Gain instant visibility into the identities managed by Microsoft Entra ID.
Identity Inventory allows you to review and monitor the identities managed by Microsoft
Entra ID.
Select Microsoft Entra ID under DATA SOURCES to view identity summaries and detailed identity information by identity type.
You may connect and grant permissions to multiple Microsoft Entra ID tenants. Switch
to a new tenant by selecting the tenant name under TENANTS.
The following table details the tabs available for Microsoft Entra ID.
Tab
|
Description
|
Displays widgets with information on the status of your connected Microsoft Entra
ID and an identity summary with statistics on your organization's human and non-human
identities as well as entitlements.
|
|
Lists the human users in your organization and provides information significant to
your security posture, including roles, user type, and authentication type.
|
|
Lists the enterprise applications in your organization and provides information significant
to your security posture, including whether the application has a publisher or is
a first-party application.
Enterprise applications are applications registered with your identity provider that
need to access user and group data or to which you wish to control access.
|
|
Lists the devices in your organization and provides information significant to your
security posture, including whether the device join type, whether it is mobile policy
compliant, and whether it is synced with Active Directory.
Devices are endpoints, including desktops, laptops, printers, and mobile devices,
that are registered to your identity provider in order to allow single sign-on (SSO)
or conditional access.
|
|
Lists the groups in your organization and provides information significant to your
security posture, including the group type.
Groups are collections of users, devices, service principals, or groups assigned the
same security or application access permissions.
|
|
Lists the roles used by the identities in your organization.
Roles are sets of built-in or custom permissions granted to users, groups, or devices
to control permissions and access in your organization.
|
|
Lists the Conditional Access (CA) policies assigned to the identities in your organization.
Conditional Access (CA) policies are sets of conditions, such as location, device
type, and device posture, that govern resource access in your organization.
|
|
Lists the permissions granted to the identities in your organization.
Granted permissions are active permissions granted by users to applications to allow
specific resource access and use.
|
The following table details the common actions available on the tabs except Overview.
Action
|
Details
|
Search identities
|
Enter the identity name into the search field to search for specific identities.
|
Filter identities
|
Filter identities by clicking Add filter and setting the criteria.
|
Sort identities
|
Sort identities by clicking a column header.
Some column headers may not support sorting.
|
Access detailed profiles
|
Click on an identity in the first column to access detailed profile information for
the identity.
|
Export identity information
|
Export information about identities to a .csv file. If you have applied filter criteria,
only the identities that have been filtered are exported.
|