AD0.5 The Admin Centers That Matter

4-5 hours · Module 0 · Free
Operational Objective
Microsoft has at least eight admin centers, portals, and dashboards that touch security. As an IT administrator, you've probably used the M365 Admin Center and maybe the Entra admin center. But security work happens across five portals: the M365 Admin Center (user management and license context), the Entra admin center (identity, MFA, conditional access), the Defender portal (alerts, incidents, email protection), the Intune admin center (device compliance, configuration profiles), and the Purview portal (data protection, DLP). Knowing which portal handles which security task prevents the single biggest time waste: searching for a setting in the wrong portal.
Deliverable: A mental map of the five security-relevant admin portals — what each one controls, which security tasks you perform in each, and the URLs you'll bookmark for daily use.
Estimated completion: 20 minutes
FIVE PORTALS FOR SECURITY WORKENTRA IDentra.microsoft.comMFA · CA policiesSign-in logs · UsersRisk detection · SSPRIdentityDEFENDERsecurity.microsoft.comAlerts · IncidentsEmail policiesSecure ScoreThreats + EmailINTUNEintune.microsoft.comDevice complianceConfig profilesApp managementDevicesPURVIEWpurview.microsoft.comSensitivity labelsDLP policiesAudit log searchDataM365 ADMINadmin.microsoft.comUser managementLicenses · GroupsService healthAdminYOUR WEEKLY SECURITY WORKFLOWMonday: Defender portal → review alerts and incidents (5 min)Monday: Entra admin center → check sign-in logs for anomalies (10 min)Monthly: Defender portal → review Secure Score changes (10 min)Monthly: Intune → verify device compliance rates (5 min)

Figure AD0.5 — The five admin portals for security work and the weekly monitoring cadence. Entra ID handles identity, the Defender portal handles threats and email, Intune handles devices, Purview handles data, and the M365 Admin Center provides user and license context. Your weekly security workflow touches the Defender portal and Entra ID. Monthly reviews add Intune and Secure Score.

The portal you’ll use most: Entra admin center

The Entra admin center at entra.microsoft.com is where you’ll spend the most time on security work. This is where you configure the identity controls that stop 80% of attacks: MFA methods, conditional access policies, self-service password reset, and user risk policies.

The two pages you’ll visit most are Protection → Conditional Access (where your CA policies live) and Monitoring → Sign-in logs (where you investigate authentication activity). The sign-in log is your primary investigation tool for any identity-related incident. When someone reports a phishing email and you need to check whether the user’s credentials were compromised, you check the sign-in log. When you see an alert for impossible travel, you check the sign-in log. When a user says “I didn’t do that,” you check the sign-in log.

The sign-in log shows every authentication attempt — successful and failed — with the user, IP address, location, device, client application, conditional access policy evaluation, and risk level. Learning to read this log efficiently is one of the most valuable skills you’ll build in this course. Module AD1.8 covers sign-in log investigation in detail.

The portal for threats: Microsoft Defender

The Defender portal at security.microsoft.com is the unified security dashboard. It aggregates alerts from every Defender product — Defender for Office 365 (email), Defender for Endpoint (devices), Defender for Identity (Active Directory), and Defender for Cloud Apps (SaaS). For an IT administrator, the two sections that matter are the incident queue (where you see correlated security alerts) and email & collaboration policies (where you configure Safe Links, Safe Attachments, and anti-phishing).

The incident queue is where you’ll go when you hear “we think something happened.” Incidents group related alerts together — so a phishing email that led to a credential compromise that led to inbox rule creation appears as one incident with three related alerts, not three separate alerts you have to mentally connect. You’ll learn to navigate this in Module AD0.6.

Secure Score also lives in the Defender portal. This is Microsoft’s assessment of your tenant’s security posture, scored against a list of recommended configurations. Module AD0.7 covers how to read it productively without getting overwhelmed by the 200+ recommendations it surfaces.

The portal for devices: Intune

The Intune admin center at intune.microsoft.com is where you manage device compliance and configuration. From a security perspective, the critical section is Devices → Compliance policies — rules that define what makes a device “compliant” (encrypted, up to date, antivirus running, firewall enabled). Compliance status feeds into conditional access: a conditional access policy can require a compliant device, which means only devices meeting your compliance standards can access corporate data.

If you’re already managing devices through Intune for application deployment and configuration, adding compliance policies is a natural extension. If you’re not using Intune at all, Module AD4 (Securing Devices and Endpoints) covers the basics of getting started. For now, know that Intune is the device piece of the security puzzle and that its value for security comes primarily through the compliance + conditional access integration.

The portal for data: Purview

The Purview portal at purview.microsoft.com handles data classification and protection. Sensitivity labels, data loss prevention policies, and the unified audit log live here. For an IT administrator starting security work, Purview is the lowest priority of the five portals — identity and email protection come first.

That said, one feature in Purview is immediately useful: the unified audit log. This is the searchable record of every significant action in your M365 environment — mailbox access, file sharing, admin actions, permission changes. When you need to answer “who did what, and when,” the unified audit log is where you look. You don’t need to configure anything to use it — audit logging is enabled by default for all M365 tenants. You just need to know it exists and how to search it.

The portal you already know: M365 Admin Center

The M365 Admin Center at admin.microsoft.com is where you manage users, groups, and licenses. From a security perspective, it’s context — you go here to check a user’s license tier (to know which security features are available), to verify group membership (to understand which policies apply), and to check service health (to differentiate between “the sign-in failed because of a security policy” and “the sign-in failed because Microsoft is having an outage”).

You won’t configure security controls in the M365 Admin Center. The security settings that exist there (like the legacy per-user MFA page) are being deprecated in favour of the Entra admin center. If someone tells you to go to admin.microsoft.com → Users → Active users → Multi-factor authentication, that’s the old method. Conditional access in the Entra admin center is the current method.

The 5-minute security check you should do every Monday

Here’s the practical workflow that turns portal knowledge into operational habit. Every Monday morning, before you start on helpdesk tickets, run this 5-minute check across two portals.

First, open security.microsoft.com. Click “Incidents & alerts” in the left navigation. Filter by severity: High and Critical. Check if any new incidents appeared since your last check. If the queue shows zero high/critical incidents, you’re done with this portal — total time: 30 seconds. If there are incidents, read the summary tab of each and make the triage decision (act, investigate, or close).

Second, open entra.microsoft.com. Navigate to Monitoring → Sign-in logs. Set the time range to the last 7 days. Add a filter for “Status: Failure” and scan for patterns — are there clusters of failures against specific accounts? That could indicate a password spray. Now remove the failure filter and add a filter for “Location” — check if any sign-ins came from countries where your organisation doesn’t operate. Unexpected locations are the fastest indicator of compromised credentials.

One additional step that takes two minutes and pays off every time: configure email notifications for high-severity alerts. Navigate to security.microsoft.com → Settings → Email notifications → Incidents. Create a notification rule that sends email to your admin address for High and Critical severity incidents. This means you do not have to remember to check the portal — the portal tells you when something needs attention. Most IT administrators set this up and then check the portal only when a notification arrives or during their weekly Monday review.

A practical tip for the Entra sign-in log: the default view shows the last 24 hours. For your weekly Monday review, change the time range to “Last 7 days” so you catch anything that happened over the weekend. Add the columns “IP address,” “Location,” and “Conditional access” to the default view — these three columns tell you the most about each sign-in without clicking into individual entries. You can save this customised view so it loads automatically on your next visit. That’s the entire weekly check: incident queue plus sign-in log scan. Five minutes. The goal is not to investigate every entry — it’s to catch the obvious indicators that something went wrong. As you build confidence with these portals, you’ll naturally start noticing patterns and anomalies that warrant deeper investigation. But the baseline habit is five minutes, every Monday, two portals.

Compliance Myth: "I just need to learn one portal to manage M365 security"
Microsoft has tried to unify the security experience with the Defender XDR portal at security.microsoft.com, and it does aggregate alerts and incidents from all Defender products. But configuration still happens in the product-specific portals. Conditional access is configured in the Entra admin center, not the Defender portal. Device compliance is configured in Intune, not the Defender portal. Email protection policies are configured in the Defender portal. The Defender portal is the monitoring hub. The configuration happens in the individual portals. You need to know all five.
Decision point

A user reports that they received a phishing email and may have entered their credentials on the linked website. Where do you go first?

Option A: M365 Admin Center to reset the user’s password.

Option B: Entra admin center to check the sign-in log for the user’s recent authentication activity.

Option C: Defender portal to check the incident queue for related alerts.

Option D: Intune to check the user’s device compliance status.

Start with Option B. The sign-in log tells you whether the credentials were actually used by an attacker — look for sign-ins from unusual IPs, locations, or devices after the time the user reported clicking the link. If you see suspicious sign-ins, that confirms the compromise and you move to containment (password reset, session revocation). If you see no suspicious sign-ins, the credentials may not have been captured or haven’t been used yet — you still reset the password as a precaution but with lower urgency. Option A (resetting the password immediately) is a reasonable instinct but skips the assessment step that tells you whether the attacker already accessed the account. Option C is useful but secondary — the Defender portal may not have correlated alerts yet if the attack just happened.

Try it: Bookmark the five portals

Open each of these URLs, verify you can sign in with your admin account, and bookmark them in a “Security” folder:

  1. entra.microsoft.com — navigate to Protection → Conditional Access and Monitoring → Sign-in logs
  2. security.microsoft.com — navigate to Incidents & alerts and Secure Score
  3. intune.microsoft.com — navigate to Devices → Compliance policies
  4. purview.microsoft.com — navigate to Audit (under Solutions)
  5. admin.microsoft.com — navigate to Users → Active users

If any of these portals require additional permissions, note which ones. You may need the Security Administrator or Security Reader role for the Defender portal, and the Intune Administrator role for the Intune admin center. Module AD0.8 covers the role assignments needed for security work.

You want to create a conditional access policy that requires MFA for all users accessing Exchange Online. Which portal do you use?
Entra admin center (entra.microsoft.com) → Protection → Conditional Access — Correct. Conditional access policies are created and managed in the Entra admin center. The Defender portal shows the results of CA policy evaluations in sign-in logs and alerts, but the policies themselves are configured in Entra.
Defender portal (security.microsoft.com) → Settings → Conditional Access — No. The Defender portal is for monitoring and investigating threats. It doesn't host conditional access configuration. You may see CA evaluation results in the sign-in log within the Defender portal, but the policies are created in Entra.
M365 Admin Center (admin.microsoft.com) → Settings → Security — No. The M365 Admin Center has some security settings but not conditional access. The legacy per-user MFA page exists here but is being deprecated. Always use the Entra admin center for conditional access.
Intune admin center (intune.microsoft.com) → Endpoint security → Conditional access — Partially correct. Intune does have a Conditional Access link, but it redirects to the Entra admin center. The policies are created and managed in Entra regardless of which portal you navigate from.

You're reading the free modules of M365 Security: From Admin to Defender

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.

View Pricing See Full Syllabus