Skip to content

Commit 2e7dd50

Browse files
authored
Merge branch 'main' into docs-editor/android-whatsnew-1736162194
2 parents ecc464b + 0f3a93e commit 2e7dd50

File tree

6 files changed

+49
-20
lines changed

6 files changed

+49
-20
lines changed

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
3131
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
3232
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
3333

34-
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
34+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
3535

3636
|Customer provisioning location |Data storage location |
3737
|---------|---------|
@@ -65,7 +65,7 @@ Defender for Cloud Apps shares data, including customer data, among the followin
6565
- Microsoft Defender for Cloud
6666
- Microsoft Sentinel
6767
- Microsoft Defender for Endpoint
68-
- Microsoft Security Exposure Management (Preview)
68+
- Microsoft Security Exposure Management
6969
- Microsoft Purview
7070
- Microsoft Entra ID Protection
7171

46.4 KB
Loading
26.7 KB
Loading
27.7 KB
Loading
95.2 KB
Loading

defender-for-iot/set-up-rbac.md

Lines changed: 47 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -28,49 +28,78 @@ To make general changes to RBAC roles and permissions that relate to all other a
2828

2929
## Access management options
3030

31-
There are two ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The two systems are:
31+
There are three ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The systems are:
3232

3333
- [Global Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference).
34-
- [Microsoft Defender XDR Unified RBAC](/defender-xdr/custom-roles): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
34+
- [Microsoft Defender XDR Unified RBAC](/defender-xdr/manage-rbac): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
35+
- [Microsoft Defender for Endpoint XDR RBAC](/defender-endpoint/user-roles): Use Defender for Endpoint XDR role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
3536

36-
The instructions and permission settings listed in this article apply to Defender XDR Unified RBAC.
37-
38-
### RBAC for version 1 or 2
39-
40-
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of Defender XDR Unified RBAC. For more information, see [permissions for RBAC version 1](/defender-endpoint/prepare-deployment), or [permissions for RBAC version 2](/defender-endpoint/user-roles#permission-options).
41-
42-
If you're using the Defender portal for the first time, you need to set up all of your roles and permissions. For more information, see [manage portal access using role-based access control](/defender-xdr/manage-rbac).
37+
The instructions and permission settings listed in this article apply to both Defender XDR Unified and Microsoft Defender for Endpoint XDR RBAC.
4338

4439
## Set up Defender XDR Unified RBAC roles for site security
4540

46-
Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-site-security), to give users access to site security features:
41+
Assign RBAC permissions and roles, based on the [summary table](#summary-of-rbac-roles-and-permissions-for-site-security), to give users access to site security features:
4742

48-
1. In the Defender portal, select **Settings** \> **Microsoft XDR** \> **Permissions and roles**.
43+
1. In the Defender portal, select **Settings** \> **Microsoft Defender XDR** \> **Permissions and roles**.
4944
1. Enable **Endpoints & Vulnerability Management**.
5045
1. Select **Go to Permissions and roles**.
5146
1. Select **Create custom role**.
5247
1. Type a **Role name**, and then select **Next** for Permissions.
5348

5449
:::image type="content" source="media/set-up-rbac/permissions-set-up.png" alt-text="Screenshot of the permissions set up page for site security." lightbox="media/set-up-rbac/permissions-set-up.png":::
5550

56-
1. Select **Security operations**, and select **Select custom permissions**.
57-
1. In **Security settings**, select **Security data basics** and select **Apply**
58-
1. Select **Authorization and settings**, select **Select custom permissions**.
59-
1. In **Security data** ,select **Core security settings (manage)** and select **Apply**
51+
1. For read permissions, select **Security operations**, and select **Select custom permissions**.
52+
1. In **Security data**, select **Security data basics(read)** and select **Apply**.
53+
54+
:::image type="content" source="media/set-up-rbac/permissions-unified-read-options.png" alt-text="Screenshot of the permissions set up page with the specific read permissions chosen for site security." lightbox="media/set-up-rbac/permissions-unified-read-options.png":::
55+
56+
1. For write permissions, in **Authorization and settings**, select **Select custom permissions**.
57+
1. In **Security data**, select **Core security settings (manage)** and select **Apply**.
6058

61-
:::image type="content" source="media/set-up-rbac/permissions-choose-options.png" alt-text="Screenshot of the permissions set up page with the specific permissions chosen for site security." lightbox="media/set-up-rbac/permissions-choose-options.png":::
59+
:::image type="content" source="media/set-up-rbac/permissions-choose-options.png" alt-text="Screenshot of the permissions set up page with the specific write permissions chosen for site security." lightbox="media/set-up-rbac/permissions-choose-options.png":::
6260

6361
1. Select **Next** for Assignments.
6462
1. Select **Add assignment**, type a name, choose users and groups and select the Data sources.
6563
1. Select **Add**.
6664
1. Select **Next** to **Review and finish**.
6765
1. Select **Submit**.
6866

69-
### Summary of roles and permissions for site security
67+
## Set up Microsoft Defender for Endpoint XDR RBAC (Version 2) roles for site security
68+
69+
Assign RBAC permissions and roles, based on the [summary table](#summary-of-rbac-roles-and-permissions-for-site-security), to give users access to site security features:
70+
71+
1. In the Defender portal, select **Settings** \> **Endpoints** \> **Roles**.
72+
1. Select **Add role**.
73+
1. Type a **Role name**, and a **Description**.
74+
1. Select **Next** for Permissions.
75+
76+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-add-role.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-add-role.png":::
77+
78+
1. For read permissions, in **View Data**, select **Security Operations**.
79+
80+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-read-options.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page with the specific read permissions chosen for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-read-options.png":::
81+
82+
1. For write permissions, select **Manage security settings in Security Center**.
83+
84+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-write-options.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page with the specific read and write permissions chosen for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-write-options.png":::
85+
86+
1. Select **Next**.
87+
1. In **Assigned user groups**, select the user groups from the list to assign to this role.
88+
1. Select **Submit**.
89+
90+
### Summary of RBAC roles and permissions for site security
91+
92+
**For Unified RBAC**:
93+
94+
|Write permissions |Read permissions |
95+
|----|----|
96+
| **Defender permissions**: Core security settings (manage) under Authorization and Settings and scoped to all device groups. <br>**Entra ID roles**: Global Administrator, Security Administrator, Security Operator and scoped to all device groups.| Write roles (including roles that are non-scoped to all device groups). <br> **Defender permissions**: Security data basics (under Security Operations).<br>**Entra ID roles**: Global Reader, Security Reader.|
97+
98+
**For Microsoft Defender for Endpoint XDR RBAC (version 2)**:
7099

71100
|Write permissions |Read permissions |
72101
|----|----|
73-
| **Defender Permissions**: Core security settings scoped to all device groups. <br>**Entra ID roles**: Global Administrator, Security Administrator, Security Operator scoped to all device groups.| Write roles (including roles that aren't scoped to all device groups). <br> **Defender Permissions**: Security data basics (under Security Operations).<br>**Entra ID roles**: Global Reader, Security Reader.|
102+
| **Defender for Endpoint roles**: Manage security settings in Security Center and scoped to all device groups.<br>**Entra ID roles**: Global Administrator, Security Administrator.| Write roles (including roles that are non-scoped to all device groups). <br> **Defender for Endpoint roles**: View data - Security operations (read). <br>**Entra ID roles**: Global Reader, Security Reader.|
74103

75104
## Next steps
76105

0 commit comments

Comments
 (0)