.ReadWrite.Directory
If any are present and not strictly required:
Remove the permission, or replace with a lower-privilege
Ensure the change is admin-consented appropriately (removal will take effect after consent state is updated).
Restrict who can approve (admin consent) privileged Graph application permissions
Go to Microsoft Entra admin center → Identity → Enterprise applications → Consent and permissions.
Review and tighten who can:
Grant tenant-wide admin consent, and
Approve requests for application permissions to Microsoft Graph.
Remove unnecessary owners / administrators on the service principal
Go to Microsoft Entra admin center → Identity → Applications → Enterprise applications.
Select the target application.
Open Owners.
Remove any vulnerable/high-risk identities and keep the owner set minimal.
Limit administrative access to the application to only the identities responsible for operating it.
Detection
Detect “Add member to group” directly in Audit logs.
Go to Microsoft Entra ID → Audit logs.
Click Category: All → select GroupManagement → Apply.
If the Activity column is hidden: Manage view → Edit columns → check Activity, Initiated by (actor), Target → Apply.
(Original image references retained inline.)
References
https://learn.microsoft.com/en-us/graph/api/group-post-members?view=graph-rest-1.0
https://learn.microsoft.com/en-us/graph/permissions-reference
https://learn.microsoft.com/en-us/graph/permissions-overview
https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.applications/get-mgserviceprincipal?view=graph-powershell-1.0
https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.applications/get-mgserviceprincipalapproleassignment?view=graph-powershell-1.0
https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-activity-log-schemas
https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities
https://learn.microsoft.com/en-us/cli/azure/reference-index?view=azure-cli-latest
Last updated
Was this helpful?