Skip to content

Commit 8bd5ef4

Browse files
committed
Update compare-rbac-roles.md
1 parent 3515c39 commit 8bd5ef4

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

defender-xdr/compare-rbac-roles.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: reference
15-
ms.date: 04/11/2024
15+
ms.date: 06/27/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -34,6 +34,9 @@ This article describes how existing roles and permissions in Microsoft Defender
3434
- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/p/?linkid=2229011)
3535
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
3636

37+
> [!IMPORTANT]
38+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
39+
3740
<a name='map-microsoft-365-defender-unified-rbac-permissions-to-existing-rbac-permissions'></a>
3841

3942
## Map Microsoft Defender XDR Unified RBAC permissions to existing RBAC permissions

0 commit comments

Comments
 (0)