Entra ID Environment Users, Groups, Devices, Applications and Resource Overview Inventory Tool
The Entra ID Environment Inventory Tool provides a quick and comprehensive overview of your Microsoft Entra ID Tenant.
allowing Administrators and IT Professionals to instantly understand the current State of their Environment without complex setup or Scripting knowledge.
This Tool is designed for simplicity and speed. With a single Copy and Paste into Azure Cloud Shell, it generates a Structured Summary of key identity and Infrastructure Components across your Tenant.
The Report includes visibility into User Accounts, including Total Users, Enabled and Disabled Users, as well as Guest Accounts. It also provides insight into Group Counts, Registered Devices, Managed Identities, and Application Footprint within the Environment.
In addition, the Tool Reports on Application Registrations and Enterprise Applications, helping identify the overall Application Landscape, including Microsoft-Provided Services and Custom Applications owned by your Organization. It also includes Azure Resource Visibility such as Storage Accounts, giving a broader understanding of your Tenant Footprint.
This Tool is especially valuable for:
Rapid Environment Assessment
Tenant Audits and Documentation
Troubleshooting and Validation
Security and Governance Reviews
Identifying Unused or Unexpected Resources
No installation is required. No scripts need to be saved or signed. Simply paste it in Cloud Shell and run.
Whether you are managing a small tenant or a large enterprise environment, this tool provides immediate, actionable insight into your Entra ID environment in seconds.
Tool Requirements
The Entra ID Environment Inventory Tool requires access to Microsoft Entra ID and Azure resources through Azure Cloud Shell or a PowerShell environment with the appropriate modules installed.
The following permissions and components are required:
Microsoft Graph PowerShell module installed and authenticated
Azure PowerShell module (Az module) installed and authenticated
Permissions to read users, groups, devices, applications, and directory data
Permissions to read Azure resources such as storage accounts
At minimum, the account running the tool should have:
Directory Reader role in Microsoft Entra ID
Reader role in Azure subscription (for resource visibility)
Before running the tool, ensure you are connected:
Connect-MgGraph
Connect-AzAccount
Disclaimer
This Tool is provided for Informational and Reporting Purposes Only.
It performs Read-Only Operations and does not modify any Resources within your Environment.
The accuracy of the output depends on the Permissions Granted to the Account Executing the Tool.
Limited Permissions may result in incomplete or Partial Data.
This tool is intended to Assist Administrators in gaining Visibility into their Environment and should not be used as a Replacement for Formal Auditing, Compliance, or Security Solutions.
Always Validate Findings and follow your Organization’s Policies and Procedures when making changes based on the Output.