AZ_MG_ADD_OWNER
Summary
FSProtect ACL Alias
AZ_MG_ADD_OWNER
Entra ID (Azure AD) Alias
Add Owners (Microsoft Graph)
Affected Object Types
AZ Group
Exploitation Certainty
Certain
Graph Permission / Role
Ability to add group owners through Microsoft Graph using delegated scopes and/or application permissions (app role assignments) such as: Group.ReadWrite.All, Directory.ReadWrite.All (effective capability depends on tenant policy, group type, and any administrative units / scoped admin boundaries)
Description
AZ_MG_ADD_OWNER represents the ability for a principal to add new owners to a Microsoft Entra group via Microsoft Graph.
Group owners have administrative control over the group. They can add or remove members. They can add or remove other owners. They can update group settings and attributes.
If the group is role-assignable (isAssignableToRole = true), controlling ownership of the group can become a high-impact privilege path. This is especially true when the group is used to grant directory roles or Azure RBAC access.
Identification
PowerShell (Microsoft Graph)
Enumerate service principals that have Microsoft Graph application permissions that are sufficient to manage group ownership (for example, Group.ReadWrite.All or Directory.ReadWrite.All).
Azure GUI
Open Microsoft Entra admin center → Groups.
Open the target group.
Go to Owners.
Anyone listed as Owner can add other owners.
If the group is privileged or role-assignable, treat owner changes as high risk and require explicit justification.
For application-based paths:
Go to Enterprise applications → select the application → Permissions / API permissions.
Under Microsoft Graph → review Application permissions for:
Group.ReadWrite.AllDirectory.ReadWrite.All
Record every app that has these permissions and confirm business justification.
Exploitation
PowerShell (Microsoft Graph)
Azure GUI
Mitigation
Minimize the number of Owners on sensitive groups.
Protect privileged groups with strict operational processes:
Use just-in-time admin access where available.
Require change approval for owner modifications.
Reduce Microsoft Graph exposure:
Remove unnecessary Graph Application permissions from service principals.
Prioritize removing
Directory.ReadWrite.AllandGroup.ReadWrite.Allwhen not required.
Restrict who can grant tenant-wide admin consent for high-privilege Graph permissions.
Maintain clear ownership and periodic access reviews for enterprise applications with Graph write permissions.
Detection
Monitor Microsoft Entra Audit logs for group owner changes.
Go to Microsoft Entra ID → Audit logs.
Filter Category: GroupManagement.
Look for activities such as Add owner to group.
Ensure the view includes:
Activity
Initiated by (actor)
Target resources
Alert on owner changes for privileged groups and role-assignable groups.
References
Official docs and related references
https://learn.microsoft.com/en-us/graph/api/group-post-owners?view=graph-rest-1.0
https://learn.microsoft.com/en-us/graph/api/group-list-owners?view=graph-rest-1.0
https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.groups/new-mggroupownerbyref?view=graph-powershell-1.0
https://learn.microsoft.com/en-us/cli/azure/account?view=azure-cli-latest
https://learn.microsoft.com/en-us/cli/azure/use-azure-cli-rest-command?view=azure-cli-latest
https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-activity-log-schemas
https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities
Last updated
Was this helpful?