Skip to content

Commit 0edead8

Browse files
committed
acrolinx
1 parent b8e5fc0 commit 0edead8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Current asset types are:
7373
| Compliance Administrator | Identity | High | Users in this role can read and manage compliance configurations and reports in Microsoft Entra ID and Microsoft 365. | A compromised user in this role poses a severe risk, potentially allowing unauthorized access to Microsoft Purview compliance portal, usage of eDiscovery in search of sensitive data, manipulating risk and compliance configurations, and more. |
7474
| Groups Administrator | Identity | High | Users in this role can create/manage groups and group settings like naming and expiration policies, and view group activity and audit reports. | A compromised user in this role poses a severe risk, potentially allowing unauthorized access to all Security and Microsoft 365 groups, except role-assignable groups, thus inheriting all access scopes the groups have, and more. |
7575
| External Identity Provider Administrator | Identity | Very High | Users in this role can configure identity providers for use in direct federation. | A compromised user in this role poses a severe risk, potentially allowing management of federation between Microsoft Entra organizations and external identity providers (IdP), manipulation of all IdP settings, and more. |
76-
| Domain Name Administrator | Identity | Very High | Users in this role can manage domain names in cloud and on-premises. | A compromised user in this role poses a severe risk, potentially allowing manipulation of domain names, unauthorized access to on-premise environments, and more. |
76+
| Domain Name Administrator | Identity | Very High | Users in this role can manage domain names in cloud and on-premises. | A compromised user in this role poses a severe risk, potentially allowing manipulation of domain names, unauthorized access to on-premises environments, and more. |
7777
| Permissions Management Administrator | Identity | Very High | Users in this role can manage all aspects of Microsoft Entra Permissions Management (EPM). | A compromised user in this role poses a severe risk, potentially allowing manipulation of EPM settings and properties, unauthorized access to cloud resources, and more. |
7878
| Billing Administrator | Identity | High | Users in this role can perform common billing related tasks like updating payment information. | A compromised user in this role poses a severe risk, potentially allowing unauthorized purchases, manipulation and disruption of subscriptions, and more. |
7979
| License Administrator | Identity | High | Users in this role can manage product licenses on users and groups. | A compromised user in this role poses a severe risk, potentially allowing manipulation of license assignments, disruption of services, and more. |

0 commit comments

Comments
 (0)