You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-management-groups.md
+26-23Lines changed: 26 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.devlang: na
13
13
ms.topic: article
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: na
16
-
ms.date: 07/18/2018
16
+
ms.date: 08/22/2018
17
17
ms.author: terrylan
18
18
19
19
---
@@ -82,21 +82,26 @@ An Azure Active Directory tenant administrator doesn’t have direct access to A
82
82
83
83
5. Do the tasks you need to make at the elevated access. When you're done, set the switch back to **No**.
84
84
85
-
### Open or refresh Security Center
86
-
Once you have elevated access, open or refresh Azure Security Center to verify you have visibility into all subscriptions under your Azure AD tenant.
85
+
86
+
### Assign RBAC roles to users
87
+
To gain visibility to all subscriptions, tenant administrators need to assign the appropriate RBAC role to any users they wish to grant tenant-wide visibility, including themselves, at the root management group level. The recommended roles to assign are either **Security Admin** or **Security Reader**. Generally, the Security Admin role is required to apply policies on the root level, while Security Reader will suffice to provide tenant-level visibility. For more information about the permissions granted by these roles, see the [Security Admin built-in role description](../role-based-access-control/built-in-roles.md#security-admin) or the [Security Reader built-in role description](../role-based-access-control/built-in-roles.md#security-reader).
88
+
89
+
90
+
#### Assign RBAC roles to users through the Azure portal:
87
91
88
92
1. Sign in to the [Azure portal](https://portal.azure.com).
89
-
2. Ensure you select all the subscriptions in the subscription selector that you would like to view in Security Center.
3. Click on **Coverage** to see the list of subscriptions covered.
95
-

93
+
2. To view management groups, select **All services** under the Azure main menu then select **Management Groups**.
94
+
3. Select a management group and click **details**.
95
+
96
+

97
+
98
+
4. Click **Access control (IAM)** then **Add**.
99
+
5. Select the role to assign and the user, then click **Save**.
100
+
101
+

96
102
97
-
### Assign RBAC roles to users
98
-
Once a tenant administrator has elevated access, they can assign an RBAC role to relevant users on the root management group level. The recommended role to assign is [**Reader**](../role-based-access-control/built-in-roles.md#reader). This role is required to provide tenant-level visibility. The assigned role will be automatically propagated to all management groups and subscriptions under the root management group. For more information about RBAC roles, see [Available roles](../active-directory/users-groups-roles/directory-assign-admin-roles.md#available-roles).
0 commit comments