Skip to content

Commit 16155e3

Browse files
committed
Added Defender XDR RBAC
1 parent 2c32080 commit 16155e3

File tree

3 files changed

+8
-2
lines changed

3 files changed

+8
-2
lines changed

defender-office-365/mdo-sec-ops-guide.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection:
1919
ms.custom:
2020
description: A prescriptive playbook for SecOps personnel to manage Microsoft Defender for Office 365.
2121
ms.service: defender-office-365
22-
ms.date: 01/19/2024
22+
ms.date: 01/10/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -185,6 +185,11 @@ Permissions for managing Defender for Office 365 in the Microsoft Defender porta
185185
186186
The following permissions (roles and role groups) are available in Defender for Office 365 and can be used to grant access to security team members:
187187

188+
- **Microsoft Defender XDR Unified role based access control (RBAC)**: A single permissions management experience that provides one central location for administrators to control user permissions across different security solutions. For more information, see [Microsoft Defender XDR Unified RBAC](/defender-xdr/manage-rbac).
189+
- _Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
190+
- _Preview and download email messages_: **Security operations/Raw data (email & collaboration)/Email & collaboration content (read)**.
191+
- _Remediate malicious email_: **Security operations/Security data/Email & collaboration advanced actions (manage)**.
192+
188193
- **Microsoft Entra ID**: Centralized roles that assign permissions for _all_ Microsoft 365 services, including Defender for Office 365. You can view the Microsoft Entra roles and assigned users in the Microsoft Defender portal, but you can't manage them directly there. Instead, you manage Microsoft Entra roles and members at <https://aad.portal.azure.com/#view/Microsoft_AAD_IAM/RolesManagementMenuBlade/~/AllRoles/adminUnitObjectId//resourceScope/%2F>. The most frequent roles used by security teams are:
189194
- **[Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)**
190195
- **[Security Reader](/entra/identity/role-based-access-control/permissions-reference#security-reader)**

defender-office-365/office-365-ti.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,7 @@ Microsoft Defender for Office 365 uses role-based access control. Permissions ar
9797
>
9898
> - [Permissions in the Microsoft Defender portal](mdo-portal-permissions.md)
9999
> - [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference)
100+
> - [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac)
100101
101102
|Activity|Roles and permissions|
102103
|---|---|

defender-office-365/threat-explorer-threat-hunting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Selecting :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" b
183183
|**Initiate automated investigation**|||
184184
|**Propose remediation**|||
185185

186-
¹ This action requires the **Search and Purge** role in [Email & collaboration permissions](mdo-portal-permissions.md). By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups. You can add users to those role groups, or you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
186+
¹ This action requires the **Search and Purge** role in [Email & collaboration permissions](mdo-portal-permissions.md) or the **Security operations/Security data/Email & collaboration advanced actions (manage)** permission in [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac). By default, the **Search and Purge** role is assigned only to the **Data Investigator** and **Organization Management** role groups. You can add users to those role groups, or you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
187187

188188
² This option is available for quarantined messages when you select **Inbox** as the move location.
189189

0 commit comments

Comments
 (0)