You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-iot/configure-permissions.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,26 +29,26 @@ This article shows you how to make general changes to RBAC roles and permissions
29
29
There are two ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for Defender for IoT. The two systems are:
30
30
31
31
-[Global Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference).
32
-
-[Unified RBAC](/defender-xdr/custom-roles): Use unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
32
+
-[Microsoft Defender XDR Unified RBAC](/defender-xdr/custom-roles): Use Microsoft Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
33
33
34
-
The instructions and permission settings listed in this article apply to the unified RBAC version.
34
+
The instructions and permission settings listed in this article apply to Defender XDR Unified RBAC.
35
35
36
36
### RBAC for version 1 or 2 only
37
37
38
-
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of the unified version. Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-all-defender-for-iot-features), to give users access to general Defender for IoT features. However, follow the instructions listed here [for RBAC version 1](/defender-endpoint/prepare-deployment), or here [for RBAC version 2](/defender-endpoint/user-roles#permission-options).
38
+
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of Defender XDR Unified RBAC. Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-all-defender-for-iot-features), to give users access to general Defender for IoT features. However, follow the instructions listed here [for RBAC version 1](/defender-endpoint/prepare-deployment), or here [for RBAC version 2](/defender-endpoint/user-roles#permission-options).
39
39
40
40
If you're using the Defender portal for the first time, you need to set up all of your roles and permissions. For more information, see [manage portal access using role-based access control](/defender-xdr/manage-rbac).
41
41
42
-
## Unified RBAC roles for features in Defender for IoT
42
+
## Defender XDR Unified RBAC roles for features in Defender for IoT
43
43
44
44
Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-all-defender-for-iot-features), to give users access to general Defender for IoT features:
45
45
46
46
1. In the Defender portal, either:
47
-
1. Select **Settings > Microsoft XDR > Permissions and roles**.
47
+
1. Select **Settings**\>**Microsoft XDR**\>**Permissions and roles**.
1. Type a **Role name**, and select **Next** for **Permissions**.
@@ -81,7 +81,7 @@ Assign RBAC permissions and roles, based on the [summary table](#summary-of-role
81
81
82
82
To assign roles and permissions for other Microsoft Defender for Endpoint features, such as alerts, incidents and inventory, see [assign roles and permissions for Defender for Endpoint](/defender-endpoint/prepare-deployment).
83
83
84
-
For more information, see [map unified RBAC permissions](/defender-xdr/compare-rbac-roles#microsoft-entra-global-roles-access).
84
+
For more information, see [map Defender XDR Unified RBAC permissions](/defender-xdr/compare-rbac-roles#microsoft-entra-global-roles-access).
Copy file name to clipboardExpand all lines: defender-for-iot/set-up-rbac.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,21 +31,21 @@ To make general changes to RBAC roles and permissions that relate to all other a
31
31
There are two ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The two systems are:
32
32
33
33
-[Global Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference).
34
-
-[Unified RBAC](/defender-xdr/custom-roles): Use unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
34
+
-[Microsoft Defender XDR Unified RBAC](/defender-xdr/custom-roles): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
35
35
36
-
The instructions and permission settings listed in this article apply to the unified RBAC version.
36
+
The instructions and permission settings listed in this article apply to Defender XDR Unified RBAC.
37
37
38
38
### RBAC for version 1 or 2
39
39
40
-
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of the unified version. For more information, see [permissions for RBAC version 1](/defender-endpoint/prepare-deployment), or [permissions for RBAC version 2](/defender-endpoint/user-roles#permission-options).
40
+
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of Defender XDR Unified RBAC. For more information, see [permissions for RBAC version 1](/defender-endpoint/prepare-deployment), or [permissions for RBAC version 2](/defender-endpoint/user-roles#permission-options).
41
41
42
42
If you're using the Defender portal for the first time, you need to set up all of your roles and permissions. For more information, see [manage portal access using role-based access control](/defender-xdr/manage-rbac).
43
43
44
-
## Set up unified RBAC roles for site security
44
+
## Set up Defender XDR Unified RBAC roles for site security
45
45
46
46
Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-site-security), to give users access to site security features:
47
47
48
-
1. In the Defender portal, select **Settings > Microsoft XDR > Permissions and roles**.
48
+
1. In the Defender portal, select **Settings**\>**Microsoft XDR**\>**Permissions and roles**.
0 commit comments