You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/m365d-action-center.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,12 +45,12 @@ For example:
45
45
- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
46
46
- If you were already using the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).
47
47
48
-
The unified Action center brings together remediation actions across Defender for Endpoint and Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
48
+
The unified Action center brings together remediation actions across Microsoft Defender for Endpoint and Microsoft Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
49
49
50
50
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
51
51
52
-
-[Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
53
-
-[Defender for Office 365](/defender-office-365/mdo-about)
52
+
-[Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
53
+
-[Microsoft Defender for Office 365](/defender-office-365/mdo-about)
@@ -123,21 +123,27 @@ To perform tasks, such as approving or rejecting pending actions in the Action c
123
123
124
124
-[Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
125
125
-_Microsoft Defender for Endpoint remediation (devices)_: Membership in the **Security Administrator** role.
126
-
-_Defender for Office 365 remediation (Office content and email)_:
126
+
-_Microsoft Defender for Office 365 remediation (Office content and email)_:
127
127
- Membership in the **Security Administrator** role.
128
128
129
129
_and_
130
130
131
131
- Membership in a role group in [Email & collaboration permissions](/defender-office-365/mdo-portal-permissions) with the **Search and Purge** role assigned. By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups in Email & collaboration permissions. You can add users to those role groups, or you can [create a new role group in Email & collaboration permissions](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
132
132
133
133
-[Email & collaboration permissions in the Microsoft Defender portal](/defender-office-365/mdo-portal-permissions):
134
-
-_Defender for Office 365 remediation (Office content and email)_:
134
+
-_Microsoft Defender for Office 365 remediation (Office content and email)_:
135
135
- Membership in the **Security Administrator** role group
136
136
137
137
_and_
138
138
139
139
- Membership in a role group in [Email & collaboration permissions](/defender-office-365/mdo-portal-permissions) with the **Search and Purge** role assigned. By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups in Email & collaboration permissions. You can add users to those role groups, or you can [create a new role group in Email & collaboration permissions](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
140
140
141
+
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac)
142
+
-_Microsoft Defender for Endpoint remediation_: **Security operations \ Security data \ Response (manage)**.
143
+
-_Microsoft Defender for Office 365 remediation_ (Office content and email, if **Email & collaboration**\>**Defender for Office 365** permissions is :::image type="icon" source="/defender-office-365/media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
144
+
-_Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
> Membership in the **Security Administrator** role group Email & collaboration permissions doesn't grant access to the Action center or Microsoft Defender XDR capabilities. For those, you need to be a member of the **Security Administrator** role in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
0 commit comments