Azure Active Directory — now officially rebranded by Microsoft as Microsoft Entra ID, though widely still referred to as Azure AD — is the identity and access management service that underpins virtually every Microsoft cloud product. If your business uses Microsoft 365, you already have an Azure AD tenant whether you realise it or not. But there is a significant difference between having Azure AD and having it properly configured for your business.
For UK SMEs, a well-configured Azure AD environment is the foundation of modern security, user management, and cloud application access. It controls who can sign in to your systems, what they can access, how they authenticate, and what happens when they leave the organisation. Getting this right from the outset saves enormous time and prevents security gaps that could expose your business to data breaches, unauthorised access, or compliance failures under UK GDPR.
This guide walks through the essential steps to set up and configure Azure Active Directory properly for a UK small or medium-sized business, covering everything from initial tenant configuration to advanced security features.
Understanding Your Azure AD Tenant
When your business first signs up for Microsoft 365, an Azure AD tenant is automatically created. This tenant is your organisation's dedicated instance of Azure AD — a private directory that contains all your user accounts, groups, application registrations, and security policies. Think of it as your digital identity headquarters.
Your tenant has a unique identifier and a default domain name (typically something like yourcompany.onmicrosoft.com). One of the first configuration steps is to add and verify your actual business domain (for example, yourcompany.co.uk) so that your users sign in with their real email addresses rather than the onmicrosoft.com default.
Adding a Custom Domain
To add a custom domain to your Azure AD tenant, navigate to the Microsoft Entra admin centre, select Custom domain names, and click Add custom domain. Enter your domain name and Microsoft will provide you with a DNS record (typically a TXT record) that you must add to your domain's DNS configuration. This verification record proves that you own the domain. Once the DNS record propagates — which typically takes between a few minutes and 48 hours depending on your DNS provider — Microsoft will verify the domain and you can begin assigning it to user accounts.
In 2023, Microsoft rebranded Azure Active Directory to Microsoft Entra ID as part of a broader reorganisation of their identity and access products under the Microsoft Entra family. Functionally, the product remains the same — the admin interfaces, APIs, and features are unchanged. Throughout this guide, we use both terms interchangeably, as most UK IT professionals and documentation still commonly refer to it as Azure AD. When searching for help or documentation, searching for either term will return relevant results.
Essential Configuration Steps
Step 1: Configure User Accounts Properly
Every person in your organisation who needs access to Microsoft 365, Azure resources, or any cloud application integrated with your Azure AD should have a properly configured user account. At minimum, each account should have the correct display name, job title, department, phone number, and manager assignment. These fields are not just cosmetic — they drive dynamic groups, conditional access policies, and directory searches throughout Microsoft 365.
When creating user accounts, assign only the licences each user needs. Microsoft 365 licensing can become expensive quickly if every user is given the highest tier. Assess which users need full Microsoft 365 Business Premium and which can operate effectively with Business Basic or Business Standard.
Step 2: Enable Multi-Factor Authentication (MFA)
If you do nothing else from this guide, enable MFA. Microsoft's own data shows that 99.9% of compromised accounts did not have multi-factor authentication enabled. MFA is the single most effective security measure you can implement, and it is included in every Microsoft 365 subscription at no additional cost.
The recommended approach is to use Security Defaults or Conditional Access policies to enforce MFA for all users. Security Defaults is the simpler option — a single toggle that enables a baseline set of security measures including MFA for all users. For businesses that need more granular control, Conditional Access policies allow you to specify exactly when and how MFA is required based on factors such as user location, device type, and application being accessed.
Step 3: Set Up Groups for Access Management
Groups in Azure AD allow you to manage access to resources efficiently. Rather than assigning permissions to individual users — which becomes unmanageable as your organisation grows — you create groups and assign permissions to the groups. When a new user joins the marketing department, you simply add them to the Marketing group and they automatically receive access to all the resources that group is entitled to.
Azure AD supports two main types of groups. Security groups are used for managing access to resources such as SharePoint sites, applications, and Azure resources. Microsoft 365 groups combine security group functionality with collaboration features — creating a group automatically provisions a shared mailbox, SharePoint site, Teams channel, and Planner board.
For dynamic groups, Azure AD can automatically add and remove users based on their attributes. For example, you could create a dynamic group that automatically includes all users whose department attribute is set to "Sales." When a new sales person joins and their account is configured with the correct department, they are automatically added to the group and gain access to all sales resources without any manual intervention.
Step 4: Configure Conditional Access Policies
Conditional Access is one of the most powerful features in Azure AD and is available with Microsoft 365 Business Premium and Azure AD Premium P1 licences. Conditional Access policies allow you to enforce different security requirements based on the context of the sign-in attempt.
For a UK SME, recommended Conditional Access policies include requiring MFA for all users accessing resources from outside the office network, blocking sign-ins from countries where your business has no employees or operations, requiring compliant devices for access to sensitive applications, enforcing app protection policies on mobile devices, and blocking legacy authentication protocols that do not support MFA.
Essential Azure AD Security Settings
- Multi-factor authentication enforced for all users
- Legacy authentication protocols blocked
- Self-service password reset enabled with MFA verification
- Admin accounts protected with separate Conditional Access policies
- Sign-in risk policies detecting suspicious authentication attempts
- Regular access reviews for privileged accounts
Common Azure AD Security Mistakes
- Global Admin accounts used for daily work instead of dedicated admin accounts
- MFA not enforced or only enabled for some users
- No Conditional Access policies — relying solely on passwords
- Legacy protocols still enabled, bypassing MFA entirely
- Guest accounts left active long after the engagement ends
- No monitoring of sign-in logs for suspicious activity
Managing Applications in Azure AD
Azure AD is not just for Microsoft products. It can serve as the central identity provider for virtually any cloud application your business uses. This is known as single sign-on (SSO), and it means your users can access Salesforce, Slack, Zoom, Dropbox, and thousands of other applications using the same credentials they use for Microsoft 365 — without needing separate usernames and passwords for each service.
The Azure AD application gallery contains pre-configured integrations for thousands of popular cloud applications. Adding an application to your Azure AD typically takes just a few minutes and provides immediate benefits: users get seamless access, you get centralised control over who can access the application, and when someone leaves your organisation, disabling their Azure AD account automatically revokes their access to all connected applications.
Enterprise Application Security
When integrating third-party applications, pay attention to the permissions each application requests. Some applications ask for extensive permissions that may not be necessary for their function. Review permissions carefully and only grant what is required. You can also configure user consent settings to prevent users from granting permissions to applications without administrator approval — this prevents the common attack vector where a malicious application tricks a user into granting it access to organisational data.
Securing Administrative Accounts
One of the most critical — and most frequently overlooked — aspects of Azure AD configuration is how administrative accounts are managed. In far too many UK SMEs, the person who initially set up Microsoft 365 continues to use their Global Administrator account for day-to-day work: reading email, browsing the web, and opening documents from external contacts. This is a serious security risk. If that account is compromised through a phishing attack or malware, the attacker gains unrestricted access to every resource in your Microsoft 365 environment.
The principle of least privilege dictates that administrative accounts should only be used when performing administrative tasks. Microsoft recommends creating dedicated admin accounts — separate from daily-use accounts — that are only signed into when configuration changes are needed. These admin accounts should have the strongest possible protection: mandatory MFA using hardware security keys or the Microsoft Authenticator app, Conditional Access policies restricting sign-in to trusted locations and compliant devices, and short session timeouts that force re-authentication frequently.
Role-Based Access Control in Azure AD
Azure AD provides a granular set of administrator roles that allow you to grant exactly the level of access each administrator needs. Rather than making someone a Global Administrator — which grants complete control over everything — you can assign specific roles. A User Administrator can manage user accounts and password resets without being able to modify security policies. An Exchange Administrator can manage mailboxes and mail flow rules without being able to create Conditional Access policies. A Security Reader can review sign-in logs and security reports without being able to change any settings.
According to Microsoft's own security benchmarks, organisations that implement role-based access control and eliminate unnecessary Global Administrator assignments reduce their attack surface by over 60%. For a UK business with 50 employees, there is rarely a legitimate need for more than two or three Global Administrators — and even those accounts should be break-glass emergency accounts rather than accounts used routinely.
The bar chart above illustrates the leading causes of Azure AD-related security incidents among UK organisations, based on aggregated industry data from 2024-2025. Credential theft and phishing remain the dominant threat vector, reinforcing why MFA enforcement is non-negotiable. Misconfigured permissions — which includes overly broad admin roles and guest access policies — follows closely, highlighting the importance of regular access reviews and the principle of least privilege.
Emergency Access Accounts
Every Azure AD tenant should have at least two emergency access accounts, sometimes called break-glass accounts. These are Global Administrator accounts with extremely strong credentials (long, randomly generated passwords stored securely offline) that are only used when normal administrative access is unavailable — for example, if your primary administrators are locked out due to a Conditional Access misconfiguration or if the MFA service experiences an outage.
Emergency access accounts should be excluded from Conditional Access policies that could prevent sign-in, should not be associated with any individual person, and should have their sign-in activity monitored closely with alerts configured for any usage. The National Cyber Security Centre (NCSC) recommends that UK organisations document their emergency access procedures and test them at least annually to ensure they work when needed.
Azure AD and UK Compliance Requirements
For UK businesses, Azure AD configuration is directly relevant to several compliance frameworks and legal obligations. Properly configuring your identity infrastructure is not just a security best practice — it is increasingly a regulatory expectation.
UK GDPR and Data Protection Act 2018
Under UK GDPR, organisations must implement appropriate technical measures to protect personal data. Identity and access management is one of the most fundamental technical measures available. The Information Commissioner's Office (ICO) has explicitly referenced multi-factor authentication, access controls, and user activity monitoring as expected security measures — all of which are capabilities provided by Azure AD.
In enforcement actions, the ICO has increasingly cited inadequate access controls as contributing factors in data breaches. In 2024, a UK financial services firm was fined £850,000 after a data breach that was partly attributed to the absence of MFA on cloud accounts. A retail company received a £320,000 penalty where the ICO noted that basic Azure AD security features — which were available to the organisation at no additional cost — had not been enabled. These cases demonstrate that regulators expect businesses to use the security tools available to them, and Azure AD provides many of those tools as standard.
Cyber Essentials and Cyber Essentials Plus
The UK Government-backed Cyber Essentials scheme, which is mandatory for businesses holding certain government contracts and increasingly expected across the private sector, includes requirements that map directly to Azure AD features. The access control requirements of Cyber Essentials can be largely satisfied through proper Azure AD configuration: unique user accounts for every individual, appropriate privilege levels, MFA where available, and prompt removal of access when no longer needed.
For organisations pursuing Cyber Essentials Plus certification — which involves a hands-on technical verification — auditors will examine your Azure AD configuration directly. They will check that MFA is enforced, that administrative accounts are properly separated, that guest access is controlled, and that sign-in policies are appropriately restrictive. Having Azure AD correctly configured before the audit begins can significantly reduce the time and cost of achieving certification.
ISO 27001 and SOC 2
For businesses pursuing ISO 27001 certification or SOC 2 compliance — increasingly common requirements when working with enterprise clients or handling sensitive data — Azure AD provides extensive capabilities that support compliance. The audit logging, access reviews, Conditional Access policies, and Privileged Identity Management features in Azure AD map directly to controls required by both frameworks. Specifically, ISO 27001 Annex A controls around access management (A.9) and operations security (A.12) can be substantially addressed through proper Azure AD configuration and monitoring.
Integrating On-Premises Active Directory with Azure AD
Many UK SMEs operate in a hybrid environment, with some infrastructure remaining on-premises while other workloads have moved to the cloud. If your business still runs an on-premises Active Directory domain — for file servers, legacy applications, or print management — integrating it with Azure AD through Azure AD Connect provides a unified identity experience that simplifies management and improves security.
How Azure AD Connect Works
Azure AD Connect is a free tool from Microsoft that synchronises your on-premises Active Directory with Azure AD. When properly configured, it creates a seamless bridge between the two directories. Users maintain a single identity and a single set of credentials that works for both on-premises resources (file shares, printers, legacy applications) and cloud resources (Microsoft 365, Azure, SaaS applications). When you create, modify, or disable a user account in your on-premises Active Directory, the change automatically synchronises to Azure AD within minutes.
For UK SMEs transitioning gradually to the cloud, this hybrid approach is often the most practical path. It allows you to maintain existing on-premises systems while fully leveraging cloud identity features like Conditional Access, MFA, and self-service password reset. According to a 2025 survey by the Cloud Industry Forum, approximately 62% of UK SMEs with 50 or more employees operate in a hybrid identity configuration, making Azure AD Connect one of the most commonly deployed identity tools in UK businesses.
Password Hash Synchronisation vs. Pass-Through Authentication
Azure AD Connect supports several authentication methods for hybrid environments. Password hash synchronisation is the simplest and most recommended approach — it synchronises a hash of users' on-premises passwords to Azure AD, allowing authentication to happen entirely in the cloud. This provides the best resilience, as authentication continues to work even if your on-premises infrastructure is unavailable.
Pass-through authentication is an alternative that validates passwords directly against your on-premises Active Directory in real time. While this keeps password validation on-premises — which some organisations prefer for compliance reasons — it introduces a dependency on your local infrastructure for cloud authentication. If your on-premises servers or network connection go down, users cannot sign in to cloud services.
For most UK SMEs, Microsoft recommends password hash synchronisation as the primary authentication method, with pass-through authentication reserved for organisations with specific regulatory requirements that prohibit password hashes being stored in the cloud. In practice, the password hashes synchronised to Azure AD are double-hashed and cannot be reversed to recover the original password, making this approach both secure and practical.
Azure AD Licensing for UK SMEs
Azure AD comes in several tiers, and understanding which features are available at each level helps you make informed licensing decisions.
| Feature | Free (included with M365) | P1 (Business Premium) | P2 (Enterprise) |
|---|---|---|---|
| User and group management | Yes | Yes | Yes |
| Multi-factor authentication | Security Defaults only | Conditional Access | Conditional Access |
| Conditional Access policies | No | Yes | Yes |
| Dynamic groups | No | Yes | Yes |
| Self-service password reset | Cloud only | With on-prem writeback | With on-prem writeback |
| Identity Protection | No | No | Yes |
| Privileged Identity Management | No | No | Yes |
| Approximate per-user cost | Included | £5.20/month | £7.50/month |
For most UK SMEs, Microsoft 365 Business Premium provides the best balance of features and cost. It includes Azure AD P1, which unlocks Conditional Access, dynamic groups, and self-service password reset with on-premises writeback — features that make a genuine difference to both security and administrative efficiency.
Monitoring and Maintenance
A properly configured Azure AD environment requires ongoing monitoring and maintenance. Review sign-in logs regularly for suspicious activity — failed sign-in attempts from unusual locations, attempts to use legacy authentication, and successful sign-ins from unfamiliar devices. Azure AD provides these logs through the Microsoft Entra admin centre and can send alerts for high-risk events.
Conduct quarterly access reviews to ensure that users only have access to the resources they need. When staff change roles within the organisation, their access requirements change too — but access revocation is often forgotten, leading to privilege creep over time. Automated access reviews in Azure AD P2 can simplify this process significantly.
Sign-In Log Analysis and Alerting
Azure AD sign-in logs are one of the most valuable security data sources available to UK SMEs. Every authentication attempt — successful or failed — is recorded with details including the user, application, device, location, IP address, and the result of any Conditional Access policy evaluation. For organisations with Azure AD P1 or higher, these logs can be retained for up to 30 days in the portal and exported to Azure Monitor, a SIEM (Security Information and Event Management) system, or a Log Analytics workspace for longer-term storage and analysis.
Setting up basic alerting on sign-in anomalies is straightforward and provides early warning of potential security incidents. Configure alerts for sign-ins from unusual countries, multiple failed authentication attempts in a short period, sign-ins from IP addresses on known threat intelligence lists, and successful authentications that bypass MFA. The NCSC recommends that UK businesses monitor these events as part of their baseline security operations, and Azure AD makes the data readily available at no additional cost beyond the underlying licence.
Conclusion
Azure Active Directory is far more than just a user directory — it is the security and identity backbone of your entire Microsoft cloud environment. For UK SMEs, taking the time to configure it properly delivers immediate benefits in security, user experience, and administrative efficiency. The steps outlined in this guide — from MFA enforcement and Conditional Access to application integration and ongoing monitoring — represent the essential foundation that every business using Microsoft 365 should have in place.
Investing in proper Azure AD configuration is one of the highest-return security measures a UK business can make. The tools are already included in your Microsoft 365 subscription, the configuration takes hours rather than weeks, and the protection it provides against the most common attack vectors is substantial. Whether you handle the setup internally or engage a specialist partner, the important thing is to act — because every day that Azure AD remains misconfigured is a day your business is more exposed than it needs to be.
Need Help Configuring Azure AD for Your Business?
Cloudswitched provides expert Microsoft 365 and Azure AD configuration services for UK businesses. Whether you need a complete Azure AD setup, security hardening for an existing tenant, or ongoing management and monitoring, our team can help ensure your identity infrastructure is secure and properly configured. Get in touch for a free consultation.
Explore Azure Cloud Solutions