You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/predefined-classification-rules-and-levels.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ Current asset types are:
73
73
| Compliance Administrator | Identity | High | Users in this role can read and manage compliance configurations and reports in Microsoft Entra ID and Microsoft 365. | A compromised user in this role poses a severe risk, potentially allowing unauthorized access to Microsoft Purview compliance portal, usage of eDiscovery in search of sensitive data, manipulating risk and compliance configurations, and more. |
74
74
| Groups Administrator | Identity | High | Users in this role can create/manage groups and group settings like naming and expiration policies, and view group activity and audit reports. | A compromised user in this role poses a severe risk, potentially allowing unauthorized access to all Security and Microsoft 365 groups, except role-assignable groups, thus inheriting all access scopes the groups have, and more. |
75
75
| External Identity Provider Administrator | Identity | Very High | Users in this role can configure identity providers for use in direct federation. | A compromised user in this role poses a severe risk, potentially allowing management of federation between Microsoft Entra organizations and external identity providers (IdP), manipulation of all IdP settings, and more. |
76
-
| Domain Name Administrator | Identity | Very High | Users in this role can manage domain names in cloud and on-premises. | A compromised user in this role poses a severe risk, potentially allowing manipulation of domain names, unauthorized access to on-premise environments, and more. |
76
+
| Domain Name Administrator | Identity | Very High | Users in this role can manage domain names in cloud and on-premises. | A compromised user in this role poses a severe risk, potentially allowing manipulation of domain names, unauthorized access to on-premises environments, and more. |
77
77
| Permissions Management Administrator | Identity | Very High | Users in this role can manage all aspects of Microsoft Entra Permissions Management (EPM). | A compromised user in this role poses a severe risk, potentially allowing manipulation of EPM settings and properties, unauthorized access to cloud resources, and more. |
78
78
| Billing Administrator | Identity | High | Users in this role can perform common billing related tasks like updating payment information. | A compromised user in this role poses a severe risk, potentially allowing unauthorized purchases, manipulation and disruption of subscriptions, and more. |
79
79
| License Administrator | Identity | High | Users in this role can manage product licenses on users and groups. | A compromised user in this role poses a severe risk, potentially allowing manipulation of license assignments, disruption of services, and more. |
0 commit comments