Skip to content

Commit 0455f8b

Browse files
committed
moving to portal doc instead of xdr
1 parent 0ed8fd9 commit 0455f8b

File tree

1 file changed

+14
-26
lines changed

1 file changed

+14
-26
lines changed

defender-xdr/custom-roles.md

Lines changed: 14 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -18,19 +18,21 @@ search.appverid:
1818
- MOE150
1919
- MET150
2020
---
21-
# Custom roles in role-based access control for Microsoft Defender XDR services
21+
# Custom roles in role-based access control for Microsoft Defender portal services
2222

23-
By default, access to Microsoft Defender XDR services is managed collectively using [Microsoft Entra global roles](m365d-permissions.md). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md) for centralized permissions management, we recommend creating custom roles for each service.
23+
By default, access to services available in the Microsoft Defender portal are managed collectively using [Microsoft Entra global roles](m365d-permissions.md). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md) for centralized permissions management, we recommend creating custom roles for each service.
2424

25-
For example, create a custom role for Microsoft Defender for Endpoint to manage access to specific Defender for Endpoint data, create a custom role for Microsoft Defender for Office to manage access to specific email and collaboration data.
25+
For example, create a custom role for Microsoft Defender for Endpoint to manage access to specific Defender for Endpoint data, or create a custom role for Microsoft Defender for Office to manage access to specific email and collaboration data.
2626

27-
Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
27+
In each service, custom role names aren't connected to global roles in Microsoft Entra ID, even if similarly named. For example, a custom role named *Security Admin* in Microsoft Defender for Endpoint isn't connected to the global *Security Admin* role in Microsoft Entra ID.
2828

2929
**Applies to:**
3030

31+
- Microsoft Defender for Cloud
3132
- Microsoft Defender for Cloud Apps
3233
- Microsoft Defender for Endpoint
3334
- Microsoft Defender for Identity
35+
- Microsoft Defender for IoT
3436
- Microsoft Defender for Office 365
3537
- Microsoft Defender XDR
3638

@@ -48,30 +50,16 @@ Each Microsoft Defender service has its own custom role management settings, wit
4850

4951
:::image type="content" source="./media/custom-roles/custom-roles-endpoint.png" alt-text="Screenshot of a Roles link for Defender for Endpoint.":::
5052

51-
## Required roles for Defender XDR services
52-
53-
Custom role names aren't connected to global roles in Microsoft Entra ID, even if similarly named. For example, a custom role named *Security Admin* in Microsoft Defender for Endpoint isn't connected to the global *Security Admin* role in Microsoft Entra ID.
54-
55-
For Defender for Endpoint and Defender for Office, use custom roles as follows:
56-
57-
|Task |Required roles for Defender for Endpoint | Required roles for Defender for Office 365 |
58-
|---------|---------|
59-
|**View investigation data**, including alerts, incidents, and the Action center | View data - security operations | One of the following: <ul><li>View-only Manage alerts<li>Organization configuration<li>Audit logs<li>View-only audit logs<li>Security reader<li>Security admin<li>View-only recipients |
60-
|**View and manage hunting data**, including queries and functions | View data - security operations | One of the following: <ul><li>Security reader<li>Security admin <li>View-only recipients|
61-
|**Manage alerts and incidents** | Alert investigation |One of the following: <ul><li>Manage alerts<li>Security admin|
62-
|**Action center remediation** | Active remediation actions – security operations | Search and purge |
63-
|**Set custom detections** | Manage security settings | One of the following: <ul><li>Manage alerts<li>Security admin|
64-
|**Threat analytics** | For alert and incidents data: View data- security operations <br><br>For vulnerability management mitigations: View data - Threat and vulnerability management | For alerts and incidents data, one of the following: <ul><li>View-only Manage alerts<li>Manage alerts<li>Organization configuration<li>Audit logs<li>View-only audit logs<li>Security reader<li>Security admin<li>View-only recipients<br>For prevented email attempts, one of the following:<ul><li>Security reader<li>Security admin<li>View-only recipients |
53+
## Reference of Defender portal service content
6554

66-
For other service information, see:
55+
For information about the permissions and roles for each Microsoft Defender XDR service, see the following articles:
6756

57+
- [Microsoft Defender for Cloud user roles and permissions](/azure/defender-for-cloud/permissions)
6858
- [Configure access for Defender for Cloud Apps](/defender-cloud-apps/manage-admins)
59+
- [Create and manage roles in Defender for Endpoint](/defender-endpoint/user-roles)
6960
- [Roles and permissions in Defender for Identity](/defender-for-identity/role-groups)
70-
71-
## Related content
72-
73-
For more information about other Microsoft Defender portal services, see:
74-
75-
- [Microsoft Defender for Cloud user roles and permissions](/azure/defender-for-cloud/permissions)
76-
- [Roles and permissions in Microsoft Sentinel](/azure/sentinel/roles)
7761
- [Microsoft Defender for IoT user management](/azure/defender-for-iot/organizations/manage-users-overview)
62+
- [Microsoft Defender for Office 365 permissions](/defender-office-365/mdo-portal-permissions)
63+
- [Roles and permissions in Microsoft Sentinel](/azure/sentinel/roles)
64+
65+
Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

0 commit comments

Comments
 (0)