PA-02: Use Dedicated Admin Accounts
Frequently asked questions about implementing and managing the PA-02 security control in Microsoft 365 and Entra ID.
QWhat is PA-02 (Use Dedicated Admin Accounts)?▼
PA-02 is a security control that when an attacker compromises a daily work account through phishing or malware, they should not gain admin access. dedicated admin accounts limit blast radius and enable stricter controls like device requirements. It requires that administrative roles are assigned to dedicated admin accounts (e.g., admin-john@contoso.com) and daily work accounts do not hold privileged role assignments, admin accounts are cloud-only (not synced from on-premises ad).
QWhy is Use Dedicated Admin Accounts important for Microsoft 365 security?▼
When an attacker compromises a daily work account through phishing or malware, they should not gain admin access. Dedicated admin accounts limit blast radius and enable stricter controls like device requirements.
QHow do I implement PA-02 in my tenant?▼
PA-02 requires manual implementation. Requires organizational process change
QWhat license do I need for PA-02?▼
This control can be implemented with any Microsoft 365 subscription, including free Azure AD.
QWhich security baseline includes PA-02?▼
PA-02 is included in the TrueConfig Recommended Secure baseline (Level 1). This is the foundation level suitable for most organizations.
5
Questions
1
Related Controls
—
Categorized
Related Resources
Still have questions?
Our security experts are here to help. Start a free trial and get personalized guidance for your Microsoft 365 environment.
Start Free Trial