Identity Security Insights 25.06

June 3, 2025

🆕 New features

Connectivity Details

We’ve given the Connectors grid and Activity History a new look making it easier to spot what’s working, what’s not, and what needs your attention.

Updated Connectivity Statuses

Four clear statuses added to the Connectivity column:

  • Connected: The connector is functioning normally; no action is needed.
  • Off: Indicates the connector was either manually disabled or automatically deactivated due to invalid credentials persisting for over a week.
  • Pending: Applies to new connectors that have not finished a first event or inventory scan. Additionally, applies to the Insights Collector when no data has yet been received from the on-prem agent after setup.
  • Action Required: Customer action is needed to resolve an issue. Clicking this status opens the Overview page, where a banner provides clear guidance.

We’ve retired the Warning and Failed statuses and rolled them into the more actionable Action Required.

Action Required status in Identity Security Insights

Introducing: Connectivity Details

Say goodbye to the old Activity History grid and hello to Connectivity Details - a cleaner, smarter way to see what’s happening:

  • Shows only the latest status for each job type (like Inventory or Events).
  • Surfaces issues and next steps right away - no more digging through 30 days of logs.
Connectivity Details in Identity Security Insights

✨ Enhancements

Azure Entitlements Just Leveled Up

We’ve reimagined how Azure entitlements come to life in Insights – bringing sharper visibility, smarter escalation mapping, and a more accurate view of privilege across your environment.

What’s Changing

Insights environments with an enabled Azure connector will notice some big shifts in entitlement data:

  • Increased counts for:
    • Directory Roles – including both assigned and eligible roles via PIM
    • RBAC Roles – scoped to specific Azure resources
    • Escalations – including new paths involving service principals
  • Decreased counts for:
    • Group Memberships are no longer shown as standalone entitlements. Instead, they are now visualized within the True Privilege Graph and the Path to Privilege escalation graph – only when they contribute to a valid entitlement or escalation, including nested group scenarios.

Entitlement Types and Examples

Permission

These represent direct access assignments

DescriptionExample Use Case
Directory Role (Assigned) – Surfaces if an Azure account has a Directory Role, including custom roles.User assigned Global Administrator role
Directory Role (Eligible via PIM) – Surfaces if a user or service principal is eligible for a directory role via PIM (Privileged Identity Management).User eligible for User Administrator role via PIM, requiring request and approval for access
RBAC Role – Surfaces if a user or service principal has an RBAC Role, scoped to a specific Azure resource.User assigned Virtual Machine Contributor role on a specific VM, allowing management of the VM
API Permission (Service Principal)– Surfaces if an Azure Service Principal has any API permissions assigned to it.Service Principal with Microsoft Graph API permission User.ReadWrite.All

Escalation

These represent potential privilege elevation paths

DescriptionExample Use Case
Service Principal Escalation – New escalation path involving service principals with API permissions that allow assigning authentication methods.Service Principal with permissions like UserAuthenticationMethod.ReadWrite.All to assign Temporary Access Passes (TAP) or FIDO2 keys to users
Cross-domain Escalation – Considered an escalation when the Okta account has lower privilege than the Azure account it accesses.Basic Okta user signs into Azure and receives high-privilege role

Cross-domain (Informational Only)

These are surfaced for visibility only

DescriptionExample Use Case
Federated Access – Highlights federated access from Okta to Azure. Not considered an escalation.User signs into Azure using Okta credentials

©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.