Skip to main content

Troubleshooting Lab: Manage User and Group Properties

Diagnostic Scenarios​

Scenario 1 β€” Root Cause​

A company's IT team reports that a dynamic security group called grp-financeiro-licencas has stopped including new employees from the finance department. The group is used for automatic assignment of Microsoft 365 licenses.

The administrator checks the group in the Microsoft Entra ID portal and observes the following state:

PropertyObserved value
Membership typeDynamic User
Group typeSecurity
Rule statusPaused
Last evaluation14 days ago

The configured membership rule is:

(user.department -eq "Financeiro") and (user.accountEnabled -eq true)

The administrator also notes that the tenant underwent a Microsoft Entra ID licensing plan migration 16 days ago, moving from P1 plan to a free trial period while the new contract was being processed. The contract was renewed 3 days ago and P1 licenses were reactivated.

Three new employees were onboarded 5 days ago with the department attribute correctly set as "Financeiro" and enabled accounts. None of them appear in the group.

What is the root cause of the observed problem?

A) The membership rule contains a logical and operator that requires simultaneous matching of two attributes, which increases processing latency and prevents immediate evaluation of new members.

B) Dynamic group processing was automatically suspended during the period when the tenant was without a valid Microsoft Entra ID P1 license, and the rule has not been manually reactivated yet.

C) The three new employees were created during the free trial period, and accounts created in this mode are not eligible for dynamic groups even after plan renewal.

D) The accountEnabled attribute is not supported as a dynamic rule criterion in Security type groups, which caused the evaluation to stop.


Scenario 2 β€” Action Decision​

The root cause has already been identified: a junior administrator, while trying to reorganize permissions, accidentally executed the following command that removed all members from an assigned security group (grp-devs-producao) used for access control to a production Key Vault:

az ad group member remove \
--group grp-devs-producao \
--member-id $(az ad group member list --group grp-devs-producao --query "[].id" -o tsv)

It's 10 PM on a Friday. The automated deployment system runs at 11 PM and depends on the group's access to the Key Vault to read secrets. The original member list was not saved before removal. The senior administrator has access to Microsoft Entra ID and the Azure portal. The environment has active Microsoft Entra ID P2, with Microsoft Entra Privileged Identity Management (PIM) configured, but group audit logs have 30-day retention.

What is the correct action to take at this moment?

A) Recreate the grp-devs-producao group with a new Object ID and reassign Key Vault permissions, restoring members from memory or internal documentation.

B) Query Microsoft Entra ID audit logs to identify the removed members and re-add them to the existing group before 11 PM.

C) Open a support ticket with Microsoft for emergency group state restoration, a procedure available for P2 tenants.

D) Temporarily disable the 11 PM deployment job and resolve member restoration on the next business day to avoid errors under pressure.


Scenario 3 β€” Root Cause​

An administrator receives a complaint: user pedro.souza@contoso.com cannot access a corporate application integrated with Microsoft Entra ID. Upon investigation, the administrator verifies the following information:

User Principal Name : pedro.souza@contoso.com
Account enabled : True
User type : Member
Assigned licenses : Microsoft 365 E3
Last sign-in : 2 days ago (successful)

Application access is controlled by a group called grp-app-erp-acesso. The administrator verifies that Pedro is listed as a member of the group in the portal. The application requires authentication via Microsoft Entra ID and is configured to allow access only to directly assigned users.

The administrator also observes that Pedro was added to the grp-app-erp-acesso group two hours ago via dynamic membership, after his jobTitle attribute was updated to "Analista Financeiro".

The application, in turn, is configured with the following assignment policy:

Assignment required : Yes
Assigned entities : Users only (direct assignment)

What is the root cause of the access problem?

A) Pedro's last successful login was two days ago, and the cached access token has not yet expired to reflect the new group membership.

B) The application is configured to accept only direct user assignments, and group membership is not recognized as a valid assignment.

C) Dynamic group membership has processing latency and Pedro has not yet been effectively added to the group, despite appearing in the listing.

D) The Microsoft 365 E3 license assigned to Pedro does not include the access rights necessary for the corporate application in question.


Scenario 4 β€” Diagnostic Sequence​

An administrator receives the following report: guest users from an external partner are able to view the complete list of users and groups in the company's directory in Microsoft Entra ID, behavior that should be blocked according to internal policy.

The administrator needs to diagnose why the restriction is not working. The available investigation steps are:

  • Step P: Verify if External collaboration settings are configured to restrict guest access to the directory.
  • Step Q: Confirm if the reported users are of type Guest in the account properties in Microsoft Entra ID.
  • Step R: Check if any directory role is assigned to guest users that might grant elevated read permissions.
  • Step S: Audit the Microsoft Entra ID activity log to identify which objects guests are accessing and how frequently.
  • Step T: Confirm if the guest restriction policy is being applied to the correct tenant, and not just to a subset of users through a group.

What is the correct investigation sequence?

A) S, Q, P, R, T

B) Q, P, R, T, S

C) P, Q, T, R, S

D) R, P, Q, S, T


Answer Key and Explanations​

Answer Key β€” Scenario 1​

Answer: B

The Paused state displayed in the group properties is the central clue in the scenario. Microsoft Entra ID automatically suspends dynamic group processing when the tenant loses the P1 or P2 license, which is the prerequisite for this feature. After license reactivation, processing is not automatically resumed: the administrator needs to manually pause and reactivate the rule, or edit and save the rule to force a new evaluation.

The information about the plan migration 16 days ago and the Paused status together confirm the cause. The detail about the three employees created 5 days ago is relevant to contextualize the symptom, but it's not the cause. Their creation date does not interfere with eligibility.

Alternative A is a distractor that confuses processing latency with total blocking. The and operator does not cause rule suspension. Alternative C represents a myth without technical basis: the account creation mode does not affect eligibility for dynamic groups. Alternative D is incorrect because accountEnabled is a supported attribute in dynamic rules for Security groups.

The most dangerous distractor is A, because it leads the administrator to investigate rule syntax instead of checking the group's processing state, wasting time while new members continue without access.


Answer Key β€” Scenario 2​

Answer: B

The cause has already been identified. The context imposes two critical restrictions: the deadline until 11 PM and the need to keep the group's Object ID intact to preserve the existing permission assignment in the Key Vault. Recreating the group (A) would generate a new Object ID, invalidating the configured permission and requiring Key Vault reconfiguration, which adds unnecessary risk under time pressure.

Microsoft Entra ID audit logs record member additions and removals with 30-day retention. With active PIM and confirmed retention, it's possible to identify the removed members and re-add them to the existing group, preserving the Object ID and Key Vault permission.

The mention of PIM in the scenario is intentionally present information to distract: PIM has no direct function in restoring common group members. Its presence in the scenario should not influence the decision.

Alternative C is incorrect because Microsoft does not offer emergency group state restoration as a standard support service. Alternative D ignores the real-time constraint: the 11 PM deployment would cause production failure if not resolved beforehand.


Answer Key β€” Scenario 3​

Answer: B

The configuration Assigned entities: Users only (direct assignment) is determinant. When an application in Microsoft Entra ID is configured with Assignment required: Yes and accepts only direct user assignments, group membership is not recognized as a valid assignment for access purposes. The user needs to be directly assigned to the application, regardless of belonging to a group with apparent access.

Pedro's presence in the group member listing is true data, but irrelevant for diagnosis given the application's assignment mode. This is the intentionally irrelevant information in the scenario.

Alternative A is the most seductive distractor: token cache is a legitimate cause in other scenarios, but here the last successful login was two days ago, and even with cached token, application access requires assignment validation in the directory, not just the token. Alternative C might seem plausible due to dynamic group latency, but the scenario explicitly states that Pedro already appears as a member in the listing. Alternative D has no basis in the scenario: no information relates the license type to application access.


Answer Key β€” Scenario 4​

Answer: B

The correct sequence is: confirm that users are indeed of type Guest (Q), verify if the External collaboration settings policy is configured to restrict access (P), check if any directory role was inappropriately assigned to these guests, which would override the restriction (R), confirm the policy's application scope in the tenant (T) and, lastly, audit logs to understand what was accessed (S).

The correct reasoning starts from the simplest and most verifiable: confirm user type before any other investigation. Without confirming they are Guests, any following step might be applied to the wrong object. Next, verify policy configuration before looking for exceptions. Only after confirming the policy exists and is correct does it make sense to investigate if something overrides it (assigned directory role). Application scope is validated after confirming the base configuration. Audit logs are the last step because they are retrospective investigation, useful for understanding the problem's scope, not for diagnosing the configuration failure cause.

Sequence A starts with logs, which is a classic error of reacting to symptoms without first validating configuration. Sequence C reverses the order between policy and user type confirmation, creating risk of investigating policy in the wrong context. Sequence D starts with directory roles, which are a secondary hypothesis, before validating more probable and simple hypotheses.


Troubleshooting Tree: Manage User and Group Properties​

100%
Scroll para zoom Β· Arraste para mover Β· πŸ“± Pinch para zoom no celular

Legend:

  • Dark blue: entry point, initial observed symptom
  • Medium blue: diagnostic question, requires active verification
  • Red: identified cause or necessary corrective action
  • Green: confirmed resolution or completed validation
  • Orange: intermediate state requiring monitoring or awaiting processing

To use this tree when facing a real problem, start at the root node describing the observed symptom and answer each diagnostic question based on what you can directly verify in the Microsoft Entra ID portal or via CLI. Follow the path corresponding to the observed answer, without skipping steps, until reaching an identified cause or recommended action node. Questions about object type, account state, and rule configuration should always precede investigations about logs or processing latency.