You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-prerequisites.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ To start a trial or to purchase Defender Vulnerability Management, see [Sign up
38
38
39
39
## Roles and permissions
40
40
41
-
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control]((/defender-xdr/manage-rbac)) (RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
41
+
Defender Vulnerability Management uses the [Microsoft Defender XDR Unified role-based access control](/defender-xdr/manage-rbac) (Unified RBAC) model, which provides a single permissions management experience with a central location for administrators to control user permissions across different security solutions, such as Defender for Endpoint and Defender Vulnerability Management.
42
42
43
43
-**Read** permissions enable your security team to view Defender Vulnerability Management data for software, weaknesses, missing KBs, advanced hunting, security baselines assessment, and devices.
0 commit comments