Skip to content

Commit 86dd020

Browse files
authored
Merge pull request #4142 from MicrosoftDocs/chrisda
Update attack-simulation-training-get-started.md
2 parents 6635912 + 2d89f72 commit 86dd020

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -53,28 +53,28 @@ Watch this short video to learn more about Attack simulation training.
5353
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): You need membership in one of the following roles:
5454
- **Global Administrator**¹
5555
- **Security Administrator**
56-
- **Attack Simulation Administrators**²: Create and manage all aspects of attack simulation campaigns.
57-
- **Attack Payload Author**²: Create attack payloads that an admin can initiate later.
56+
- **Attack Simulation Administrator**²: Create and manage all aspects of attack simulation campaigns.
57+
- **Attack Payload Author**²: Create attack payloads that an admin can initiate later.
5858
- **Security Operator and Security Reader**³: View all aspects of attack simulation campaigns.
5959

6060
> [!IMPORTANT]
6161
> ¹ Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
6262
>
6363
> ² Adding users to this role group in [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md) is currently unsupported.
6464
>
65-
> Members of Attack Payload Author have the following limitations in attack simulation training:
65+
> Members of Attack Payload Author have the following limitations in attack simulation training:
6666
>
67-
> - They can't create or edit simulations, training campaigns, simulation automations, or payload automations.
68-
> - They can't change global settings.
69-
> - They can't change content (for example, notifications), but they can change payloads.
70-
> - They can't view tenant simulation reports, aggregate reports, simulation automation records, or payload automation records.
67+
> - They can't create or edit simulations, training campaigns, simulation automations, or payload automations.
68+
> - They can't change global settings.
69+
> - They can't change content (for example, notifications), but they can change payloads.
70+
> - They can't view tenant simulation reports, aggregate reports, simulation automation records, or payload automation records.
7171
>
7272
> ³ Members of Security Operator and Security Reader have the following limitations in attack simulation training:
7373
>
74-
> - They can't create or edit simulations, training campaigns, simulation automations, or payload automations.
75-
> - They can't change global settings.
76-
> - They can't change content (for example, tenant payloads or notifications).
77-
> - They can access data through read APIs with user scope, but they can't use write APIs.
74+
> - They can't create or edit simulations, training campaigns, simulation automations, or payload automations.
75+
> - They can't change global settings.
76+
> - They can't change content (for example, tenant payloads or notifications).
77+
> - They can access data through read APIs with user scope, but they can't use write APIs.
7878
7979
Currently, [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) isn't supported.
8080

0 commit comments

Comments
 (0)