You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/assign-portal-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Defender for Endpoint supports two ways to manage permissions:
40
40
41
41
If you have already assigned basic permissions, you can switch to RBAC anytime. Consider the following before making the switch:
42
42
43
-
- Users who have full access (users who are assigned the Global Administrator or Security Administrator directory role in Microsoft Entra ID), are automatically assigned the default Defender for Endpoint administrator role, which also has full access.
43
+
- Users who have full access (users who are assigned either the Global Administrator or Security Administrator directory role in Microsoft Entra ID) are automatically assigned the default Defender for Endpoint administrator role, which also has full access.
44
44
- Other Microsoft Entra user groups can be assigned to the Defender for Endpoint administrator role after switching to RBAC.
45
45
- Only users who are assigned the Defender for Endpoint administrator role can manage permissions using RBAC.
46
46
- Users who have read-only access (Security Readers) lose access to the portal until they are assigned a role. Only Microsoft Entra user groups can be assigned a role under RBAC.
Copy file name to clipboardExpand all lines: defender-endpoint/basic-permissions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ You can assign users with one of the following levels of permissions:
49
49
50
50
- Connect to your Microsoft Entra ID. For more information, see [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands).
51
51
52
-
-**Full access**: Users with full access can log in, view all system information and resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to the "Security Administrator" or "Global Administrator" Microsoft Entra built-in roles.
52
+
-**Full access**: Users with full access can log in, view all system information and resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to a role, such as Security Administrator, using Microsoft Entra built-in roles.
53
53
54
54
-**Read-only access**: Users with read-only access can log in, view all alerts, and related information.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-non-windows.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ You can choose to onboard non-Windows devices through Microsoft Defender for End
55
55
56
56
3. Select **View** to open the partner's page. Follow the instructions provided on the page.
57
57
58
-
4. After creating an account or subscribing to the partner solution, you should get to a stage where a tenant admin (or Global Administrator) is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
58
+
4. After creating an account or subscribing to the partner solution, you should get to a stage where an administrator (such as a tenant administrator) is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
59
59
60
60
> [!IMPORTANT]
61
61
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
@@ -63,7 +63,7 @@ Before you can ensure your devices are configured properly, enroll them to Intun
63
63
64
64
## Obtain required permissions
65
65
66
-
By default, only users who have been assigned the Global Administrator or the Intune Service Administrator role on Microsoft Entra ID can manage and assign the device configuration profiles needed for onboarding devices and deploying the security baseline.
66
+
By default, only users who have been assigned an appropriate role, such as the Intune Service Administrator role in Microsoft Entra ID, can manage and assign the device configuration profiles needed for onboarding devices and deploying the security baseline.
67
67
68
68
> [!IMPORTANT]
69
69
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-vulnerability-email-notifications.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,12 +30,12 @@ Configure Microsoft Defender for Endpoint to send email notifications to specifi
30
30
If you're using [Defender for Business](/defender-business/mdb-overview), you can set up vulnerability notifications for specific users only (not roles or groups).
31
31
32
32
> [!NOTE]
33
-
> - Only users with `Manage security settings` permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. [Learn more about permission options](user-roles.md)
33
+
> - Only users with `Manage security settings` permissions can configure email notifications. If you've chosen to use basic permissions management, users with an appropriate role, such as Security Administrator, can configure email notifications. [Learn more about permission options](user-roles.md)
34
34
> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
35
35
36
36
The notification rules allow you to set the vulnerability events that trigger notifications, and add or remove email notification recipients. New recipients get notified about vulnerabilities after they're added.
37
37
38
-
If you're using role-based access control (RBAC), recipients will only receive notifications based on the device groups that were configured in the notification rule. Users with the proper permission can only create, edit, or delete notifications that are limited to their device group management scope. Only users assigned to the Global administrator role can manage notification rules that are configured for all device groups.
38
+
If you're using role-based access control (RBAC), recipients only receive notifications based on the device groups that were configured in the notification rule. Users with the proper permission can only create, edit, or delete notifications that are limited to their device group management scope. Only users assigned to an administrator role, such as Security Administrator, can manage notification rules that are configured for all device groups.
39
39
40
40
The email notification includes basic information about the vulnerability event. There are also links to filtered views in the Defender Vulnerability Management [Security recommendations](api/ti-indicator.md) and [Weaknesses](/defender-vulnerability-management/tvm-weaknesses) pages in the portal so you can further investigate. For example, you could get a list of all exposed devices or get additional details about the vulnerability.
41
41
@@ -46,7 +46,7 @@ The email notification includes basic information about the vulnerability event.
46
46
47
47
Create a notification rule to send an email when there are certain exploit or vulnerability events, such as a new public exploit. For each rule, multiple event types can be selected.
48
48
49
-
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and using an account with the Security administrator or Global administrator role assigned.
49
+
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and using an account with the Security Administrator role assigned.
50
50
51
51
2. In the navigation pane, go to **Settings**\>**Endpoints**\>**General**\>**Email notifications**\>**Vulnerabilities**.
# Get started with your Microsoft Defender for Endpoint deployment
@@ -54,7 +54,7 @@ The steps to deploy Defender for Endpoint are:
54
54
55
55
Here's a list of prerequisites required to deploy Defender for Endpoint:
56
56
57
-
- You're a Global Administrator
57
+
- You're a Security Administrator
58
58
- Your environment meets the [minimum requirements](minimum-requirements.md)
59
59
- You have a full inventory of your environment. The following table provides a starting point to gather information and ensure that stakeholders understand your environment. The inventory helps identify potential dependencies and/or changes required in technologies or processes.
Copy file name to clipboardExpand all lines: defender-endpoint/prepare-deployment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ Microsoft recommends using [Privileged Identity Management](/azure/active-direct
52
52
53
53
Defender for Endpoint supports two ways to manage permissions:
54
54
55
-
-**Basic permissions management**: Set permissions to either full access or read-only. Users with Global Administrator or Security Administrator roles in Microsoft Entra ID have full access. The Security reader role has read-only access and does not grant access to view machines/device inventory.
55
+
-**Basic permissions management**: Set permissions to either full access or read-only. Users with a role, such as Security Administrator in Microsoft Entra ID have full access. The Security reader role has read-only access and does not grant access to view machines/device inventory.
56
56
57
57
-**Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Microsoft Entra user groups to the roles, and granting the user groups access to device groups. For more information. see [Manage portal access using role-based access control](rbac.md).
Copy file name to clipboardExpand all lines: defender-endpoint/rbac.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,9 +66,9 @@ To implement role-based access, you'll need to define admin roles, assign corres
66
66
Before using RBAC, it's important that you understand the roles that can grant permissions and the consequences of turning on RBAC.
67
67
68
68
> [!WARNING]
69
-
> Before enabling the feature, it's important that you have a Global Administrator role or Security Administrator role in Microsoft Entra ID and that you have your Microsoft Entra groups ready to reduce the risk of being locked out of the portal.
69
+
> Before enabling the feature, it's important that you have an appropriate role, such as Security Administrator assigned in Microsoft Entra ID, and that you have your Microsoft Entra groups ready to reduce the risk of being locked out of the portal.
70
70
71
-
When you first sign in to the Microsoft Defender portal, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Microsoft Entra ID. Read only access is granted to users with a Security Reader role in Microsoft Entra ID.
71
+
When you first sign in to the Microsoft Defender portal, you're granted either full access or read only access. Full access rights are granted to users with the Security Administrator role in Microsoft Entra ID. Read only access is granted to users with a Security Reader role in Microsoft Entra ID.
72
72
73
73
Someone with a Defender for Endpoint Global Administrator role has unrestricted access to all devices, regardless of their device group association and the Microsoft Entra user groups assignments.
Copy file name to clipboardExpand all lines: defender-endpoint/respond-file-alerts.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -166,10 +166,10 @@ The **Download file** button can have the following states:
166
166
For Microsoft Defender for Endpoint role-based access control (RBAC):
167
167
168
168
For Portable Executable file (.exe, .sys, .dll, and others)
169
-
-Global admin or Advanced live response or Alerts
169
+
-Security Administrator or Advanced live response or Alerts
170
170
171
171
Non-Portable Executable file (.txt, .docx, and others)
172
-
-Global admin or Advanced live response
172
+
-Security Administrator or Advanced live response
173
173
- Tenants with [role-based access (RBAC) permissions](/defender-xdr/manage-rbac) enabled
174
174
175
175
@@ -212,15 +212,15 @@ The **Collect file** button can have the following states:
212
212
The following permissions are required:
213
213
214
214
For Portable Executable file (.exe, .sys, .dll, and others)
215
-
-Global admin or Advanced live response or Alerts
215
+
-Security Administrator or Advanced live response or Alerts
216
216
217
217
Non-Portable Executable file (.txt, .docx, and others)
218
-
-Global admin or Advanced live response
218
+
-Security Administrator or Advanced live response
219
219
220
220
221
221
If a file hasn't been seen in the organization in the past 30 days, **Collect file** is disabled.
222
222
223
-
> [!Important]
223
+
> [!IMPORTANT]
224
224
> A file that was quarantined as a potential network threat might not be recoverable. If a user attempts to restore the file after quarantine, that file might not be accessible. This can be due to the system no longer having network credentials to access the file. Typically, this is a result of a temporary log on to a system or shared folder and the access tokens expired.
Copy file name to clipboardExpand all lines: defender-endpoint/switch-to-mde-phase-2.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.subservice: onboard
6
6
ms.author: siosulli
7
7
author: siosulli
8
8
ms.localizationpriority: medium
9
-
ms.date: 07/25/2024
9
+
ms.date: 08/29/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -87,7 +87,7 @@ You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2
87
87
> - If you have Defender for Endpoint Plan 1, complete steps 1-5 in the following procedure.
88
88
> - If you have Defender for Endpoint Plan 2, complete steps 1-7 in the following procedure.
89
89
90
-
1. Make sure Defender for Endpoint is provisioned. As a Global Administrator, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in. Then, in the navigation pane, select **Assets** > **Devices**.
90
+
1. Make sure Defender for Endpoint is provisioned. As a Security Administrator, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in. Then, in the navigation pane, select **Assets** > **Devices**.
91
91
92
92
The following table shows what your screen might look like and what it means.
0 commit comments