Forum Discussion
"Security Operations Admin User" Predefined Critical Asset classification
In our XDR instance, the new "Security Operations Admin User" predefined Critical Asset classification (introduced last month) contains a few non-privileged users. I can't figure out by what logic they were added to this classification.
It seems that the users may be using laptops that are classified as "Security Operations Admin Devices," but I can't figure out why those devices are grouped that way, either.
If it were a matter of an IT user logging onto one of the machines for support, there would inevitably a lot MORE users and devices in these groups.
Does anyone know what kind of activity Microsoft uses to classify users and devices as "security operations admins?"
5 Replies
- SKadishBrass Contributor
Lucaraheller Would you please stop flooding this forum with AI slop? I've received three notifications today about posts that were old and no longer relevant, and the answers were not helpful.
First, if the thread is old and no longer relevant, it should probably be removed or marked as resolved. As long as a question remains open without a clear answer, it is normal that other people may still try to respond and help.
That is exactly why it is called a community: people sharing knowledge and trying to help one another.
Second, it is also important to be respectful and humble toward people who took their time to try to assist with your questions, even if the answer was not what you expected or was no longer needed.
Regards.
Hi SKadish
What Microsoft has publicly indicated so far is that these newer Critical Asset classifications are based on a combination of privilege signals, behavioral telemetry, and exposure context, rather than one simple static rule.
So for the Security Operations Admin User classification, it is not necessarily limited to users who currently hold a named Entra admin role. It can also include accounts that Defender identifies as having operational security influence or frequent privileged security activity.
This may include users who:
- Regularly perform security operations tasks
• Access Defender, Sentinel, Purview, or Intune administrative functions
• Frequently investigate alerts or execute remediation actions
• Administer protected endpoints or security tooling
• Have strong relationships to other critical assets
For Security Operations Admin Devices, the same principle appears to apply.
A device may be classified because it is:
- Frequently used by privileged users
• Used for security administration tasks
• Used to access sensitive consoles or workloads
• Operationally linked to high criticality identities
That would explain why some non-privileged users appear in the classification. Even without formal admin roles, they may have inherited criticality through device usage patterns, repeated activity, or association with other sensitive assets.
Important note:
These classifications are not always the same as RBAC assignments or Entra role membership. They are part of Microsoft Security Exposure Management logic, which uses broader context than directory roles alone.
What I would review:
- Sign-in history of those users
• Primary devices they use
• Shared admin workstations or jump boxes
• Defender / Intune / admin portal usage
• Temporary privileged activity in the past
• Devices used by IT staff for support
It is also possible Microsoft recalculates these relationships periodically, so group membership may change over time.
Short answer:
This is most likely relationship-based behavioral classification, not a simple “is admin = yes/no” model.
I agree more transparency from Microsoft on the exact signals would be very valuable for customers trying to validate why users or devices were included.
- Regularly perform security operations tasks
- SKadishBrass Contributor
Thanks - I asked this a year ago, so I haven't taken a look at this classification recently to see if this is still an issue. However, this definitely was not a result of manual tagging, or of devices frequently used by high criticality users.
- ckyalo
Microsoft
Admins can manually tag additional accounts as sensitive in the Defender portal, based on business context (executives, service accounts, SecOps personnel).
Additionally, devices frequently used by high criticality uses such as Domain Admins will also be classified as high critical assets. For additional details on this classification, refer to -Criticality Levels for Classifications - Microsoft Security Exposure Management | Microsoft Learn