AZ_MG_ADD_OWNER

Summary

FSProtect ACL Alias

AZ_MG_ADD_OWNER

Entra ID (Azure AD) Alias

Add Owners (Microsoft Graph)

Affected Object Types

AZ Group

Exploitation Certainty

Certain

Graph Permission / Role

Ability to add group owners through Microsoft Graph using delegated scopes and/or application permissions (app role assignments) such as: Group.ReadWrite.All, Directory.ReadWrite.All (effective capability depends on tenant policy, group type, and any administrative units / scoped admin boundaries)


Description

AZ_MG_ADD_OWNER represents the ability for a principal to add new owners to a Microsoft Entra group via Microsoft Graph.

Group owners have administrative control over the group. They can add or remove members. They can add or remove other owners. They can update group settings and attributes.

If the group is role-assignable (isAssignableToRole = true), controlling ownership of the group can become a high-impact privilege path. This is especially true when the group is used to grant directory roles or Azure RBAC access.


Identification

PowerShell (Microsoft Graph)

Enumerate service principals that have Microsoft Graph application permissions that are sufficient to manage group ownership (for example, Group.ReadWrite.All or Directory.ReadWrite.All).

Azure GUI

  • Open Microsoft Entra admin centerGroups.

  • Open the target group.

  • Go to Owners.

    • Anyone listed as Owner can add other owners.

  • If the group is privileged or role-assignable, treat owner changes as high risk and require explicit justification.

  • For application-based paths:

    • Go to Enterprise applications → select the application → Permissions / API permissions.

    • Under Microsoft Graph → review Application permissions for:

      • Group.ReadWrite.All

      • Directory.ReadWrite.All

    • Record every app that has these permissions and confirm business justification.


Exploitation

PowerShell (Microsoft Graph)

Azure GUI

1

Sign in and acquire token

Open Microsoft Graph Explorer. Sign in and ensure you have a token that permits group write operations.

2

Retrieve the group id

GET https://graph.microsoft.com/v1.0/groups?$filter=displayName eq 'My Group'

3

Retrieve the object id of the identity to add

Lookup the user or service principal object id you want to add as owner.

4

Add owner

Use the official Add owner operation from Microsoft documentation (see # References).

5

Confirm

Confirm by listing owners:

GET https://graph.microsoft.com/v1.0/groups/{group-id}/owners?$select=id,displayName


Mitigation

  • Minimize the number of Owners on sensitive groups.

  • Protect privileged groups with strict operational processes:

    • Use just-in-time admin access where available.

    • Require change approval for owner modifications.

  • Reduce Microsoft Graph exposure:

    • Remove unnecessary Graph Application permissions from service principals.

    • Prioritize removing Directory.ReadWrite.All and Group.ReadWrite.All when not required.

  • Restrict who can grant tenant-wide admin consent for high-privilege Graph permissions.

  • Maintain clear ownership and periodic access reviews for enterprise applications with Graph write permissions.


Detection

Monitor Microsoft Entra Audit logs for group owner changes.

  • Go to Microsoft Entra IDAudit logs.

  • Filter Category: GroupManagement.

  • Look for activities such as Add owner to group.

  • Ensure the view includes:

    • Activity

    • Initiated by (actor)

    • Target resources

Alert on owner changes for privileged groups and role-assignable groups.


References

Last updated

Was this helpful?