Skip to content

Commit 00f43fa

Browse files
committed
doctoring images
1 parent 1b0b63c commit 00f43fa

File tree

8 files changed

+36
-56
lines changed

8 files changed

+36
-56
lines changed
-37.6 KB
Loading
-102 KB
Loading
-46.8 KB
Loading
-35.5 KB
Loading
-93.9 KB
Loading
Lines changed: 30 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Endpoint security policies in multitenant management
3-
description: Learn how to manage endpoint security policies in multi-tenant management in Microsoft Defender XDR.
3+
description: Learn how to manage endpoint security policies for Defender XDR multi-tenant management in the Microsoft Defender portal.
44
ms.service: unified-secops-platform
55
ms.author: bagol
66
author: batamig
@@ -11,7 +11,7 @@ ms.collection:
1111
- m365-security
1212
- highpri
1313
- tier1
14-
ms.topic: concept-article
14+
ms.topic: how-to
1515
ms.date: 07/28/2025
1616
appliesto:
1717
- Microsoft Defender XDR
@@ -21,59 +21,42 @@ appliesto:
2121

2222
# Endpoint security policies in multitenant management
2323

24-
An aggregated view of all security policies from all tenants is available through the **Endpoint security policies** page in multitenant management. The page gives you access to manage security settings on your tenants' devices, allowing you to create, edit, or delete security policies. Navigate to the page through **Endpoint > Configuration management > Endpoint security policies**.
24+
Microsoft Defender for Endpoint security policies help you manage security settings across your devices. In the Microsoft Defender multitenant management portal, the **Endpoints > Configuration management > Endpoint security policies** page allows you to manage security settings on your tenants' devices across multiple tenants.
2525

26-
> [!IMPORTANT]
27-
> The Endpoint security policies page is available only for [users with the security administrator role in Microsoft Defender XDR](/defender-endpoint/assign-portal-access). Any other user role like Security Reader cannot access the endpoint security policies page. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and Microsoft Defender XDR.
26+
For more information, see [Manage endpoint security policies in Microsoft Defender for Endpoint](/defender-endpoint/manage-security-policies).
2827

29-
To know more about endpoint security policy types, see [Manage endpoint security policies in Microsoft Defender for Endpoint](/defender-endpoint/manage-security-policies).
28+
## Prerequisites
3029

31-
As a Preview feature, distributed policies appear in a hierarchical view, with the original policy serving as the parent. You can find the policies that were distributed from your tenant under the original policy.
30+
- You must have Microsoft Defender for Endpoint to use endpoint security policies in multitenant management.
3231

33-
:::image type="content" source="media/mto-endpoint-security-policy/mto-distributed.png" alt-text="Screenshot of the endpoint security policies page in multitenant management highlighting distributed policies" lightbox="media/mto-endpoint-security-policy/mto-distributed.png":::
34-
35-
The **Last Distribution Status** for the original policy reflects the overall status of its distributed copies, and the **Tenants** and **Tenant Groups** sections indicate the recipients of the policy.
36-
37-
> [!TIP]
38-
> Security administrators must have permissions in each tenant to access the endpoint security policies page in multitenant management.
39-
40-
From the page, you can search for a specific policy by using the **Search** function. You can also **Filter** the policies according to tenant name, policy category, policy type, and targets. You can view, create, edit, or delete a security policy on a single tenant only through the page.
32+
- Security administrators must have permissions in each tenant to access the endpoint security policies page in multitenant management.
4133

34+
- The **Endpoint security policies** page is available only for [users with the security administrator role in Microsoft Defender XDR](/defender-endpoint/assign-portal-access). Other user roles, like Security Reader, don't provide access to the **Endpoint security policies** page.
4235

43-
## Create a new security policy
36+
When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal.
4437

45-
> [!NOTE]
46-
> Creating one policy for multiple tenants is not yet supported.
38+
We recommend granting security administrators with the [Intune built-in role "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and Microsoft Defender XDR.
4739

48-
To create a new security policy, perform the following steps:
40+
## Create a new or edit an existing security policy
4941

50-
1. Sign in to the Microsoft Defender portal using a security administrator role.
51-
2. From the main menu, select **Configuration management > Endpoint security policies**, then select **Create new Policy**.
52-
3. Select a tenant, platform, and a template in the dropdown menus. Then select Create policy.
53-
:::image type="content" source="media/mto-endpoint-security-policy/mto-create-policy-small.png" alt-text="Screenshot of the policy creation page in endpoints security policy page in multitenant management." lightbox="media/mto-endpoint-security-policy/mto-create-policy.png":::
54-
4. On the **Basics** page, enter a name and description for the new policy, then choose **Next**.
55-
5. On the **Configuration settings** page, expand a group of settings and configure the settings you need to manage the endpoints in the tenant. Select **Next** once you're done with the configuration.
56-
6. On the **Assignments** page, select the Microsoft Entra ID groups where the policy will apply, then select **Next**.
57-
7. Review your new policy's settings on the **Review + create** page, then select **Save** when you're done.
42+
Use the same procedure to create a new endpoint security policy in the multitenant management portal as you would in the single tenant portal. Differences include:
5843

59-
After creating, the Microsoft Defender portal opens a new window showing the new policy's details.
44+
- Before you start, select the tenant for which you want to create the policy. Each policy is created for a specific tenant, and you can only create policies for one tenant at a time.
6045

61-
> [!NOTE]
62-
> To edit the scope tags, you'll need to go to the [Microsoft Intune admin center](https://intune.microsoft.com/). Editing scope tags must be done in the single tenant portal as multitenant management is not yet supported in the Intune admin center.
46+
For example:
47+
48+
:::image type="content" source="media/mto-endpoint-security-policy/mto-create-policy-small.png" alt-text="Screenshot of the policy creation page in endpoints security policy page in multitenant management." lightbox="media/mto-endpoint-security-policy/mto-create-policy.png":::
6349

64-
## Edit a security policy
50+
- To edit the scope tags, you'll need to go to the [Microsoft Intune admin center](https://intune.microsoft.com/). Editing scope tags must be done in the single tenant portal as multitenant management is not yet supported in the Intune admin center.
6551

66-
To edit an existing security policy, perform the following steps:
67-
68-
1. In the **Endpoint security policies** page, select the policy you want to edit and then select **Edit**.
69-
2. In the side panel, select **Edit** to edit the policy.
70-
3. Modify the policy's settings and configuration in the next pages.
71-
4. After you've made changes, select **Save** to save your edits.
52+
From the page, you can search for a specific policy by using the **Search** function. You can also **Filter** the policies according to tenant name, policy category, policy type, and targets. You can view, create, edit, or delete a security policy on a single tenant only through the page.
7253

73-
You can delete a security policy by selecting the policy in the Endpoint security policies page, then selecting **Delete**.
54+
Edit or delete a security policy by selecting the policy in the Endpoint security policies page, then selecting **Edit** or **Delete**. For example:
7455

7556
:::image type="content" source="media/mto-endpoint-security-policy/mto-edit-policy-small.png" alt-text="Screenshot of the editing pane for endpoint security policies page in multitenant management in Microsoft Defender XDR." lightbox="media/mto-endpoint-security-policy/mto-edit-policy.png":::
7657

58+
For more information, see [Create an endpoint security policy](//defender-endpoint/manage-security-policies#create-an-endpoint-security-policy).
59+
7760
## Verify endpoint security policy status
7861

7962
To verify that you have successfully created a policy, select the policy from the list and click on the policy name to open the policy page. You can also view the policy page through **Edit > Open policy page**. The policy page opens in a new tab.
@@ -84,4 +67,12 @@ The policy page displays details of an endpoint security policy, including the s
8467

8568
You can also view the policy in the Microsoft Intune admin center. To do so, select the More actions ellipsis (…) in the policy page, then select **View in Intune**.
8669

87-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
70+
## View distributed policies (Preview)
71+
72+
Endpoint security policies that are distributed across tenants with the multitenant management portal appear in a hierarchical view, with the original policy serving as the parent. You can find the policies that were distributed from your tenant under the original policy. For example:
73+
74+
:::image type="content" source="media/mto-endpoint-security-policy/mto-distributed.png" alt-text="Screenshot of the endpoint security policies page in multitenant management highlighting distributed policies" lightbox="media/mto-endpoint-security-policy/mto-distributed.png":::
75+
76+
The **Last Distribution Status** for the original policy reflects the overall status of its distributed copies, and the **Tenants** and **Tenant Groups** sections indicate the recipients of the policy.
77+
78+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

unified-secops-platform/mto-tenantgroups.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -46,28 +46,20 @@ The following table lists the requirements for content distribution in multitena
4646
To create a new tenant group:
4747

4848
1. Go to the [Tenant groups page](https://mto.security.microsoft.com/tenantgroups) in multitenant management in Microsoft Defender XDR.
49-
1. Select **Create tenant group**. In the **Tenants** page, select **Add tenant** to see a list of available tenants that you can add to your tenant group. Choose the tenants you want to add to the tenant group, then select **Add**.
5049

51-
:::image type="content" source="media/mto-tenantgroups/mto-add-tenants-small.png" alt-text="Screenshot of the tenant group creation wizard." lightbox="media/mto-tenantgroups/mto-add-tenants.png":::
50+
1. Select **Create tenant group**. In the **Tenants** page, select **Add tenant** to see a list of available tenants that you can add to your tenant group. Choose the tenants you want to add to the tenant group, then select **Add**.
5251

5352
1. In the **Content selection** page, select the content to be distributed across all tenants in your tenant group, then select **Next**.
5453

55-
1. In the **Custom detection rules** page, select **Add content** to add specific detection rules to your tenant group.
56-
57-
:::image type="content" source="media/mto-tenantgroups/mto-add-custom-small.png" alt-text="Screenshot of custom detection rules addition wizard." lightbox="media/mto-tenantgroups/mto-add-custom.png":::
54+
1. In the **Custom detection rules** page, select **Add content** to add content to your tenant group.
5855

5956
1. In the **Select detection rules** page, filter the source tenant of the content, then select **Apply**. Choose the content you want to add to your tenant group from the list.
6057

61-
:::image type="content" source="media/mto-tenantgroups/mto-select-content-small.png" alt-text="Screenshot of the detection rules selection pane." lightbox="media/mto-tenantgroups/mto-select-content.png":::
62-
6358
1. In the **Device groups** page, select the devices or specific device groups that need to be in your tenant's scope.
6459

65-
:::image type="content" source="media/mto-tenantgroups/mto-select-device-small.png" alt-text="Screenshot of the device selection pane." lightbox="media/mto-tenantgroups/mto-select-device.png":::
66-
6760
1. Add a tenant group name and description about your tenant group in the Details page.
68-
1. Review the details of the tenant group you created in the **Summary** page. Leave the **Sync all authorized tenants** option checked if content needs to be synchronized now or uncheck it if the sync is planned for a later time.
6961

70-
:::image type="content" source="media/mto-tenantgroups/mto-summary-tenantgroups-small.png" alt-text="Screenshot of summary of tenant groups with the checkbox highlighted." lightbox="media/mto-tenantgroups/mto-summary-tenantgroups.png":::
62+
1. Review the details of the tenant group you created in the **Summary** page. Leave the **Sync all authorized tenants** option checked if content needs to be synchronized now or uncheck it if the sync is planned for a later time.
7163

7264
1. Select **Submit** to finish your tenant group creation.
7365

unified-secops-platform/whats-new.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,12 @@ This article lists recent features added for unified security operations in the
2929

3030
### Distribute Microsoft Defender for Endpoint security policies with multitenant management
3131

32-
Microsoft Defender for Endpoint security policies can now be distributed across multiple tenants from the Defender multi-tenant portal. This capability empowers security teams to manage policies at scale, ensuring consistency and saving valuable time.
33-
34-
- Endpoint security policies now display distributed policies in a hierarchical view, making it easier to identify parent policies and their distributed copies across tenants.
35-
- The original policy’s page now shows the overall distribution status and clearly lists recipient tenants and tenant groups.
36-
37-
For example:
32+
Microsoft Defender for Endpoint security policies can now be distributed as content across multiple tenants using the Defender multitenant portal, empowering security teams to manage endpoint security policies at scale. Disributed policies are shown in the **Configuration management > Endpoint security policies** page in a hierarchical view so that you can identify parent policies and their distributed copies across tenants.
3833

3934
:::image type="content" source="media/mto-endpoint-security-policy/mto-distributed.png" alt-text="Screenshot of an expanded, distributed policy." lightbox="media/mto-endpoint-security-policy/mto-distributed.png":::
4035

36+
The original policy’s page also shows the overall distribution status and lists recipient tenants and tenant groups.
37+
4138
For more information, see [Endpoint security policies in multitenant management](mto-endpoint-security-policy.md) and [Content distribution in multitenant management](mto-tenantgroups.md).
4239

4340
### For new customers only: Automatic onboarding and redirection to the Microsoft Defender portal

0 commit comments

Comments
 (0)