Jonathan Edwards published a practical YouTube video that warns against handing out the Global Administrator role to too many people in a tenant. In the clip, he walks viewers through ten alternative Microsoft 365 roles that better match real job functions while reducing security risk. Consequently, the video targets MSPs, IT teams, and internal auditors who need concrete guidance on role delegation. In this article, we summarize the video’s main points and explain tradeoffs and implementation challenges for newsroom readers.
First, Edwards highlights why overusing the Global Administrator role "kills" security by creating many overly powerful accounts that could be misused or compromised. Then, he maps common organizational functions—such as HR, finance, and helpdesk—to specific Microsoft 365 admin roles so people keep their day-to-day capabilities without full tenant control. Moreover, he emphasizes the principle of least privilege and demonstrates how to use Privileged Identity Management for just-in-time administrative access. As a result, the video balances practical role assignments with tools to reduce standing privileges.
Next, Edwards lists the top non-global roles and briefly describes what each role can do, illustrating how those rights match typical tasks. The audience hears clear examples like who should manage billing, who should control Teams settings, and who should handle device policies in Intune. Importantly, Edwards frames these roles as a way to maintain operational efficiency while improving compliance and auditability. Overall, his approach aims to make delegation sensible and measurable.
Edwards points to several specific roles that cover most administrative needs without granting tenant-wide control. He highlights roles such as User Administrator, Helpdesk Administrator, Exchange Administrator, Teams Administrator, SharePoint Administrator, Intune Administrator, Security Administrator, Compliance Administrator, Billing Administrator, and Service Support Administrator. For each role, he explains how the role maps to real responsibilities and why it is safer than a blanket global assignment. Consequently, organizations can assign targeted duties while retaining oversight from a small set of true global admins.
Furthermore, Edwards underscores newer granular roles in Microsoft Entra and related services that improve alignment with business needs. He notes that this granularity helps teams avoid granting more rights than necessary and supports role-based auditing. Therefore, IT managers should review built-in roles before creating custom ones, since built-ins often match common scenarios. In this way, the video encourages sensible use of Microsoft’s role catalog rather than defaulting to broad permissions.
Reducing the number of permanent global administrators lowers attack surface and simplifies incident response, Edwards explains, because fewer highly privileged accounts mean fewer targets for attackers. Moreover, assigning specific roles makes it easier to track who made changes, improving forensic and audit processes. Edwards also recommends Privileged Identity Management to provide just-in-time activation for sensitive roles, which further reduces standing privileges and exposure. As a result, the combination of role delegation and PIM forms a stronger security posture than wide distribution of global rights.
However, Edwards points out that PIM and just-in-time access add procedural steps that teams must manage carefully so operational work does not slow down. Therefore, he advises organizations to pilot PIM with a few critical roles and measure impact on support workflows. In addition, he recommends logging and alerting to detect unusual elevations of privilege quickly. Consequently, security improves while remaining practical for daily operations.
Edwards stresses that the main tradeoff involves balancing security and convenience: tighter role assignments reduce risk but can create friction if users lack needed access at critical times. He suggests clear role ownership, documented processes for escalation, and training to reduce friction without weakening controls. Additionally, routine role reviews and audits help curb role sprawl and ensure permissions still reflect job requirements. Thus, ongoing governance disciplines are essential when decentralizing administration.
Another challenge Edwards highlights is the potential for misconfigured roles or overlapping responsibilities that create gaps in coverage. Consequently, he recommends mapping business processes to admin capabilities before assigning roles and testing those assignments in a staging environment. Moreover, central teams should provide quick escalation paths and retain a small number of emergency Global Administrator accounts protected by PIM and strong authentication. In short, careful planning and monitoring address the main tradeoffs between security and responsiveness.
In summary, Jonathan Edwards’ video offers a clear, practical roadmap for replacing broad administrative permissions with role-specific assignments in Microsoft 365. By combining targeted roles, Privileged Identity Management, and routine governance, organizations can strengthen security while keeping people productive. Nevertheless, teams must accept some operational change and invest in training, monitoring, and review cycles to avoid new problems such as role sprawl or blocked workflows. Finally, for IT leaders and MSPs, the video serves as a useful reminder: thoughtful delegation beats blanket permissions every time.
Microsoft 365 admin roles, Non-Global Admin roles Microsoft 365, Least privilege Microsoft 365 roles, Exchange Online admin role, SharePoint Online admin role, Teams admin role Microsoft 365, Compliance admin Microsoft 365, Helpdesk admin Microsoft 365