AZ_PARTNER_TIER2_SUPPORT
Summary
FSProtect ACL Alias
AZ_PARTNER_TIER2_SUPPORT
Entra ID (Azure AD) Alias
Partner Tier2 Support
Affected Object Types
Users, Service Principals, Tenant
Exploitation Certainty
Certain
Graph Permission / Role
Directory Role: Partner Tier2 Support
Description
AZ_PARTNER_TIER2_SUPPORT represents the Partner Tier2 Support directory role in Microsoft Entra ID (Azure AD). This role is assigned to Microsoft Partner organizations through the Cloud Solution Provider (CSP) or delegated administration programs. It grants elevated access to customer tenants for support and management purposes.
Capabilities of Partner Tier2 Support:
Reset passwords for non-admin users and some admin roles
Manage user accounts including creation, modification, and deletion
Access service health information
Create and manage support tickets
Read directory information
Manage groups and group memberships (with some restrictions)
Limited administrative actions on behalf of the customer tenant
Security Implications:
External access: The role is held by principals from an external partner tenant.
Cross-tenant trust: Actions are performed by entities outside your organizational control.
Password reset abuse: Can be used to take over non-admin accounts.
Persistence: Partners may retain access even after business relationships end.
Visibility gaps: Partner actions may not be as visible in customer audit logs.
Important: This role is part of the Delegated Admin Privileges (DAP) or Granular Delegated Admin Privileges (GDAP) model and should be carefully monitored.
Identification
PowerShell
Exploitation
A compromised partner account with Tier2 Support access can abuse the delegated privileges to compromise customer tenants.
Reset User Password
Enumerate Tenant Users
Mitigation
Transition from DAP to GDAP: Migrate from Delegated Admin Privileges to Granular Delegated Admin Privileges for more restrictive access.
Go to Microsoft 365 Admin Center -> Settings -> Partner relationships.
Review and update partner access permissions.
Review partner relationships regularly:
Audit which partners have access to your tenant.
Remove partner relationships that are no longer needed.
Implement least privilege for partners:
Use GDAP to grant only necessary roles.
Avoid granting Partner Tier2 Support when Helpdesk-level access is sufficient.
Monitor partner actions:
Review audit logs for actions performed by partner accounts.
Alert on password resets and user modifications by external principals.
Require MFA for partner access: Ensure partners accessing your tenant use multi-factor authentication.
Detection
Detect partner access and actions in Audit logs.
Go to Microsoft Entra ID -> Audit logs.
Filter by:
Initiated by (actor): Look for external partner principals.
Activity: Password reset, User creation, Group modification.
Monitor for:
Password resets by Partner Tier2 Support accounts.
User account modifications by external principals.
New partner role assignments.
Access from partner tenants during unusual hours.
References
Last updated
Was this helpful?