Skip to content

Commit 063c71e

Browse files
committed
Global Admin reduce
1 parent aff3bd3 commit 063c71e

File tree

5 files changed

+16
-115
lines changed

5 files changed

+16
-115
lines changed

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -185,6 +185,11 @@
185185
"redirect_url": "/defender-xdr/pilot-deploy-overview",
186186
"redirect_document_id": false
187187
},
188+
{
189+
"source_path": "defender-xdr/microsoft-365-security-mde-redirection.md",
190+
"redirect_url": "/defender-xdr/",
191+
"redirect_document_id": false
192+
},
188193
{
189194
"source_path": "defender-endpoint/evaluation-lab.md",
190195
"redirect_url": "/defender-endpoint/evaluate-microsoft-defender-antivirus",

defender-office-365/mdo-usage-card-about.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,9 @@ In organizations with Microsoft Defender for Office 365, the usage card is avail
3333
> [!TIP]
3434
> The usage card is enabled for tenants with at least one paid Defender for Office 365 Plan 1 or Defender for Office 365 Plan 2 license.
3535
36+
> [!IMPORTANT]
37+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
38+
3639
Usage cards can help determine the following scenarios:
3740

3841
- The active usage of Exchange Online licenses and how many of those licenses are active usage of Microsoft Defender for Office 365.
@@ -47,7 +50,7 @@ Usage cards can help determine the following scenarios:
4750

4851
:::image type="content" source="media/usage-card-mdo.png" alt-text="The Defender for Office 365 usage card in the Defender portal." lightbox="media/usage-card-mdo.png":::
4952

50-
For members of **Global Administrator** or **Billing Administrator** roles in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal), following items are available on the card:
53+
For members of **Billing Administrator** and **Global Administrator** roles in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal), following items are available on the card:
5154

5255
- **Add more licenses**
5356
- **See licensing details**
@@ -74,7 +77,7 @@ The details flyout that opens contains the following information from the last 2
7477

7578
**Threat protection status report** takes you to the [Threat protection status report](reports-email-security.md#threat-protection-status-report).
7679

77-
**See licensing details** is available for members of the **Global Administrators** or **Security Operator** roles in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
80+
**See licensing details** is available for members of the **Security Operator** and **Global Administrators** roles in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
7881

7982
## Frequently asked questions
8083

defender-xdr/custom-roles.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,9 @@ The following table outlines the roles and permissions required to access each u
8080
> [!NOTE]
8181
> Incident management requires management permissions for all products that are part of the incident.
8282
83+
> [!IMPORTANT]
84+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
85+
8386
|Microsoft Defender XDR workload|One of the following roles is required for Defender for Endpoint|One of the following roles is required for Defender for Office 365|One of the following roles is required for Defender for Cloud Apps|
8487
|---|---|---|---|
8588
|Viewing investigation data: <ul><li>Alert page</li> <li>Alerts queue</li> <li>Incidents</li> <li>Incident queue</li> <li>Action center</li></ul>|View data- security operations|<ul><li>View-only Manage alerts </li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li> <li>Security reader</li> <li>Security admin</li><li>View-only recipients</li></ul>|<ul><li>Global admin</li> <li>Security admin</li> <li>Compliance admin</li> <li>Security operator</li> <li>Security reader</li> <li>Global reader</li></ul>|

defender-xdr/m365d-permissions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,9 @@ Accounts assigned the following **Global Microsoft Entra roles** can access Micr
4444
- Global Reader
4545
- Security Reader
4646

47+
> [!IMPORTANT]
48+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
49+
4750
To review accounts with these roles, [view Permissions in the Microsoft Defender portal](https://security.microsoft.com/permissions).
4851

4952
**Custom role** access is a capability in Microsoft Defender XDR that allows you to manage access to specific data, tasks, and capabilities in Microsoft Defender XDR. Custom roles offer more control than global Microsoft Entra roles, providing users only the access they need with the least-permissive roles necessary. Custom roles can be created in addition to global Microsoft Entra roles. [Learn more about custom roles](custom-roles.md).

defender-xdr/microsoft-365-security-mde-redirection.md

Lines changed: 0 additions & 113 deletions
This file was deleted.

0 commit comments

Comments
 (0)