Skip to content

Lab 01: Solution - Portal Walkthrough

Only refer to this after attempting the tasks yourself!


Task 1: Create User Accounts

Creating User A (Alex Johnson)

  1. Sign in to portal.azure.com

  2. Search for "Entra ID" or "Azure Active Directory" in the top search bar

  3. Click Users in the left navigation

  4. Click + New userCreate new user

  5. Basics tab:

    • User principal name: alexjohnson (domain auto-fills)
    • Mail nickname: Leave as auto-generated or set to alexjohnson
    • Display name: Alex Johnson
    • Password: Select Auto-generate password
    • Check Show password and copy it somewhere safe
    • Account enabled: Yes (checked)
  6. Properties tab:

    • First name: Alex
    • Last name: Johnson
    • Job title: Project Manager
    • Department: Operations
    • Usage location: United States
    • Mobile phone: +1-555-0101
  7. Click Review + createCreate

Creating User B (Maria Garcia)

Repeat the process with:

  • User principal name: mariagarcia
  • Display name: Maria Garcia
  • Job title: Developer
  • Department: Engineering
  • Usage location: United States

Creating User C (James Wilson)

Repeat the process with:

  • User principal name: jameswilson
  • Display name: James Wilson
  • Job title: Security Analyst
  • Department: Security
  • Usage location: United Kingdom
  • Company name: Contoso Security (in Properties → Job Information section)

Task 2: Create Security Groups

Creating SG-ProjectAlpha-Members

  1. In Entra ID, click Groups in left navigation

  2. Click + New group

  3. Configure:

    • Group type: Security
    • Group name: SG-ProjectAlpha-Members
    • Group description: All members of Project Alpha
    • Membership type: Assigned
    • Owners: (optional - skip for now)
    • Members: Click No members selected
      • Search for and select: Alex Johnson, Maria Garcia, James Wilson
      • Click Select
  4. Click Create

Creating SG-ProjectAlpha-Admins

Repeat with:

  • Group name: SG-ProjectAlpha-Admins
  • Description: Administrators for Project Alpha
  • Members: Alex Johnson only

Creating SG-Engineering-All

Repeat with:

  • Group name: SG-Engineering-All
  • Description: All Engineering department staff
  • Members: Maria Garcia only

Task 3: Create Microsoft 365 Group

  1. Click Groups+ New group

  2. Configure:

    • Group type: Microsoft 365
    • Group name: M365-ProjectAlpha-Team
    • Group email address: projectalpha (domain auto-fills)
    • Group description: Project Alpha collaboration group
    • Membership type: Assigned
    • Owners: Click No owners selected
      • Search and select: Alex Johnson
      • Click Select
    • Members: Click No members selected
      • Search and select: Alex Johnson, Maria Garcia, James Wilson
      • Click Select
  3. Click Create

Note: Microsoft 365 groups can take a few minutes to fully provision.


Task 4: Configure User Properties in Bulk

Since we only have 3 users, we'll update each individually:

For Alex Johnson:

  1. Go to Users → Click Alex Johnson
  2. Click Properties in the left menu
  3. Click Edit properties
  4. Scroll to Job information section:
    • Employee ID: 100001
    • Employee type: Employee
  5. Scroll to Manager & directs section:
    • Sponsor: Search for and select your admin account
  6. Click Save

Repeat for Maria and James:

  • Maria: Employee ID = 100002
  • James: Employee ID = 100003

Task 5: Manage Group Ownership

Add Owner to SG-ProjectAlpha-Members:

  1. Go to Groups → Click SG-ProjectAlpha-Members
  2. Click Owners in the left menu
  3. Click + Add owners
  4. Search for Alex Johnson
  5. Select and click Select

Configure M365 Group Settings:

  1. Go to Groups → Click M365-ProjectAlpha-Team
  2. Click Properties in the left menu
  3. Scroll down to find email settings:
    • Allow external senders...: Ensure this is No / unchecked
    • Send copies of group conversations...: Ensure this is Yes / checked
  4. Click Save if changes were made

Note: Some M365 group settings may need to be configured in Microsoft 365 Admin Center or Exchange Admin Center.


Task 6: Self-Service Group Settings

  1. Go to Entra IDGroups

  2. Click General under Settings in left navigation

  3. Configure each setting:

    • Owners can manage group membership requests in My Groups: Yes
    • Restrict user ability to access groups features in My Groups: No
    • Users can create security groups...: No
    • Users can create Microsoft 365 groups...: Yes
  4. Click Save

Security Impact Notes:

  • Allowing M365 group creation but not security groups = users can collaborate but can't create groups used for RBAC
  • Restricting My Groups access limits user self-service capabilities

Task 7: Block/Unblock User Sign-in

Block User C:

  1. Go to Users → Click James Wilson
  2. Click Properties in left menu
  3. Click Edit properties
  4. Find Account status section
  5. Check Block sign in
  6. Click Save

Alternative quick method:

  1. From user overview page, click Block sign in button at top
  2. Confirm the action

Verify Blocked Status:

  • The user list will show a blocked icon
  • User profile shows "Block sign in: Yes"

Unblock User C:

  1. Return to James Wilson's profile
  2. Edit properties or click Unblock sign in
  3. Uncheck block sign in
  4. Save

Task 8: Delete and Restore User

Delete User:

  1. Go to Users → Find James Wilson
  2. Select the checkbox next to his name
  3. Click Delete in the toolbar
  4. Confirm deletion

Or from user profile:

  1. Click on James Wilson
  2. Click Delete button at top
  3. Confirm

Find Deleted User:

  1. Go to Users → Click Deleted users tab
  2. James Wilson should appear here
  3. Note the Deleted on date
  4. Permanent deletion occurs 30 days after this date

Restore User:

  1. In Deleted users, select James Wilson
  2. Click Restore user in toolbar
  3. Confirm restoration

Verify Restoration:

  1. Go back to Users (All users tab)
  2. James Wilson should appear
  3. Click on him and verify:
    • Job title is still "Security Analyst"
    • Department is still "Security"
    • Check group memberships (Groups tab) - should still be in SG-ProjectAlpha-Members

Common Mistakes to Avoid

  1. Forgetting Usage Location - Users cannot be assigned licenses without this
  2. Wrong Group Type - Security groups cannot have email; M365 groups always have email
  3. Membership Type Confusion - "Assigned" = manual, "Dynamic" = rule-based (requires P1)
  4. Assuming Delete = Gone - 30-day soft delete period exists
  5. Blocking vs Deleting - Blocking is temporary and reversible; deletion removes the account

Released under the MIT License.