AZ_PARTNER_TIER2_SUPPORT

Summary

FSProtect ACL Alias

AZ_PARTNER_TIER2_SUPPORT

Entra ID (Azure AD) Alias

Partner Tier2 Support

Affected Object Types

Users, Service Principals, Tenant

Exploitation Certainty

Certain

Graph Permission / Role

Directory Role: Partner Tier2 Support

Description

AZ_PARTNER_TIER2_SUPPORT represents the Partner Tier2 Support directory role in Microsoft Entra ID (Azure AD). This role is assigned to Microsoft Partner organizations through the Cloud Solution Provider (CSP) or delegated administration programs. It grants elevated access to customer tenants for support and management purposes.

Capabilities of Partner Tier2 Support:

  • Reset passwords for non-admin users and some admin roles

  • Manage user accounts including creation, modification, and deletion

  • Access service health information

  • Create and manage support tickets

  • Read directory information

  • Manage groups and group memberships (with some restrictions)

  • Limited administrative actions on behalf of the customer tenant

circle-exclamation

Identification

PowerShell

chevron-rightFind Partner Tier2 Support Role Assignmentshashtag
chevron-rightCheck for All Partner Roleshashtag

Exploitation

A compromised partner account with Tier2 Support access can abuse the delegated privileges to compromise customer tenants.

Reset User Password

Enumerate Tenant Users

Mitigation

  • Transition from DAP to GDAP: Migrate from Delegated Admin Privileges to Granular Delegated Admin Privileges for more restrictive access.

    • Go to Microsoft 365 Admin Center -> Settings -> Partner relationships.

    • Review and update partner access permissions.

  • Review partner relationships regularly:

    • Audit which partners have access to your tenant.

    • Remove partner relationships that are no longer needed.

  • Implement least privilege for partners:

    • Use GDAP to grant only necessary roles.

    • Avoid granting Partner Tier2 Support when Helpdesk-level access is sufficient.

  • Monitor partner actions:

    • Review audit logs for actions performed by partner accounts.

    • Alert on password resets and user modifications by external principals.

  • Require MFA for partner access: Ensure partners accessing your tenant use multi-factor authentication.

Detection

Detect partner access and actions in Audit logs.

  • Go to Microsoft Entra ID -> Audit logs.

  • Filter by:

    • Initiated by (actor): Look for external partner principals.

    • Activity: Password reset, User creation, Group modification.

Monitor for:

  • Password resets by Partner Tier2 Support accounts.

  • User account modifications by external principals.

  • New partner role assignments.

  • Access from partner tenants during unusual hours.

References

Last updated

Was this helpful?