Restricted Management Administrative Units in Microsoft Entra ID to Protect Sensitive Accounts

Restricted Management Administrative Units (RMAUs) in Microsoft Entra ID provide a secure way to isolate and protect sensitive users, devices, and security groups.
When you enable restricted management, even tenant-wide roles like Global Administrator lose access unless explicitly assigned within that Administrative Unit (AU).
This feature prevents accidental or malicious changes to high-value accounts.

Never miss an article and subscribe, and don’t forget to subscribe to my YouTube channel, Control Alt Delete Tech Bits

Why Use RMAUs

RMAUs should be part of every organisation’s identity governance strategy.
They go beyond standard Administrative Units by enforcing hard boundaries between administrators and the resources they manage.

Key Reasons to Implement

  • Reduce insider risk: Prevent unintended or malicious admin actions on sensitive accounts.
  • Maintain operational separation: Allow regional IT teams or specific departments to manage their own users without overlapping responsibilities.
  • Enhance compliance and auditing: Ideal for regulated sectors where admin access must be demonstrably limited.
  • Protect emergency or break-glass accounts: Stop other admins from tampering with high-privilege or recovery accounts.
  • Support zero-trust administration: Enforce that every admin must be explicitly scoped before gaining access.

RMAUs are one of the few Entra features that even a Global Administrator cannot override unless they’ve been granted permission within that specific AU

Licensing Requirements

Each administrator managing an RMAU must have at least Microsoft Entra ID P1.
The users, devices, or groups inside the RMAU can remain on the free tier.

How to Create a Restricted Management Administrative Unit

Sign in to the Entra Admin Centre

Go to entra.microsoft.com.

Open Administrative Units

Go to Roles & administrators > Administrative units.

Create a New Administrative Unit

Select + Add to create a new AU.
Name it something descriptive, such as Executive Protection AU.
Under Restricted management administrative unit, set this option to Yes.

Restricted Management Administrative Unit
Restricted Management Administrative Unit


Assign Scoped Admin Roles

Select the Roles and administrators tab within the AU > click + Add assignment.
Choose a role such as User Administrator and assign it to a specific admin account.

User Administrator Restricted Management Administrative Units
User Administrator Restricted Management Administrative Units

Test Restricted Access

Now sign in with a Global Administrator account (not assigned to that AU).

Now add the members to the AU and then try to modify or reset the password of a user inside the RMAU.


You’ll see an error message similar to:

Restricted management admin unit
Restricted management admin unit

“This user is a member of a restricted management administrative unit. Management rights are limited to administrators scoped on that administrative unit.”

This user is a member of a restricted management administrative unit. Management rights are limited to administrators scoped on that administrative unit.
This user is a member of a restricted management administrative unit. Management rights are limited to administrators scoped on that administrative unit.

Validate Audit Logs

Go to Monitoring & health > Audit logs.
Filter the activity by “AdministrativeUnit” or “RoleManagement” to see the creation and modification actions.

Objects Supported by RMAUs

Object TypeSupportedNotes
UsersYesCan restrict password resets and edits
DevicesYesUseful for Privileged Access Workstations
Security GroupsYesFor role-assignable groups only
Microsoft 365 / Distribution GroupsNoNot supported

Limitations

  • Once created, a restricted AU cannot be converted to unrestricted.
  • Nested RMAUs are not supported.
  • Some governance tools such as Access Reviews, PIM, and Entitlement Management do not yet fully support RMAUs.
  • Only administrators scoped to that AU can modify or manage members.
  • Deletion of an RMAU may take up to 30 minutes before restrictions lift.

Imagine a large academy trust or business with multiple departments.
The IT team needs to protect leadership accounts, HR staff, and finance groups from being changed by local admins.

You could:

  1. Create an AU named Senior Leadership RMAU.
  2. Add all leadership user accounts and a security group used for payroll systems.
  3. Assign only the Security Team Admins group as scoped administrators for that AU.
  4. Leave other admins to manage day-to-day accounts outside this AU.

Now, if someone from the helpdesk attempts to modify one of those protected users, even if they have a tenant-wide admin role, the action will fail.


This ensures high-value accounts remain secure, while normal admin functions continue unaffected elsewhere in the tenant.

RMAUs help enforce true administrative boundaries in your tenant.
They’re particularly effective when combined with:

  • Privileged Identity Management (PIM) – to control when scoped admins can activate roles.
  • Audit Logs – for visibility of blocked actions and scope assignments.
  • Conditional Access – to ensure admins managing these AUs sign in from compliant or secured devices.

For IT teams managing hybrid or multi-school environments, RMAUs provide accountability, reduce risk, and simplify compliance reporting.

Do Global Administrators really lose access to RMAU objects?

Yes. Global Admins cannot modify, delete, or reset passwords for objects in an RMAU unless explicitly assigned a scoped role inside that AU

Can I move users or devices between restricted and unrestricted AUs?

Yes, but you must have the appropriate scoped permissions. Moving objects in or out of a restricted AU temporarily removes protection until they’re re-scoped.

Do RMAUs affect Intune device policies or Conditional Access?

No. RMAUs limit administrative actions, not policy application. Devices inside an RMAU still receive policies and configurations normally.

Can I use RMAUs with automation or Graph API scripts?

Yes. Graph API supports scoped role assignments and AU operations. Any automated process must authenticate with an account that has permission for that specific AU.

Restricted Management Administrative Units bring a genuine shift in how Entra administrators handle sensitive identities.
By implementing RMAUs, you create a separation between “who can manage” and “who owns the data”, aligning perfectly with zero-trust principles.

Also, check out this article Why You Should Use Administrative Units to Delegate Entra Administration

Feel free to buy me a coffee to keep this website up and running

Tags: ,

Leave a Reply

Your email address will not be published. Required fields are marked *