Skip to content

Commit b4a3a15

Browse files
authored
Merge pull request #413 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/defender-docs (branch public)
2 parents b55198f + c4da060 commit b4a3a15

File tree

1 file changed

+11
-5
lines changed

1 file changed

+11
-5
lines changed

defender-xdr/m365d-action-center.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,12 @@ For example:
4545
- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
4646
- If you were already using the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).
4747

48-
The unified Action center brings together remediation actions across Defender for Endpoint and Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
48+
The unified Action center brings together remediation actions across Microsoft Defender for Endpoint and Microsoft Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
4949

5050
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
5151

52-
- [Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
53-
- [Defender for Office 365](/defender-office-365/mdo-about)
52+
- [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
53+
- [Microsoft Defender for Office 365](/defender-office-365/mdo-about)
5454
- [Microsoft Defender XDR](microsoft-365-defender.md)
5555

5656
> [!TIP]
@@ -123,21 +123,27 @@ To perform tasks, such as approving or rejecting pending actions in the Action c
123123

124124
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
125125
- _Microsoft Defender for Endpoint remediation (devices)_: Membership in the **Security Administrator** role.
126-
- _Defender for Office 365 remediation (Office content and email)_:
126+
- _Microsoft Defender for Office 365 remediation (Office content and email)_:
127127
- Membership in the **Security Administrator** role.
128128

129129
_and_
130130

131131
- Membership in a role group in [Email & collaboration permissions](/defender-office-365/mdo-portal-permissions) with the **Search and Purge** role assigned. By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups in Email & collaboration permissions. You can add users to those role groups, or you can [create a new role group in Email & collaboration permissions](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
132132

133133
- [Email & collaboration permissions in the Microsoft Defender portal](/defender-office-365/mdo-portal-permissions):
134-
- _Defender for Office 365 remediation (Office content and email)_:
134+
- _Microsoft Defender for Office 365 remediation (Office content and email)_:
135135
- Membership in the **Security Administrator** role group
136136

137137
_and_
138138

139139
- Membership in a role group in [Email & collaboration permissions](/defender-office-365/mdo-portal-permissions) with the **Search and Purge** role assigned. By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups in Email & collaboration permissions. You can add users to those role groups, or you can [create a new role group in Email & collaboration permissions](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
140140

141+
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac)
142+
- _Microsoft Defender for Endpoint remediation_: **Security operations \ Security data \ Response (manage)**.
143+
- _Microsoft Defender for Office 365 remediation_ (Office content and email, if **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="/defender-office-365/media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
144+
- _Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
145+
- _Remediate malicious email_: **Security operations/Security data/Email & collaboration advanced actions (manage)**.
146+
141147
> [!TIP]
142148
> Membership in the **Security Administrator** role group Email & collaboration permissions doesn't grant access to the Action center or Microsoft Defender XDR capabilities. For those, you need to be a member of the **Security Administrator** role in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
143149

0 commit comments

Comments
 (0)