Skip to content

Commit 7b05431

Browse files
committed
Update grant-mssp-access.md
1 parent 91b3ed6 commit 7b05431

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

defender-endpoint/grant-mssp-access.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -30,17 +30,17 @@ ms.date: 12/18/2020
3030
3131
To implement a multitenant delegated access solution, take the following steps:
3232

33-
1. Enable [role-based access control](rbac.md) in Defender for Endpoint and connect with Active Directory (AD) groups.
33+
1. Enable [role-based access control](rbac.md) in Defender for Endpoint and connect with Microsoft Entra ID groups.
3434

3535
2. Configure [Governance Access Packages](/azure/active-directory/governance/identity-governance-overview) for access request and provisioning.
3636

3737
3. Manage access requests and audits in [Microsoft MyAccess](/azure/active-directory/governance/entitlement-management-request-approve).
3838

3939
## Enable role-based access controls in Microsoft Defender for Endpoint
4040

41-
1. **Create access groups for MSSP resources in Customer AAD: Groups**
41+
1. **Create access groups for MSSP resources in Customer Entra ID: Groups**
4242

43-
These groups are linked to the Roles you create in Defender for Endpoint. To do so, in the customer AD tenant, create three groups. In our example approach, we create the following groups:
43+
These groups are linked to the Roles you create in Defender for Endpoint. To do so, in the customer Entra ID tenant, create three groups. In our example approach, we create the following groups:
4444

4545
- Tier 1 Analyst
4646
- Tier 2 Analyst
@@ -60,29 +60,29 @@ To implement a multitenant delegated access solution, take the following steps:
6060

6161
## Configure Governance Access Packages
6262

63-
1. **Add MSSP as Connected Organization in Customer AAD: Identity Governance**
63+
1. **Add MSSP as Connected Organization in Customer Entra ID: Identity Governance**
6464

65-
Adding the MSSP as a connected organization allows the MSSP to request and have accesses provisioned.
65+
Adding the MSSP as a connected organization allows the MSSP to request and have access provisioned.
6666

67-
To do so, in the customer AD tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. We suggest creating a separate AD tenant for your MSSP Analysts.
67+
To do so, in the customer Entra ID tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. We suggest creating a separate Entra ID tenant for your MSSP Analysts.
6868

69-
2. **Create a resource catalog in Customer AAD: Identity Governance**
69+
2. **Create a resource catalog in Customer Entra ID: Identity Governance**
7070

71-
Resource catalogs are a logical collection of access packages, created in the customer AD tenant.
71+
Resource catalogs are a logical collection of access packages, created in the customer Entra ID tenant.
7272

73-
To do so, in the customer AD tenant, access Identity Governance: Catalogs, and add **New Catalog**. In our example, it's called, **MSSP Accesses**.
73+
To do so, in the customer Entra ID tenant, access Identity Governance: Catalogs, and add **New Catalog**. In our example, it's called, **MSSP Accesses**.
7474

7575
:::image type="content" source="media/goverance-catalog.png" alt-text="The new catalog page" lightbox="media/goverance-catalog.png":::
7676

7777
Further more information, see [Create a catalog of resources](/azure/active-directory/governance/entitlement-management-catalog-create).
7878

79-
3. **Create access packages for MSSP resources Customer AAD: Identity Governance**
79+
3. **Create access packages for MSSP resources Customer Entra ID: Identity Governance**
8080

8181
Access packages are the collection of rights and accesses that a requestor is granted upon approval.
8282

83-
To do so, in the customer AD tenant, access Identity Governance: Access Packages, and add **New Access Package**. Create an access package for the MSSP approvers and each analyst tier. For example, the following Tier 1 Analyst configuration creates an access package that:
83+
To do so, in the customer Entra ID tenant, access Identity Governance: Access Packages, and add **New Access Package**. Create an access package for the MSSP approvers and each analyst tier. For example, the following Tier 1 Analyst configuration creates an access package that:
8484

85-
- Requires a member of the AD group **MSSP Analyst Approvers** to authorize new requests
85+
- Requires a member of the Entra ID group **MSSP Analyst Approvers** to authorize new requests
8686
- Has annual access reviews, where the SOC analysts can request an access extension
8787
- Can only be requested by users in the MSSP SOC Tenant
8888
- Access auto expires after 365 days
@@ -92,7 +92,7 @@ To implement a multitenant delegated access solution, take the following steps:
9292
9393
For more information, see [Create a new access package](/azure/active-directory/governance/entitlement-management-access-package-create).
9494

95-
4. **Provide access request link to MSSP resources from Customer AAD: Identity Governance**
95+
4. **Provide access request link to MSSP resources from Customer Entra ID: Identity Governance**
9696

9797
The My Access portal link is used by MSSP SOC analysts to request access via the access packages created. The link is durable, meaning the same link may be used over time for new analysts. The analyst request goes into a queue for approval by the **MSSP Analyst Approvers**.
9898

0 commit comments

Comments
 (0)