Skip to content

Commit 8960ede

Browse files
authored
Merge pull request #1194 from MicrosoftDocs/chrisda
Unified RBAC updates per email request
2 parents 9f87b93 + f52ece8 commit 8960ede

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

defender-for-iot/configure-permissions.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -29,26 +29,26 @@ This article shows you how to make general changes to RBAC roles and permissions
2929
There are two ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for Defender for IoT. The two systems are:
3030

3131
- [Global Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference).
32-
- [Unified RBAC](/defender-xdr/custom-roles): Use unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
32+
- [Microsoft Defender XDR Unified RBAC](/defender-xdr/custom-roles): Use Microsoft Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
3333

34-
The instructions and permission settings listed in this article apply to the unified RBAC version.
34+
The instructions and permission settings listed in this article apply to Defender XDR Unified RBAC.
3535

3636
### RBAC for version 1 or 2 only
3737

38-
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of the unified version. Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-all-defender-for-iot-features), to give users access to general Defender for IoT features. However, follow the instructions listed here [for RBAC version 1](/defender-endpoint/prepare-deployment), or here [for RBAC version 2](/defender-endpoint/user-roles#permission-options).
38+
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of Defender XDR Unified RBAC. Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-all-defender-for-iot-features), to give users access to general Defender for IoT features. However, follow the instructions listed here [for RBAC version 1](/defender-endpoint/prepare-deployment), or here [for RBAC version 2](/defender-endpoint/user-roles#permission-options).
3939

4040
If you're using the Defender portal for the first time, you need to set up all of your roles and permissions. For more information, see [manage portal access using role-based access control](/defender-xdr/manage-rbac).
4141

42-
## Unified RBAC roles for features in Defender for IoT
42+
## Defender XDR Unified RBAC roles for features in Defender for IoT
4343

4444
Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-all-defender-for-iot-features), to give users access to general Defender for IoT features:
4545

4646
1. In the Defender portal, either:
47-
1. Select **Settings > Microsoft XDR > Permissions and roles**.
47+
1. Select **Settings** \> **Microsoft XDR** \> **Permissions and roles**.
4848
1. Enable **Endpoints & Vulnerability Management**.
4949
1. Select **Go to Permissions and roles**.
5050

51-
1. Select **Permissions > Microsft Defender XDR (1) > Roles**.
51+
1. Select **Permissions** \> **Microsft Defender XDR (1)** \> **Roles**.
5252

5353
1. Select **Create custom role**.
5454
1. Type a **Role name**, and select **Next** for **Permissions**.
@@ -81,7 +81,7 @@ Assign RBAC permissions and roles, based on the [summary table](#summary-of-role
8181

8282
To assign roles and permissions for other Microsoft Defender for Endpoint features, such as alerts, incidents and inventory, see [assign roles and permissions for Defender for Endpoint](/defender-endpoint/prepare-deployment).
8383

84-
For more information, see [map unified RBAC permissions](/defender-xdr/compare-rbac-roles#microsoft-entra-global-roles-access).
84+
For more information, see [map Defender XDR Unified RBAC permissions](/defender-xdr/compare-rbac-roles#microsoft-entra-global-roles-access).
8585

8686
## Next steps
8787

defender-for-iot/set-up-rbac.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,21 +31,21 @@ To make general changes to RBAC roles and permissions that relate to all other a
3131
There are two ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The two systems are:
3232

3333
- [Global Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference).
34-
- [Unified RBAC](/defender-xdr/custom-roles): Use unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
34+
- [Microsoft Defender XDR Unified RBAC](/defender-xdr/custom-roles): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
3535

36-
The instructions and permission settings listed in this article apply to the unified RBAC version.
36+
The instructions and permission settings listed in this article apply to Defender XDR Unified RBAC.
3737

3838
### RBAC for version 1 or 2
3939

40-
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of the unified version. For more information, see [permissions for RBAC version 1](/defender-endpoint/prepare-deployment), or [permissions for RBAC version 2](/defender-endpoint/user-roles#permission-options).
40+
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of Defender XDR Unified RBAC. For more information, see [permissions for RBAC version 1](/defender-endpoint/prepare-deployment), or [permissions for RBAC version 2](/defender-endpoint/user-roles#permission-options).
4141

4242
If you're using the Defender portal for the first time, you need to set up all of your roles and permissions. For more information, see [manage portal access using role-based access control](/defender-xdr/manage-rbac).
4343

44-
## Set up unified RBAC roles for site security
44+
## Set up Defender XDR Unified RBAC roles for site security
4545

4646
Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-site-security), to give users access to site security features:
4747

48-
1. In the Defender portal, select **Settings > Microsoft XDR > Permissions and roles**.
48+
1. In the Defender portal, select **Settings** \> **Microsoft XDR** \> **Permissions and roles**.
4949
1. Enable **Endpoints & Vulnerability Management**.
5050
1. Select **Go to Permissions and roles**.
5151
1. Select **Create custom role**.

0 commit comments

Comments
 (0)