Skip to content

Commit 02949f5

Browse files
Merge pull request #229553 from ElazarK/WI68732-missing-word
issues fix
2 parents 027739f + 186fd64 commit 02949f5

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/defender-for-cloud/permissions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: User roles and permissions in Microsoft Defender for Cloud
33
description: This article explains how Microsoft Defender for Cloud uses role-based access control to assign permissions to users and identify the permitted actions for each role.
44
ms.topic: limits-and-quotas
55
ms.custom: ignite-2022
6-
ms.date: 01/24/2023
6+
ms.date: 03/06/2023
77
---
88

99
# User roles and permissions
1010

11-
Microsoft Defender for Cloud uses [Azure role-based access control (Azure RBAC)](../role-based-access-control/role-assignments-portal.md) to provide [built-in roles](../role-based-access-control/built-in-roles.md). You can assign these roles to users, groups, and services in Azure to give users access to resources according the access defined in the role.
11+
Microsoft Defender for Cloud uses [Azure role-based access control (Azure RBAC)](../role-based-access-control/role-assignments-portal.md) to provide [built-in roles](../role-based-access-control/built-in-roles.md). You can assign these roles to users, groups, and services in Azure to give users access to resources according to the access defined in the role.
1212

13-
Defender for Cloud assesses the configuration of your resources to identify security issues and vulnerabilities. In Defender for Cloud, you only see information related to a resource when you're assigned one of these roles for the subscription or for the resource group the resource is in: Owner, Contributor, or Reader
13+
Defender for Cloud assesses the configuration of your resources to identify security issues and vulnerabilities. In Defender for Cloud, you only see information related to a resource when you're assigned one of these roles for the subscription or for the resource group the resource is in: Owner, Contributor, or Reader.
1414

1515
In addition to the built-in roles, there are two roles specific to Defender for Cloud:
1616

@@ -37,7 +37,7 @@ The specific role required to deploy monitoring components depends on the extens
3737

3838
## Roles used to automatically provision agents and extensions
3939

40-
To allow the Security Admin role to automatically provision agents and extensions used in Defender for Cloud plans, Defender for Cloud uses policy remediation in a similar way to [Azure Policy](../governance/policy/how-to/remediate-resources.md). To use remediation, Defender for Cloud needs to create service principals, also called managed identities, that assigns roles at the subscription level. For example, the service principals for the Defender for Containers plan are:
40+
To allow the Security Admin role to automatically provision agents and extensions used in Defender for Cloud plans, Defender for Cloud uses policy remediation in a similar way to [Azure Policy](../governance/policy/how-to/remediate-resources.md). To use remediation, Defender for Cloud needs to create service principals, also called managed identities that assign roles at the subscription level. For example, the service principals for the Defender for Containers plan are:
4141

4242
| Service Principal | Roles |
4343
|:-|:-|

0 commit comments

Comments
 (0)