You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/prerequisites.md
+41-15Lines changed: 41 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlanger
6
6
manager: rayne-wiselman
7
7
ms.topic: overview
8
8
ms.service: exposure-management
9
-
ms.date: 09/16/2024
9
+
ms.date: 11/11/2024
10
10
---
11
11
12
12
# Prerequisites and support
@@ -19,23 +19,51 @@ Security Exposure Management is currently in public preview.
19
19
20
20
## Permissions
21
21
22
-
Permissions are based on [Microsoft Entra ID Roles](/entra/identity/role-based-access-control/custom-overview). You need a tenant with at least one Global Admin or Security Admin to create a Security Exposure Management workspace.
22
+
> [!IMPORTANT]
23
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization.
24
+
> Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
23
25
24
-
- For full Security Exposure Management access, user roles need access to all Defender for Endpoint [device groups](/microsoft-365/security//defender-endpoint/machine-groups).
25
-
- Users who have access restricted to some of the organization's device groups (and not to all), can:
26
-
- Access global exposure insights data.
27
-
- View affected assets under metrics, recommendations, events, and initiatives history only within users' scope
28
-
- View devices in attack paths that are within the users' scope
29
-
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups to which they have access
26
+
## Manage permissions with Microsoft Defender XDR Unified role-based access control (RBAC)
30
27
31
-
### Permissions for Security Exposure Management tasks
28
+
[Microsoft Defender XDR Unified role-based access control(RBAC)](/defender-xdr/manage-rbac) allows you to create custom roles with specific permissions for Exposure Management. These permissions are located under the **Security posture** category in Defender XDR Unified RBAC permissions model and are named:
29
+
30
+
-**Exposure Management (read)** for read-only access
31
+
-**Exposure Management (manage)** for access to manage Exposure Management experiences
32
+
33
+
For more sensitive actions in Exposure Management, users need the **Core security settings (manage)** permission which is located under the **Authorization and settings** category.
34
+
35
+
To access Exposure Management data and actions, a custom role in Defender XDR Unified RBAC with any of the permissions mentioned here, shall be assigned to the **Microsoft Security Exposure Management** data source.
36
+
37
+
To learn more about using Microsoft Defender XDR Unified RBAC to manage your Secure Score permissions, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac).
38
+
39
+
The following table highlights what a user can access or perform with each of the permissions:
40
+
41
+
|Permission name|Actions|
42
+
| -------- | -------- |
43
+
|**Exposure Management (read)**|Access to all Exposure Management experiences and read access to all available data|
44
+
|**Exposure Management (manage)**|In addition to the read access, the user can set initiative target score, edit metric values, manage recommendations (might require additional permissions related to the specific actions needed to be taken)|
45
+
|**Core security settings (manage)**|Connect or change vendor to the External Attack Surface Management initiative|
46
+
47
+
For full Microsoft Security Exposure Management access, user roles need access to all Defender for Endpoint [device groups](/microsoft-365/security//defender-endpoint/machine-groups).
48
+
Users with restricted access to some of the organization's device groups can:
49
+
50
+
- Access global exposure insights data.
51
+
- View affected assets under metrics, recommendations, events, and initiatives history only within their scope.
52
+
- View devices in attack paths that are within their scope.
53
+
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups they have access to.
54
+
55
+
> [!NOTE]
56
+
> Access with manage permissions to **Critical asset management**, under **System \ Settings \ Microsoft Defender XDR** requires users to have access to all Defender for Endpoint device groups.
57
+
## Access with Microsoft Entra ID roles
58
+
59
+
An alternative to managing access with Microsoft Defender XDR Unified RBAC permissions, access to Microsoft Security Exposure Management data and actions is also possible with [Microsoft Entra ID Roles](/entra/identity/role-based-access-control/custom-overview). You need a tenant with at least one Global Admin or Security Admin to create a Security Exposure Management workspace.
32
60
33
61
For full access, users need one of the following Microsoft Entra ID roles:
34
62
35
63
-**Global Admin** (read and write permissions)
36
-
-**Global Reader** (read permissions)
37
64
-**Security Admin** (read and write permissions)
38
65
-**Security Operator** (read and limited write permissions)
66
+
-**Global Reader** (read permissions)
39
67
-**Security Reader** (read permissions)
40
68
41
69
Permission levels are summarized in the table.
@@ -73,13 +101,11 @@ You can access Security Exposure Management in the Microsoft Defender portal usi
73
101
74
102
You can check which sensor version a device is running as follows:
75
103
76
-
- On a specific device, browse to the MsSense.exe file in
104
+
- On a specific device, browse to the MsSense.exe file in
77
105
C:\Program Files\Windows Defender Advanced Threat Protection. Right-click the file, and select **Properties**. On the **Details** tab, check the file version.
78
-
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
0 commit comments