Skip to content

Commit 3bb9791

Browse files
authored
Merge pull request #1846 from DebLanger/US308919_URBAC
gadi changes
2 parents 286163c + 679dd79 commit 3bb9791

File tree

1 file changed

+41
-15
lines changed

1 file changed

+41
-15
lines changed

exposure-management/prerequisites.md

Lines changed: 41 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 09/16/2024
9+
ms.date: 11/11/2024
1010
---
1111

1212
# Prerequisites and support
@@ -19,23 +19,51 @@ Security Exposure Management is currently in public preview.
1919

2020
## Permissions
2121

22-
Permissions are based on [Microsoft Entra ID Roles](/entra/identity/role-based-access-control/custom-overview). You need a tenant with at least one Global Admin or Security Admin to create a Security Exposure Management workspace.
22+
> [!IMPORTANT]
23+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
2324
24-
- For full Security Exposure Management access, user roles need access to all Defender for Endpoint [device groups](/microsoft-365/security//defender-endpoint/machine-groups).
25-
- Users who have access restricted to some of the organization's device groups (and not to all), can:
26-
- Access global exposure insights data.
27-
- View affected assets under metrics, recommendations, events, and initiatives history only within users' scope
28-
- View devices in attack paths that are within the users' scope
29-
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups to which they have access
25+
## Manage permissions with Microsoft Defender XDR Unified role-based access control (RBAC)
3026

31-
### Permissions for Security Exposure Management tasks
27+
[Microsoft Defender XDR Unified role-based access control(RBAC)](/defender-xdr/manage-rbac) allows you to create custom roles with specific permissions for Exposure Management. These permissions are located under the **Security posture** category in Defender XDR Unified RBAC permissions model and are named:
28+
29+
- **Exposure Management (read)** for read-only access
30+
- **Exposure Management (manage)** for access to manage Exposure Management experiences
31+
32+
For more sensitive actions in Exposure Management, users need the **Core security settings (manage)** permission which is located under the **Authorization and settings** category.
33+
34+
To access Exposure Management data and actions, a custom role in Defender XDR Unified RBAC with any of the permissions mentioned here, shall be assigned to the **Microsoft Security Exposure Management** data source.
35+
36+
To learn more about using Microsoft Defender XDR Unified RBAC to manage your Secure Score permissions, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac).
37+
38+
The following table highlights what a user can access or perform with each of the permissions:
39+
40+
|Permission name|Actions|
41+
| -------- | -------- |
42+
|**Exposure Management (read)** |Access to all Exposure Management experiences and read access to all available data|
43+
|**Exposure Management (manage)**|In addition to the read access, the user can set initiative target score, edit metric values, manage recommendations (might require additional permissions related to the specific actions needed to be taken)|
44+
|**Core security settings (manage)**|Connect or change vendor to the External Attack Surface Management initiative|
45+
46+
For full Microsoft Security Exposure Management access, user roles need access to all Defender for Endpoint [device groups](/microsoft-365/security//defender-endpoint/machine-groups).
47+
Users with restricted access to some of the organization's device groups can:
48+
49+
- Access global exposure insights data.
50+
- View affected assets under metrics, recommendations, events, and initiatives history only within their scope.
51+
- View devices in attack paths that are within their scope.
52+
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups they have access to.
53+
54+
> [!NOTE]
55+
> Access with manage permissions to **Critical asset management**, under **System> Settings> Microsoft Defender XDR** requires users to have access to all Defender for Endpoint device groups.
56+
57+
## Access with Microsoft Entra ID roles
58+
59+
An alternative to managing access with Microsoft Defender XDR Unified RBAC permissions, access to Microsoft Security Exposure Management data and actions is also possible with [Microsoft Entra ID Roles](/entra/identity/role-based-access-control/custom-overview). You need a tenant with at least one Global Admin or Security Admin to create a Security Exposure Management workspace.
3260

3361
For full access, users need one of the following Microsoft Entra ID roles:
3462

3563
- **Global Admin** (read and write permissions)
36-
- **Global Reader** (read permissions)
3764
- **Security Admin** (read and write permissions)
3865
- **Security Operator** (read and limited write permissions)
66+
- **Global Reader** (read permissions)
3967
- **Security Reader** (read permissions)
4068

4169
Permission levels are summarized in the table.
@@ -73,13 +101,11 @@ You can access Security Exposure Management in the Microsoft Defender portal usi
73101

74102
You can check which sensor version a device is running as follows:
75103

76-
- On a specific device, browse to the MsSense.exe file in
104+
- On a specific device, browse to the MsSense.exe file in
77105
C:\Program Files\Windows Defender Advanced Threat Protection. Right-click the file, and select **Properties**. On the **Details** tab, check the file version.
78-
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
79-
80-
``` DeviceInfo | project DeviceName, ClientVersion ```
81-
106+
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
82107

108+
``` DeviceInfo | project DeviceName, ClientVersion ```
83109

84110
## Getting support
85111

0 commit comments

Comments
 (0)