You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/advanced-features.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -177,7 +177,7 @@ Deception enables your security team to manage and deploy lures and decoys to ca
177
177
178
178
## Share endpoint alerts with Microsoft Compliance Center
179
179
180
-
Forwards endpoint security alerts and their triage status to Microsoft Purview compliance portal, allowing you to enhance insider risk management policies with alerts and remediate internal risks before they cause harm. Forwarded data is processed and stored in the same location as your Office 365 data.
180
+
Forwards endpoint security alerts and their triage status to Microsoft Purview portal, allowing you to enhance insider risk management policies with alerts and remediate internal risks before they cause harm. Forwarded data is processed and stored in the same location as your Office 365 data.
181
181
182
182
After configuring the [Security policy violation indicators](/microsoft-365/compliance/insider-risk-management-settings#indicators) in the insider risk management settings, Defender for Endpoint alerts will be shared with insider risk management for applicable users.
Copy file name to clipboardExpand all lines: defender-endpoint/mde-plan1-getting-started.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ The navigation bar on the left side of the screen enables you to move easily bet
81
81
|**Health** > **Message center**| Navigates to the Message center in the Microsoft 365 admin center. The Message center provides information about planned changes. Each message describes what's coming, how it might affect users, and how to manage changes. |
82
82
|**Permissions & roles**| Enables you to grant permissions to use the Microsoft Defender portal. Permissions are granted through roles in Microsoft Entra ID. Select a role, and a flyout pane appears. The flyout contains a link to Microsoft Entra ID where you can add or remove members in a role group. <br/><br/> To learn more, see [Manage portal access using role-based access control](rbac.md). |
83
83
|**Settings**| Navigates to general settings for your Microsoft Defender portal (listed as **Security center**) and Defender for Endpoint (listed as **Endpoints**). <br/><br/> To learn more, see [Settings](/defender-xdr/microsoft-365-defender-portal). |
84
-
|**More resources**| Displays a list of more portals and centers, such as Microsoft Entra ID and the Microsoft Purview compliance portal. <br/><br/> To learn more, see [Microsoft security portals and admin centers](/defender-xdr/portals). |
84
+
|**More resources**| Displays a list of more portals and centers, such as Microsoft Entra ID and the Microsoft Purview portal. <br/><br/> To learn more, see [Microsoft security portals and admin centers](/defender-xdr/portals). |
85
85
86
86
> [!TIP]
87
87
> To learn more, see the [Microsoft Defender portal overview](/defender-xdr/microsoft-365-security-center-mde).
Copy file name to clipboardExpand all lines: defender-office-365/alert-policies-defender-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ appliesto:
30
30
In Microsoft 365 organizations with mailboxes in Exchange Online, alert policies generate alerts in the alert dashboard when users take actions that match the conditions of the policy. There are many default alert policies that help you monitor activities. For example, assigning admin privileges in Exchange Online, malware attacks, phishing campaigns, and unusual levels of file deletions and external sharing.
31
31
32
32
> [!TIP]
33
-
> Alert policies in the Microsoft Defender portal are identical to alert policies in the Microsoft Purview compliance portal at <https://compliance.microsoft.com/alertpolicies>.
33
+
> Alert policies in the Microsoft Defender portal are identical to alert policies in the Microsoft Purview portal at <https://purview.microsoft.com/alertpolicies>.
Copy file name to clipboardExpand all lines: defender-office-365/audit-log-search-defender-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ appliesto:
31
31
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, the unified audit log records supported user and admin operations. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in the organization. This capability provides visibility into the activities performed across your Microsoft 365 organization.
32
32
33
33
> [!TIP]
34
-
> Audit log search in Microsoft Defender portal is identical to audit log search in the Microsoft Purview compliance portal at <https://compliance.microsoft.com/auditlogsearch>.
34
+
> Audit log search in Microsoft Defender portal is identical to audit log search in the Microsoft Purview portal at <https://purview.microsoft.com/auditlogsearch>.
Copy file name to clipboardExpand all lines: defender-office-365/mdo-portal-permissions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ You need to be member of the **Global Administrator**<sup>\*</sup> role in Micro
42
42
43
43
:::image type="content" source="media/defender-xdr-rbac-permissions-page.png" alt-text="Screenshot of the Permissions page in the Microsoft Defender portal showing Microsoft Defender XDR roles and Email & Collaboration roles." lightbox="media/defender-xdr-rbac-permissions-page.png":::
44
44
45
-
- For information about permissions in the Microsoft Purview compliance portal, see [Permissions in the Microsoft Purview compliance portal](/purview/microsoft-365-compliance-center-permissions).
45
+
- For information about permissions in the Microsoft Purview portal, see [Permissions in the Microsoft Purview portal](/purview/purview-permissions).
46
46
47
47
> [!IMPORTANT]
48
48
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
@@ -65,7 +65,7 @@ On the **Permissions** page in the Defender portal at <https://security.microsof
65
65
66
66
-**Microsoft Entra roles**: You can view the roles and assigned users, but you can't manage them directly in the Microsoft Defender portal. Microsoft Entra roles are central roles that assign permissions for **all** Microsoft 365 services.
67
67
68
-
-**Email & collaboration roles**: You can view and manage these role groups directly in the Microsoft Defender portal. These permissions are specific to the Microsoft Defender portal and the Microsoft Purview compliance portal. These permissions don't cover all of the permissions that you need in other Microsoft 365 workloads.
68
+
-**Email & collaboration roles**: You can view and manage these role groups directly in the Microsoft Defender portal. These permissions are specific to the Microsoft Defender portal and the Microsoft Purview portal. These permissions don't cover all of the permissions that you need in other Microsoft 365 workloads.
69
69
70
70
:::image type="content" source="media/m365-sc-permissions-and-roles-page.png" alt-text="The Permissions & roles page in the Microsoft Defender portal" lightbox="media/m365-sc-permissions-and-roles-page.png":::
71
71
@@ -96,12 +96,12 @@ For more information, see [Assign Microsoft Entra roles to users](/entra/identit
96
96
The same role groups and roles are available in the Defender portal and in the Purview compliance portal:
97
97
98
98
-[Defender portal](https://security.microsoft.com): **Permissions**\>**Email & collaboration roles**\>**Roles** or directly at <https://security.microsoft.com/emailandcollabpermissions>
99
-
-[Purview compliance portal](https://compliance.microsoft.com): **Roles & Scopes**\>**Permissions**\>**Microsoft Purview solutions**\>**Roles** or directly at <https://compliance.microsoft.com/compliancecenterpermissions>
99
+
-[Purview compliance portal](https://purview.microsoft.com): **Roles & Scopes**\>**Permissions**\>**Microsoft Purview solutions**\>**Roles** or directly at <https://purview.microsoft.com/compliancecenterpermissions>
100
100
101
101
For complete information about these role groups, see [Roles and role groups in the Microsoft Defender XDR and Microsoft Purview compliance portals](scc-permissions.md)
102
102
103
103
> [!NOTE]
104
-
> Defender for Office 365 data that's available in the Microsoft Defender portal isn't affected by adaptive scopes that are configured in the Microsoft Purview compliance portal. For more information about adaptive scopes, see [Adaptive scopes](/purview/purview-adaptive-scopes).
104
+
> Defender for Office 365 data that's available in the Microsoft Defender portal isn't affected by adaptive scopes that are configured in the Microsoft Purview portal. For more information about adaptive scopes, see [Adaptive scopes](/purview/purview-adaptive-scopes).
105
105
106
106
The following actions are available for Email & collaboration role groups in the Defender portal:
Copy file name to clipboardExpand all lines: defender-office-365/migrate-to-defender-for-office-365-onboard.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ If your organization doesn't have a security response team or existing process f
74
74
Permissions in Defender for Office 365 are based on role-based access control (RBAC) and is explained in Permissions in the [Microsoft Defender portal](mdo-portal-permissions.md). Here are the important points to keep in mind:
75
75
76
76
- Microsoft Entra roles give permissions to **all** workloads in Microsoft 365. For example, if you add a user to the Security Administrator in the Azure portal, they have Security Administrator permissions everywhere.
77
-
- Email & collaboration roles in the Microsoft Defender portal give permissions to the Microsoft Defender portal and the Microsoft Purview compliance portal. For example, if you add a user to Security Administrator in the Microsoft Defender portal, they have Security Administrator access **only** in the Microsoft Defender portal and the Microsoft Purview compliance portal.
77
+
- Email & collaboration roles in the Microsoft Defender portal give permissions to the Microsoft Defender portal and the Microsoft Purview portal. For example, if you add a user to Security Administrator in the Microsoft Defender portal, they have Security Administrator access **only** in the Microsoft Defender portal and the Microsoft Purview portal.
78
78
- Many features in the Microsoft Defender portal are based on Exchange Online PowerShell cmdlets and therefore require role group membership in the corresponding roles (technically, role groups) in Exchange Online (in particular, for access to the corresponding Exchange Online PowerShell cmdlets).
79
79
- There are Email & collaboration roles in the Microsoft Defender portal that have no equivalent to Microsoft Entra roles, and are important for security operations (for example the Preview role and the Search and Purge role).
Copy file name to clipboardExpand all lines: defender-office-365/quarantine-admin-manage-messages-files.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -539,7 +539,7 @@ Admins can search the audit log to find events for messages that were deleted fr
539
539
1. In the Defender portal at <https://security.microsoft.com>, go to **Audit**. Or, to go directly to the **Audit** page, use <https://security.microsoft.com/auditlogsearch>.
540
540
541
541
> [!TIP]
542
-
> You can also get to the **Audit** page in the Microsoft Purview compliance portal at <https://compliance.microsoft.com/auditlogsearch>
542
+
> You can also get to the **Audit** page in the Microsoft Purview portal at <https://purview.microsoft.com/auditlogsearch>
543
543
544
544
2. On the **Audit** page, verify that the **New Search** tab is selected, and then configure the following settings:
Copy file name to clipboardExpand all lines: defender-office-365/responding-to-a-compromised-email-account.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,7 +180,7 @@ For more information, see the following articles:
180
180
181
181
-[List Azure role assignments using the Azure portal](/azure/role-based-access-control/role-assignments-list-portal)
182
182
-[List Microsoft Entra role assignments](/entra/identity/role-based-access-control/view-assignments?tabs=admin-center#list-role-assignments-for-a-user)
183
-
-[Permissions in the Microsoft Purview compliance portal](/purview/purview-compliance-portal-permissions)
183
+
-[Permissions in the Microsoft Purview portal](/purview/purview-compliance-portal-permissions)
184
184
-[Microsoft Defender for Office 365 permissions in the Microsoft Defender portal](/defender-office-365/mdo-portal-permissions)
0 commit comments