Skip to content

Commit 957c691

Browse files
authored
Merge pull request #5419 from MicrosoftDocs/chrisda
Update tenant-allow-block-list-teams-domains-configure.md
2 parents 037c3f0 + c395ba4 commit 957c691

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

defender-office-365/tenant-allow-block-list-teams-domains-configure.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,9 @@ This article describes how security admins can manage entries for blocked domain
5151
- An entry should be active within 24 hours.
5252

5353
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
54-
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**<sup>\*</sup>, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions *and* permissions for other features in Microsoft 365.
54+
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
55+
- _Add, modify, and delete entries_: Membership in the **Global Administrator**<sup>\*</sup>, **Teams Administrator**, **Security Administrator**, or **Security Operator** roles.
56+
- _Read-only access to entries_: **Global Reader**, or **Security Reader** roles.
5557

5658
> [!IMPORTANT]
5759
> <sup>\*</sup> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you should limit to emergency scenarios or when you can't use a different role.

0 commit comments

Comments
 (0)