You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/custom-roles.md
+14-26Lines changed: 14 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,19 +18,21 @@ search.appverid:
18
18
- MOE150
19
19
- MET150
20
20
---
21
-
# Custom roles in role-based access control for Microsoft Defender XDR services
21
+
# Custom roles in role-based access control for Microsoft Defender portal services
22
22
23
-
By default, access to Microsoft Defender XDR services is managed collectively using [Microsoft Entra global roles](m365d-permissions.md). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md) for centralized permissions management, we recommend creating custom roles for each service.
23
+
By default, access to services available in the Microsoft Defender portal are managed collectively using [Microsoft Entra global roles](m365d-permissions.md). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md) for centralized permissions management, we recommend creating custom roles for each service.
24
24
25
-
For example, create a custom role for Microsoft Defender for Endpoint to manage access to specific Defender for Endpoint data, create a custom role for Microsoft Defender for Office to manage access to specific email and collaboration data.
25
+
For example, create a custom role for Microsoft Defender for Endpoint to manage access to specific Defender for Endpoint data, or create a custom role for Microsoft Defender for Office to manage access to specific email and collaboration data.
26
26
27
-
Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
27
+
In each service, custom role names aren't connected to global roles in Microsoft Entra ID, even if similarly named. For example, a custom role named *Security Admin* in Microsoft Defender for Endpoint isn't connected to the global *Security Admin*role in Microsoft Entra ID.
28
28
29
29
**Applies to:**
30
30
31
+
- Microsoft Defender for Cloud
31
32
- Microsoft Defender for Cloud Apps
32
33
- Microsoft Defender for Endpoint
33
34
- Microsoft Defender for Identity
35
+
- Microsoft Defender for IoT
34
36
- Microsoft Defender for Office 365
35
37
- Microsoft Defender XDR
36
38
@@ -48,30 +50,16 @@ Each Microsoft Defender service has its own custom role management settings, wit
48
50
49
51
:::image type="content" source="./media/custom-roles/custom-roles-endpoint.png" alt-text="Screenshot of a Roles link for Defender for Endpoint.":::
50
52
51
-
## Required roles for Defender XDR services
52
-
53
-
Custom role names aren't connected to global roles in Microsoft Entra ID, even if similarly named. For example, a custom role named *Security Admin* in Microsoft Defender for Endpoint isn't connected to the global *Security Admin* role in Microsoft Entra ID.
54
-
55
-
For Defender for Endpoint and Defender for Office, use custom roles as follows:
56
-
57
-
|Task |Required roles for Defender for Endpoint | Required roles for Defender for Office 365 |
58
-
|---------|---------|
59
-
|**View investigation data**, including alerts, incidents, and the Action center | View data - security operations | One of the following: <ul><li>View-only Manage alerts<li>Organization configuration<li>Audit logs<li>View-only audit logs<li>Security reader<li>Security admin<li>View-only recipients |
60
-
|**View and manage hunting data**, including queries and functions | View data - security operations | One of the following: <ul><li>Security reader<li>Security admin <li>View-only recipients|
61
-
|**Manage alerts and incidents**| Alert investigation |One of the following: <ul><li>Manage alerts<li>Security admin|
62
-
|**Action center remediation**| Active remediation actions – security operations | Search and purge |
63
-
|**Set custom detections**| Manage security settings | One of the following: <ul><li>Manage alerts<li>Security admin|
64
-
|**Threat analytics**| For alert and incidents data: View data- security operations <br><br>For vulnerability management mitigations: View data - Threat and vulnerability management | For alerts and incidents data, one of the following: <ul><li>View-only Manage alerts<li>Manage alerts<li>Organization configuration<li>Audit logs<li>View-only audit logs<li>Security reader<li>Security admin<li>View-only recipients<br>For prevented email attempts, one of the following:<ul><li>Security reader<li>Security admin<li>View-only recipients |
53
+
## Reference of Defender portal service content
65
54
66
-
For other service information, see:
55
+
For information about the permissions and roles for each Microsoft Defender XDR service, see the following articles:
67
56
57
+
-[Microsoft Defender for Cloud user roles and permissions](/azure/defender-for-cloud/permissions)
68
58
-[Configure access for Defender for Cloud Apps](/defender-cloud-apps/manage-admins)
59
+
-[Create and manage roles in Defender for Endpoint](/defender-endpoint/user-roles)
69
60
-[Roles and permissions in Defender for Identity](/defender-for-identity/role-groups)
70
-
71
-
## Related content
72
-
73
-
For more information about other Microsoft Defender portal services, see:
74
-
75
-
-[Microsoft Defender for Cloud user roles and permissions](/azure/defender-for-cloud/permissions)
76
-
-[Roles and permissions in Microsoft Sentinel](/azure/sentinel/roles)
77
61
-[Microsoft Defender for IoT user management](/azure/defender-for-iot/organizations/manage-users-overview)
62
+
-[Microsoft Defender for Office 365 permissions](/defender-office-365/mdo-portal-permissions)
63
+
-[Roles and permissions in Microsoft Sentinel](/azure/sentinel/roles)
64
+
65
+
Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
0 commit comments