You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Multitenant management is also available to US government customers. Refer to the table below for specific scenarios for GCC, GCC High, DoD, and Commercial customers.
41
+
42
+
| Scenario | Availability |
43
+
| ------ | ------ |
44
+
|Multitenant management | Available to all GCC, GCC High, DoD, and Commercial customers.|
45
+
|Cross cloud collaboration| - Both DoD and GCC High customers can manage tenants in each other's clouds. </br></br> - GCC customers can manage tenants in the Commercial cloud. |
40
46
41
47
## Benefits of multitenant management
42
48
@@ -65,6 +71,9 @@ The following key capabilities are available for each tenant you have access to
65
71
|**Endpoints** > **Vulnerability management** > **Tenants**|For all tenants and at a tenant-specific level, explore vulnerability management information across different values such as exposed devices, security recommendations, weaknesses, and critical CVEs. |
66
72
|**Configuration** > **Settings**|Lists the tenants you have access to. Use this page to view and manage your tenants.|
67
73
74
+
> [!NOTE]
75
+
> The content distribution capability is not yet available for all GCC, GCC High, and DoD customers.
76
+
68
77
## Next steps
69
78
70
79
-[Set up Microsoft Defender multitenant management](mto-requirements.md)
Copy file name to clipboardExpand all lines: defender-xdr/mto-requirements.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ This article describes the steps you need to take to start using multitenant man
28
28
3.[Set up Microsoft Defender multitenant management](#set-up-multitenant-management)
29
29
30
30
>[!Note]
31
-
>- In multi-tenant management, interactions between the multi-tenant user and the managed tenants could involve accessing data and managing configurations. The ability to undertake these actions is determined by the permissions a managed tenant has granted the multi-tenant user.
31
+
>- In multitenant management, interactions between the multitenant user and the managed tenants could involve accessing data and managing configurations. The ability to undertake these actions is determined by the permissions a managed tenant has granted the multitenant user.
32
32
>-[Data privacy](data-privacy.md), [role-based access control (RBAC)](m365d-permissions.md) and [Licensing](prerequisites.md#licensing-requirements) are respected by Microsoft Defender multi-tenant management.
33
33
34
34
## Review the requirements
@@ -38,6 +38,7 @@ The following table lists the basic requirements you need to use multitenant man
38
38
| Requirement | Description |
39
39
|:---|:---|
40
40
| Microsoft Defender XDR prerequisites | Verify you meet the [Microsoft Defender XDR prerequisites](prerequisites.md)|
41
+
| Microsoft Defender XDR for US Government customers | Check if you have the following applicable [licensing requirements](usgov.md#licensing-requirements)|
41
42
| Multitenant access | To view and manage the data you have access to in multitenant management, you need to ensure you have the necessary access. For each tenant you want to view and manage, you need to have either: <br/> <br/> - [Granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction) <br/> - [Microsoft Entra B2B authentication](/azure/active-directory/external-identities/what-is-b2b) <br/> <br/> To learn more about how to synchronize multiple B2B users across tenants, see [Configure cross-tenant synchronization](/azure/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure).|
42
43
| Permissions | Users must be assigned the correct roles and permissions at the individual tenant level, in order to view and manage the associated data in multitenant management. To learn more, see: <br/><br/> - [Manage access to Microsoft Defender XDR with Microsoft Entra global roles](./m365d-permissions.md) <br/> - [Custom roles in role-based access control for Microsoft Defender XDR](./custom-roles.md)<br/><br/> To learn how to grant permissions for multiple users at scale, see [What is entitlement management](/azure/active-directory/governance/entitlement-management-overview).|
43
44
| Security information and event management (SIEM) data (Optional) |To include SIEM data with the extended detection and response (XDR) data, one or more tenants must include a Microsoft Sentinel workspace onboarded to the Microsoft unified security operations platform. For more information, see [Connect Microsoft Sentinel to Microsoft Defender XDR](microsoft-sentinel-onboard.md).<br/><br/>Only one Microsoft Sentinel workspace per tenant is currently supported in the unified security operations platform. So in Microsoft Defender multitenant management, you have SIEM data from one Microsoft Sentinel workspace per tenant.<br/><br/> Access to Microsoft Sentinel data is available through [Microsoft Entra B2B authentication](/azure/active-directory/external-identities/what-is-b2b). Microsoft Sentinel doesn't support [granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction) at this time. |
@@ -81,7 +82,7 @@ The first time you use Microsoft Defender multitenant management, you need setup
81
82
3. Choose the tenants you want to manage and select **Add**
82
83
83
84
>[!Note]
84
-
> The Microsoft Defender multi-tenant view currently has a limit of 50 target tenants.
85
+
> The Microsoft Defender multitenant view currently has a limit of 50 target tenants.
85
86
86
87
The features available in multitenant management now appear on the navigation bar and you're ready to view and manage security data across all your tenants.
0 commit comments