
Overview
Identity and Access Management (IAM) is the cornerstone of modern cloud security. For organizations leveraging Microsoft Azure, the configuration of Microsoft Entra ID (formerly Azure AD) dictates the strength of this security perimeter. A seemingly minor setting—the ability to enable a system-managed “All Users” group—is in fact a pivotal decision for achieving scalable governance, compliance, and operational stability.
When enabled, this feature creates a dynamic group that automatically includes every single identity within the tenant, from full-time employees to external guest collaborators. This provides a single, reliable target for applying directory-wide policies. Without it, organizations are forced to manage a complex web of manual groups, introducing the risk of security gaps and inconsistent policy application.
This article explores the strategic importance of enabling this group. We will cover its impact on FinOps, its role in mitigating security risks, and how to leverage it as a foundational element of a mature Azure governance strategy, ensuring no user account is left outside the protection of organizational security policies.
Why It Matters for FinOps
Failing to enable the “All Users” group introduces tangible costs and risks that directly impact business operations. From a FinOps perspective, the consequences manifest as operational drag, increased security vulnerabilities, and audit complexities. When security policies are applied inconsistently, the risk of a breach due to an unmanaged or forgotten user account rises significantly.
The operational overhead of not having a universal group is also a major factor. Engineering and IT teams spend valuable time creating and maintaining complex scripts or manually updating multiple groups to ensure new users receive baseline access and security controls. This manual effort is not only inefficient but also prone to human error, leading to onboarding delays and security gaps. During compliance audits, proving that a control like Multi-Factor Authentication (MFA) applies to everyone becomes a complicated exercise, increasing audit fatigue and the likelihood of costly findings.
What “Idle” Means in This Article
In the context of identity governance, “idle” refers to more than just unused accounts. An “idle risk” emerges when a user account exists outside the scope of baseline security policies. These users are active but are not governed by essential guardrails, effectively becoming invisible to your intended security posture.
This situation creates a dangerous gap. Signals of this idle risk include:
- New user accounts that are not immediately added to groups enforcing MFA.
- Guest or contractor accounts that bypass standard security configurations because they don’t fit into a manually managed group structure.
- Orphaned identities that retain access long after a project ends because they were never part of a centrally managed policy group.
The “All Users” group is the primary mechanism to eliminate this idle risk, ensuring every identity is immediately covered by foundational security and access policies from the moment of its creation.
Common Scenarios
Properly configured, the “All Users” group becomes a powerful tool for streamlining administration and enforcing security baselines.
Scenario 1
Enforcing Universal MFA: The most common and critical use case is applying a Conditional Access policy that requires MFA for all users. By assigning this policy to the “All Users” group, you ensure that every identity—internal or external, privileged or standard—must satisfy MFA requirements, closing a major vector for account compromise.
Scenario 2
Automating Birthright Application Access: Organizations provide certain applications to all employees, such as an HR portal or an internal knowledge base. Assigning these applications to the “All Users” group automates provisioning, granting new hires immediate access to essential tools without manual IT intervention and reducing onboarding friction.
Scenario 3
Blocking Insecure Protocols: A key security practice is to block legacy authentication protocols (like POP3 and IMAP) that do not support modern controls like MFA. A restrictive Conditional Access policy assigned to the “All Users” group effectively closes this loophole across the entire environment, preventing attackers from bypassing your primary security measures.
Risks and Trade-offs
While enabling the “All Users” group is a recommended best practice, its misuse can create significant vulnerabilities. The primary risk is granting excessive permissions to this group, which fundamentally violates the Principle of Least Privilege.
For example, assigning a role like “Global Administrator” or “Contributor” on a key subscription to the “All Users” group would instantly grant every identity—including external guests—the highest levels of privilege. This single misconfiguration could completely compromise the security of your entire Azure tenant.
The trade-off is between convenience and control. This group should be treated exclusively as a target for applying baseline access (e.g., read-only access to a public portal) and restrictive policies (e.g., MFA requirements, location-based blocks). It should never be used to grant broad, privileged access to sensitive data or infrastructure.
Recommended Guardrails
To leverage the “All Users” group safely and effectively, organizations should establish clear governance guardrails.
- Policy of Least Privilege: Create a formal policy stating that the “All Users” group must never be assigned privileged roles or permissions to sensitive data or infrastructure.
- Tagging and Ownership: While system-managed, ensure any policies applied to this group are clearly documented with ownership tags and a business justification.
- Change Control: Any modification to policies targeting the “All Users” group should go through a formal approval flow, as changes can have a directory-wide impact.
- Budgeting and Alerts: Use Azure Monitor to create alerts that trigger if the “All Users” group is added to a privileged role or if the setting that enables it is disabled, preventing accidental misconfigurations.
Provider Notes
Azure
In Microsoft Azure, this functionality is a core feature of Microsoft Entra ID. The “All Users” group serves as a powerful object for assigning directory-wide Conditional Access policies, which are the primary engine for enforcing Zero Trust principles like MFA, device compliance, and location-based access controls. While administrators can create their own dynamic groups with custom rules, the built-in “All Users” group is optimized by the platform for performance and reliability, ensuring no identity is missed.
Binadox Operational Playbook
Binadox Insight: Enabling the “All Users” group is a strategic governance move, not just a technical toggle. It transforms identity management from a reactive, manual process into a proactive system where baseline security is automatically enforced for every user from day one, significantly reducing your attack surface.
Binadox Checklist:
- Audit your Microsoft Entra ID settings to confirm if the “All Users” group is enabled.
- Before enabling, verify no manually created groups exist with a similar name to avoid confusion.
- After enabling, validate its membership to ensure it includes both internal and guest users.
- Immediately assign a “Report-Only” Conditional Access policy for MFA to assess the impact without disrupting users.
- Create an alert in Azure Monitor to detect any changes to this group’s configuration or high-privilege role assignments.
- Document the purpose of this group and establish clear policies prohibiting its use for granting privileged access.
Binadox KPIs to Track:
- MFA Coverage: Percentage of active users successfully covered by the universal MFA policy.
- New User Time-to-Access: Time saved during onboarding by automating access to birthright applications.
- Reduction in Audit Findings: Decrease in identity-related findings in compliance audits (e.g., CIS, SOC 2).
- Policy Exception Rate: Number of users or groups excluded from policies targeting the “All Users” group; aim to keep this near zero.
Binadox Common Pitfalls:
- Granting Privileged Roles: The most critical error is assigning administrative permissions to the group, effectively giving keys to everyone.
- Forgetting Guest Users: Assuming the group only contains internal employees, leading to guests receiving unintended access or restrictions.
- Accidental Disablement: An administrator unknowingly disabling the feature, which breaks all dependent policies and silently opens security gaps.
- Over-reliance: Using the “All Users” group as a shortcut for specific access needs instead of creating properly scoped role-based groups.
Conclusion
Enabling the “All Users” group in Azure is a foundational step toward building a scalable and secure cloud environment. It provides a simple, robust mechanism for applying universal security policies, reducing operational overhead, and satisfying stringent compliance requirements.
By treating this group as a tool for enforcing governance rather than granting permissions, FinOps and cloud teams can close critical security gaps and ensure a consistent security posture across their entire user base. The next step is to review your current Azure configuration, implement this control with the right guardrails, and make it a non-negotiable part of your identity management strategy.