Skip to content

Commit 1fd1e6d

Browse files
authored
Merge pull request #1146 from DebLanger/caps-table-update
Caps table update
2 parents 2c44e42 + 58ddb4c commit 1fd1e6d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Current asset types are:
4747
| Identity with Privileged Azure Role | Identity | High | The following identities (User, Group, Service Principal, or Managed Identity) have an assigned built-in or custom privileged Azure RBAC role, at subscription scope, containing a critical resource. The role can include permissions for Azure role assignments, modifying Azure policies, executing scripts on a VM using Run command, read-access to storage accounts and keyvaults, and more. |
4848
| Application Administrator | Identity | Very High | Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. |
4949
| Application Developer | Identity | High | Users in this role can create application registrations independent of the 'Users can register applications' setting. |
50-
| Authentication Administrator | Identity | Very High | Users in this role can set and reset authentication method (including passwords) for nonadmin users. |
50+
| Authentication Administrator | Identity | Very High | Users in this role can set and reset authentication method (including passwords) for non-admin users. |
5151
| B2C IEF Keyset Administrator | Identity | High | Users in this role can manage secrets for federation and encryption in the Identity Experience Framework (IEF). |
5252
| Cloud Application Administrator | Identity | Very High | Users in this role can create and manage all aspects of app registrations and enterprise apps except App Proxy. |
5353
| Cloud Device Administrator | Identity | High | Users in this role have limited access to manage devices in Microsoft Entra ID. They can enable, disable, and delete devices in Microsoft Entra ID and read Windows 10 BitLocker keys (if present) in the Azure portal. |
@@ -88,7 +88,7 @@ Current asset types are:
8888
| Attribute Definition Administrator | Identity | High | Users in this role can define and manage the definition of custom security attributes. |
8989
| Attribute Assignment Administrator | Identity | High | Users in this role can assign custom security attribute keys and values to supported Microsoft Entra objects. |
9090
| Identity Governance Administrator | Identity | High | Users in this role can manage access using Microsoft Entra ID for identity governance scenarios. |
91-
| Cloud App Security Administrator | Identity | High | |
91+
| Cloud App Security Administrator | Identity | High | Users in this role can manage all aspects of the Defender for Cloud Apps product. |
9292
| Windows 365 Administrator | Identity | High | Users in this role can provision and manage all aspects of Cloud PCs. |
9393
| Yammer Administrator | Identity | High | Users in this role can manage all aspects of the Yammer service. |
9494
| Authentication Extensibility Administrator | Identity | High | Users in this role can customize sign in and sign up experiences for users by creating and managing custom authentication extensions. |

0 commit comments

Comments
 (0)