Essential Fabric Tenant Settings
Microsoft Fabric
Microsoft Fabric11 min read

Essential Fabric Tenant Settings

Configure essential Microsoft Fabric tenant settings for security, governance, and optimal performance. Admin guide for enterprise Fabric environments.

By Errin O'Connor, Chief AI Architect

Fabric tenant settings control which features and capabilities are available across your entire organization. These settings are the primary governance control plane for Microsoft Fabric—they determine who can create workspaces, what data can be exported, which AI features are enabled, and how external sharing works. Misconfiguring tenant settings is the most common cause of both security incidents and adoption friction in Fabric deployments. Getting them right requires balancing governance with usability, which is why most organizations benefit from a phased approach rather than enabling or disabling everything at once. Our Microsoft Fabric consulting team configures tenant settings for enterprises across healthcare, financial services, and government sectors where compliance requirements add additional complexity.

I have been configuring Microsoft admin portals for over 25 years—from SharePoint Central Administration to Power BI Admin to the Fabric Admin portal. The consistent lesson across every platform is that default settings are designed for broad accessibility, not enterprise governance. Out of the box, Fabric enables features that most organizations should restrict, and restricts features that most organizations should enable. A 2-hour tenant settings review at the start of your Fabric deployment prevents months of security remediation and governance firefighting later.

Accessing and Understanding Tenant Settings

Tenant settings are configured in the Fabric Admin Portal (admin.fabric.microsoft.com) under Tenant settings. Only users with the Fabric Administrator, Power Platform Administrator, or Global Administrator role can modify these settings.

Settings fall into five configuration states:

StateMeaningWhen to Use
Enabled for the entire organizationEvery user in the tenant can use the featureLow-risk features with broad value
Enabled for specific security groupsOnly members of designated Azure AD groupsFeatures requiring governance (e.g., workspace creation)
Disabled for the entire organizationNo users can use the featureHigh-risk features or features not needed
Enabled except specific security groupsEveryone except excluded groupsFeatures enabled by default with specific exclusions
Delegated to workspace adminsWorkspace-level controlFeatures where workspace-level governance is appropriate

Best practice: Never use "Enabled for the entire organization" for sensitive features. Always scope to specific security groups so you have explicit control over who can do what.

Critical Tenant Settings: Security and Governance

Workspace Settings

SettingRecommended ConfigurationRationale
Create workspacesSpecific security groups onlyPrevents workspace sprawl; only platform admins and domain leads create workspaces
Use semantic models across workspacesEnabledAllows shared datasets, reducing duplication
Block users from reassigning personal workspacesEnabledPrevents shadow IT in personal workspaces

Restricting workspace creation is the single most impactful governance setting. When every user can create workspaces, you end up with hundreds of ungoverned workspaces within months. Our workspace design guide covers the organizational patterns that make restricted creation practical.

Export and Sharing Settings

SettingRecommended ConfigurationRationale
Export to ExcelEnabled (specific groups)Most users need this; restrict in high-security environments
Export to CSVEnabled (specific groups)Same as Excel export
Export to PDF/PowerPointEnabled (specific groups)Common for executive reporting
Export underlying dataDisabled (or specific groups only)Prevents bulk data extraction; major security risk
Print reportsEnabledLow risk, but consider for classified data environments
Allow downloads from custom visualsDisabledCustom visuals can be used to exfiltrate data

**Export underlying data** is the most dangerous default-enabled setting. When enabled, any user with report access can export the complete underlying dataset—potentially millions of rows including data they cannot see in the visual due to aggregation. Disable this immediately for any environment handling sensitive data. This is a frequent audit finding in healthcare and financial services compliance reviews.

External Sharing and Guest Access

SettingRecommended ConfigurationRationale
Share content with external usersSpecific security groupsPrevents accidental external sharing
Allow Azure AD B2B guestsEnabled (specific groups)Required for partner/vendor collaboration
Show content to external guestsSpecific security groupsControl which content external users see
Allow guest users to edit and manage contentDisabledGuests should be view-only in most cases
Publish to webDisabledMakes content publicly accessible on the internet—almost never appropriate for enterprise data

Publish to web is the most commonly misconfigured setting I encounter. It literally creates a public URL that anyone on the internet can access without authentication. I have seen organizations accidentally publish financial dashboards, customer data, and HR metrics to the public internet because this setting was enabled and a well-meaning user clicked "Publish to web" thinking it meant "publish to the Power BI service." Disable this unless you have a specific, documented public data use case.

AI and Copilot Settings

SettingRecommended ConfigurationRationale
Users can use Copilot and AI featuresSpecific security groupsPhase rollout: start with power users, expand gradually
Allow AI features to access your dataSpecific security groupsControls whether AI can process your organizational data
Data sent to Azure OpenAI is not storedVerify enabledRequired for compliance—ensures prompts are not retained
Copilot for Power BISpecific security groupsControls report-building Copilot access
Copilot in Fabric itemsSpecific security groupsControls notebook/SQL/pipeline Copilot access

AI settings deserve particular attention because they involve sending organizational data to language models. While Microsoft guarantees that data sent to Azure OpenAI is not used for model training and is not stored beyond the session, organizations in regulated industries may have additional restrictions on data processing by AI systems. Document your AI data processing decisions for compliance evidence.

Developer and Integration Settings

SettingRecommended ConfigurationRationale
XMLA endpointEnabled for specific groups (Read or Read/Write)Enables external tools, ALM Toolkit, Tabular Editor
Allow service principalsEnabled for specific groupsRequired for automated CI/CD pipelines
Embed content in appsEnabled for specific groupsRequired for embedded analytics
Push datasetsSpecific security groupsControls who can push data via REST API
Template appsSpecific security groups or disabledControl app distribution
Execute queries and scripts on datasetsEnabled for developersRequired for DAX Studio and diagnostic tools

XMLA endpoint configuration is critical for mature Power BI development practices. Without it, teams cannot use Tabular Editor, DAX Studio, ALM Toolkit, or automated deployment scripts. Enable Read access for all developers and Read/Write access for senior developers and CI/CD service principals only.

Capacity and Resource Settings

SettingRecommended ConfigurationRationale
Users can try Fabric paid featuresDisabledPrevents uncontrolled capacity consumption
Users can create trial capacitiesDisabledTrials create ungoverned resources
Auto-scalingEnabled with maximum CU limitPrevents runaway costs from unexpected workloads
Workload managementConfigure per capacityAllocate CU budgets per workload type

See our capacity planning guide for detailed guidance on capacity-level configuration that complements these tenant settings.

Information Protection Settings

SettingRecommended ConfigurationRationale
Sensitivity labelsEnabledClassifies content (Confidential, Internal, Public)
Mandatory label policyEnabledRequires users to label content before sharing
Label inheritance from data sourcesEnabledAutomatically applies upstream labels to downstream content
Default label for new contentInternal (or your equivalent)Ensures nothing is unlabeled
Allow users to apply lower sensitivity labelsDisabledPrevents downgrading classification

Sensitivity labels integrate with Microsoft Purview Information Protection and propagate across the Fabric ecosystem. When a Lakehouse table is labeled "Confidential," that label follows the data into Power BI reports, exports, and shared content. This is essential for GDPR compliance and data loss prevention.

Tenant Settings Configuration Checklist

Implementing tenant settings is a phased process, not a one-time event:

Phase 1: Day 1 Security (Before any users access Fabric)

PrioritySettingAction
P0Publish to webDisable
P0Export underlying dataDisable or restrict to security group
P0Create workspacesRestrict to admin security group
P0Share with external usersRestrict to security group
P0Custom visual downloadsDisable
P0Users can try paid featuresDisable

Phase 2: Governance Foundation (Week 1-2)

PrioritySettingAction
P1Sensitivity labelsEnable with mandatory labeling
P1XMLA endpointEnable Read for developers, Read/Write for senior devs
P1Service principalsEnable for CI/CD groups
P1Copilot featuresEnable for pilot group only
P1Export to Excel/CSV/PDFEnable for appropriate groups

Phase 3: Scaling Governance (Month 2-3)

PrioritySettingAction
P2Workspace creationExpand to domain leads
P2AI featuresExpand Copilot to broader user base
P2External sharingEnable for collaboration scenarios
P2Embed contentEnable for application teams
P2Delegation to workspace adminsEnable for mature workspace owners

Monitoring and Auditing Tenant Settings

Tenant settings are not set-and-forget. Monitor and review regularly:

Monitoring ActivityFrequencyTool
Review setting changesWeeklyAudit log (filter for TenantSettingChanged events)
Verify security group membershipMonthlyAzure AD access reviews
Test export restrictionsQuarterlyManual testing by security team
Compliance auditAnnuallyFull tenant settings review against policy
External sharing auditMonthlyReview shared content with external users

Use the Power BI REST API to programmatically export current tenant settings for documentation and compliance evidence. This is especially important for organizations undergoing SOC 2 or ISO 27001 audits where evidence of access controls is required.

Common Tenant Settings Mistakes

Mistake 1: Leaving defaults unchanged Default settings prioritize accessibility over security. Review every setting before enabling Fabric for production use.

Mistake 2: Over-restricting everything Locking down all features prevents adoption. Users will find workarounds (Shadow IT) that are even less secure than properly governed Fabric usage. Balance governance with usability.

Mistake 3: Not using security groups Configuring settings for "the entire organization" removes granular control. Always use security groups, even if the group currently contains all users—it gives you the ability to restrict later without changing the setting.

Mistake 4: Ignoring audit logs Tenant settings changes are logged in the unified audit log. Review these logs weekly to detect unauthorized changes or unexpected configuration drift.

Mistake 5: No documentation Undocumented tenant settings lead to "why is this disabled?" conversations that waste time and may result in incorrect changes. Document every setting, its rationale, and the approving stakeholder.

Getting Started with Tenant Settings

  1. Export current settings using the Admin API for baseline documentation
  2. Implement Phase 1 (P0) settings immediately—these are security-critical
  3. Create security groups in Azure AD for each permission tier
  4. Implement Phase 2 settings in the first two weeks
  5. Schedule quarterly reviews of all settings against business requirements
  6. Document everything in your governance framework

For organizations that need tenant settings configuration, our Fabric consulting team provides governance assessments, security configuration, and ongoing compliance monitoring. We also integrate tenant settings with your broader Power BI governance framework for comprehensive platform governance. Contact us to discuss your Fabric governance needs.

Frequently Asked Questions

Who can change Fabric tenant settings?

Only Fabric administrators and Global administrators can modify tenant settings. These settings affect all users in the organization, so changes should be made carefully and documented.

Can I apply settings to specific groups?

Yes, many tenant settings can be scoped to specific security groups. This allows piloting features with selected users before organization-wide rollout.

Microsoft FabricAdminTenant SettingsGovernance

Industry Solutions

See how we apply these solutions across industries:

Need Help With Power BI?

Our experts can help you implement the solutions discussed in this article.

Ready to Transform Your Data Strategy?

Get a free consultation to discuss how Power BI and Microsoft Fabric can drive insights and growth for your organization.