Skip to content

Commit c6fe147

Browse files
committed
fix steps
1 parent 2c005be commit c6fe147

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

ATPDocs/configure-scoped-access.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,16 @@ To enable identity scoping, follow these steps:​
2929
:::image type="content" source="media/custom-roles/permissions-roles.png" alt-text="Screenshot showing the roles page in the Defender XDR portal":::
3030

3131
1. Select **+ Create custom role** and follow the instructions in [Create custom roles with Microsoft Defender XDR Unified RBAC](/defender-xdr/create-custom-rbac-roles#create-a-custom-role)
32-
1. In the **Authorization and settings** step, select **Select custom permissions**.
32+
3333
:::image type="content" source="media/custom-roles/create-custom-role.png" alt-text="Screenshot showing the create custom roles button":::
34+
35+
1. In the **Authorization and settings** step, select **Select custom permissions**.
36+
3437
1. During the role creation process:
3538
1. Under **Assign users and groups**, enter the usernames or Microsoft Entra ID groups you want to assign to the role.
3639
1. Select Microsoft Defender for Identity as the data source.
3740
1. Under **Scope**, select the user groups (AD domains) or Microsoft Entra ID groups that will be scoped to the assignment.
38-
39-
    :::image type="content" source="media/custom-roles/add-assignment.png" alt-text="Screenshot showing how to add Defender for Identity to your scoping role":::
41+
:::image type="content" source="media/custom-roles/add-assignment.png" alt-text="Screenshot showing how to add Defender for Identity to your scoping role":::
4042
1. Select Add.
4143
1. You can edit the role at any time. Select the role from the list of custom roles and choose **Edit**.
4244

0 commit comments

Comments
 (0)