Skip to content

Commit 1475998

Browse files
committed
admin roles
1 parent 01d60d4 commit 1475998

File tree

5 files changed

+22
-11
lines changed

5 files changed

+22
-11
lines changed

defender-xdr/configure-event-hub.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
ms.custom: admindeeplinkDEFENDER
1717
ms.topic: conceptual
18-
ms.date: 02/08/2023
18+
ms.date: 06/21/2024
1919
---
2020

2121
# Configure your Event Hubs
@@ -135,7 +135,7 @@ For these Event Hubs (not namespace), you'll need to configure a Shared Access P
135135

136136
- Contributor role at the Event Hubs *Namespace* Resource level or higher for the Event Hubs that you'll be exporting to. Without this permission, you'll get an export error when you try to save the settings.
137137

138-
- Global Admin or Security Admin Role on the tenant tied to Microsoft Defender XDR and Azure.
138+
- Security Admin Role on the tenant tied to Microsoft Defender XDR and Azure.
139139

140140
:::image type="content" source="/defender/media/55d5b1c21dd58692fb12a6c1c35bd4fa.png" alt-text="The Settings page of the Microsoft Defender portal" lightbox="/defender/media/55d5b1c21dd58692fb12a6c1c35bd4fa.png":::
141141

defender-xdr/mssp-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ search.appverid:
1616
ms.collection:
1717
- m365-security
1818
- tier2
19-
ms.date: 02/16/2021
19+
ms.date: 06/21/2024
2020
---
2121

2222
# Provide managed security service provider (MSSP) access
@@ -52,7 +52,7 @@ To implement a multitenant delegated access solution, take the following steps:
5252

5353
2. Create Defender for Endpoint roles for appropriate access levels in Customer Defender for Endpoint in Microsoft Defender portal roles and groups.
5454

55-
To enable RBAC in the customer Microsoft Defender portal, access **Permissions > Endpoints roles & groups > Roles** with a user account with Global Administrator or Security Administrator rights.
55+
To enable RBAC in the customer Microsoft Defender portal, access **Permissions > Endpoints roles & groups > Roles** with a user account with Security Administrator rights.
5656

5757
:::image type="content" source="/defender/media/mssp-access.png" alt-text="The details of the MSSP access in the Microsoft Defender portal" lightbox="/defender/media/mssp-access.png":::
5858

defender-xdr/prerequisites.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 12/5/2023
19+
ms.date: 06/21/2024
2020
---
2121

2222
# Microsoft Defender XDR prerequisites
@@ -56,11 +56,16 @@ For more information, [view the Microsoft 365 Enterprise service plans](https://
5656
Go to Microsoft 365 admin center ([admin.microsoft.com](https://admin.microsoft.com/)) to view your existing licenses. In the admin center, go to **Billing** \> **Licenses**.
5757

5858
> [!NOTE]
59-
> You need to be assigned either the **Billing admin** or **Global reader** [role in Microsoft Entra ID](/azure/active-directory/roles/permissions-reference) to be able to see license information. If you encounter access problems, contact a global admin.
59+
> You need to be assigned either the **Billing admin** or **Global reader** [role in Microsoft Entra ID](/azure/active-directory/roles/permissions-reference) to be able to see license information. If you encounter access problems, contact a Global Administrator.
6060
6161
## Required permissions
6262

63-
You must be a **global administrator** or a **security administrator** in Microsoft Entra ID to turn on Microsoft Defender XDR. For the list of roles required to use Microsoft Defender XDR and information on how access to data is regulated, read about [managing access to Microsoft Defender XDR](m365d-permissions.md).
63+
You must at least be a **security administrator** in Microsoft Entra ID to turn on Microsoft Defender XDR. For the list of roles required to use Microsoft Defender XDR and information on how access to data is regulated, read about [managing access to Microsoft Defender XDR](m365d-permissions.md).
64+
65+
>[!IMPORTANT]
66+
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
67+
68+
6469

6570
## Browser requirements
6671

defender-xdr/streaming-api-event-hub.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier3
1414
ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
16-
ms.date: 02/08/2023
16+
ms.date: 06/21/2024
1717
---
1818

1919
# Configure Microsoft Defender XDR to stream Advanced Hunting events to your Azure Event Hub
@@ -43,7 +43,10 @@ Prior to configuring Microsoft Defender XDR to stream data to Event Hubs, ensure
4343
4444
## Enable raw data streaming
4545

46-
1. Log on to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> as a ***Global Administrator*** or ***Security Administrator***.
46+
1. Log on to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> as a ***Security Administrator*** at a minimum.
47+
48+
>[!IMPORTANT]
49+
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4750
4851
2. Go to the [Streaming API settings page](https://sip.security.microsoft.com/settings/mtp_settings/raw_data_export).
4952

defender-xdr/streaming-api-storage.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier3
1414
ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
16-
ms.date: 02/08/2023
16+
ms.date: 06/21/2024
1717
---
1818

1919
# Configure Microsoft Defender XDR to stream Advanced Hunting events to your Storage account
@@ -44,7 +44,10 @@ Once the Storage account is created, you'll need to:
4444

4545
## Enable raw data streaming
4646

47-
1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> as a ***Global Administrator*** or ***Security Administrator***.
47+
1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> as a ***Security Administrator*** at a minimum.
48+
49+
>[!IMPORTANT]
50+
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4851
4952
2. Go to **Settings** \> **Microsoft Defender XDR** \> **Streaming API**. To go directly to the **Streaming API** page, use <https://security.microsoft.com/settings/mtp_settings/raw_data_export>.
5053

0 commit comments

Comments
 (0)