Skip to content

Commit cc4a4e2

Browse files
committed
updating screenshots
1 parent 7c6b349 commit cc4a4e2

File tree

8 files changed

+119
-137
lines changed

8 files changed

+119
-137
lines changed

.openpublishing.redirection.unified-secops.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"redirections": [
33
{
44
"source_path": "unified-secops-platform/mto-tenant-groups.md",
5-
"redirect_url": "mto-distribution-profiles",
5+
"redirect_url": "mto-deployment-profiles",
66
"redirect_document_id": false
77
}
88
]

unified-secops-platform/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@
111111
- name: Create and manage endpoint security policies
112112
href: mto-endpoint-security-policy.md
113113
- name: Manage content distribution with profiles
114-
href: mto-distribution-profiles.md
114+
href: mto-deployment-profiles.md
115115
- name: Manage tenants in other Microsoft clouds
116116
href: mto-cross-cloud.md
117117
- name: Manage unified role-based access control (URBAC) for multitenant management
213 KB
Loading

unified-secops-platform/mto-cross-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ To remove tenants from the list, select the tenant, then select **Remove tenants
122122
After successfully adding tenants from other clouds, you can view these tenants in other multitenant pages like the incidents and device inventory pages.
123123

124124
> [!NOTE]
125-
> When a cross-cloud tenant is added to a distribution profile and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won’t be available for content management. This is a recognized limitation of cross-cloud visibility and is currently under review. See [Troubleshooting issues](mto-troubleshoot.md#content-assignment-failure-in-cross-cloud-tenant-management) for more information.
125+
> When a cross-cloud tenant is added to a deployment profile and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won’t be available for content management. This is a recognized limitation of cross-cloud visibility and is currently under review. See [Troubleshooting issues](mto-troubleshoot.md#content-assignment-failure-in-cross-cloud-tenant-management) for more information.
126126
127127
## Next steps
128128

Lines changed: 108 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,108 @@
1+
---
2+
title: Content distribution using deployment profiles in multitenant management
3+
description: Overview of content distribution through deployment profiles in multitenant management in Microsoft Defender XDR.
4+
ms.service: unified-secops-platform
5+
ms.author: bagol
6+
author: batamig
7+
ms.localizationpriority: medium
8+
manager: orspodek
9+
audience: ITPro
10+
ms.collection:
11+
- m365-security
12+
- highpri
13+
- tier1
14+
ms.topic: conceptual
15+
ms.date: 06/03/2025
16+
appliesto:
17+
- ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
18+
---
19+
20+
# Content distribution in multitenant management
21+
22+
Content distribution helps you manage content at scale, across tenants in the Microsoft Defender multitenant portal. In content distribution, you can create deployment profiles to copy existing content, like custom detection rules, from the source tenant to the target tenants you assign during deployment profile creation. The content then runs on the target tenant's devices or device groups that you set in the deployment profile scope.
23+
24+
Distributing content in this manner, across tenants, enables you to organize tenants and content based on categories like business groups or location.
25+
26+
> [!NOTE]
27+
> Multitenant management currently supports adding custom detection rules to a deployment profile. Additional content types will be added in the future.
28+
29+
## Requirements
30+
31+
The following table lists the requirements for content distribution in multitenant management in Microsoft Defender XDR.
32+
33+
| Requirement | Description |
34+
|:---|:---|
35+
|Microsoft Defender XDR license |To use content distribution, your organization must have a subscription to Microsoft 365 E5 or Office E5.|
36+
|Permissions |Users must be assigned the correct roles and permission at the individual tenant level to view and manage the associated data in multitenant management. <br/> Access to content distribution is granted through the Security settings (manage) or Security Data Basic (read) permission in [Microsoft 365 Defender Unified role-based access control (URBAC)](/defender-xdr/manage-rbac). Both of these roles are assigned to the Security Administrator and Security Reader Microsoft Entra built-in roles by default.|
37+
|Delegate access |Delegated access via [Azure B2B](/entra/external-id/add-users-administrator) or [GDAP (CSP Parters only)](/microsoft-365/lighthouse/m365-lighthouse-setup-gdap) must be obtained for at least one other tenant.|
38+
39+
## Create deployment profiles
40+
41+
To create a new deployment profile:
42+
43+
1. In the Microsoft Defender multitenant portal, select **Multi-tenant management > Deployment profiles > Create deployment profile**.
44+
45+
1. In the **Create deployment profile** wizard, on the **Details** page, enter a name and an option description for your deployment profile, then select **Next**.
46+
47+
1. In the **Assign tenants** page, select **Add tenant** to see a list of available tenants that you can add to your deployment profile. Select the tenants from those listed in the side pane that you want to add to your deployment profile, and then select **Add**. When you're satisfied with the tenants listed on the **Assign tenants** page, select **Next**.
48+
49+
1. On the **Content selection** page, select the content to be distributed across all tenants in your deployment profile, such as endpoint security policies, custom detection rules, and unified RBAC roles. When you're done, select **Next**.
50+
51+
The next few pages depend on the content types you've selected. Follow the wizard's instructions to add specific content to the deployment profile for distribution, including defining any groups or role assignments as requested. Continue selecting **Next** to continue.
52+
53+
1. On the **Summary** page, review the details of the deployment profile you created. Leave the **Sync all authorized tenants** option checked if content needs to be synchronized now or clear the check it if the sync is planned for a later time.
54+
55+
When you're done, select **Submit** to finish your deployment profile creation.
56+
57+
> [!IMPORTANT]
58+
> If you choose to **Sync all authorized tenants**, all the tenants and scope within the tenants you have permission automatically syncs.
59+
60+
Your newly created deployment profile appears in the deployment profiles page after creation. Select the deployment profile from the list to add or remove content, add, edit, or remove tenants, or sync the deployment profile.
61+
62+
Check the sync results under the **Last sync result** column. If the result is *partially successful* or *failed*, select the result to investigate the cause. When selecting the result, a side pane containing the errors, recommendations, and impacted assets appears.
63+
64+
> [!NOTE]
65+
> The maximum number of published items per publish operation is 9,500. Published items are calculated as the number of tenants multiplied by the number of templates. For example, if you publish 10 deployment profiles with 10 target tenants and 95 content templates, then the published items equals to 9,500.
66+
67+
## Syncing content among deployment profiles
68+
69+
To sync content across deployment profiles for the tenants you have permission for:
70+
71+
1. Go to the [deployment profiles page](https://mto.security.microsoft.com/tenantgroups).
72+
2. Select the checkbox next to the deployment profile you want to sync, then select **Sync deployment profile**.
73+
3. Select **Sync** on the prompt that appears.
74+
4. Once the sync is completed, you see one of the following statuses:
75+
- Success
76+
- Partially successful
77+
- Failure
78+
79+
5. If you experience a partial success or failure, select the value in the **Last sync result** column to investigate the cause.
80+
81+
Sync results show the number of synced tenants and content. Synced tenants indicate how many tenants had custom detection rules applied successfully. For example, if all rules are applied in 3 out of 3 tenants, the count is 3; if only 2 tenants succeed, the count is 2. Synced content represents the total custom detection rules synced across all target tenants.
82+
83+
## Edit deployment profiles
84+
85+
1. Go to the [deployment profiles page](https://mto.security.microsoft.com/tenantgroups).
86+
2. Select the checkboxes next to the deployment profile you want to edit, then select **Edit deployment profile**.
87+
3. Edit the deployment profile name and description, then select **Save**.
88+
89+
## Remove deployment profiles
90+
91+
1. Go to the [**Deployment profiles** page](https://mto.security.microsoft.com/tenantgroups).
92+
2. Select the checkboxes next to the deployment profile you want to remove, then select **Remove deployment profile**.
93+
94+
## Troubleshooting
95+
96+
Common reasons for a sync to fail include:
97+
98+
- User doesn't have permission to create custom detection rules on the target tenant.
99+
- User doesn't have permission to read custom detection rules from **content source**.
100+
- User doesn't have permission for the target device scope.
101+
102+
If the issue is with the target tenant, try creating an identical custom detection rule for further diagnosis. If the issue is with accessing the source data, try accessing the custom detection.
103+
104+
## Additional resources
105+
106+
- [Create and manage custom detections rules](/defender-xdr/custom-detection-rules)
107+
- [Add Microsoft Entra B2B collaboration users in the Microsoft Entra admin center](/entra/external-id/add-users-administrator)
108+
- [Set up GDAP for your customers in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-setup-gdap)

unified-secops-platform/mto-distribution-profiles.md

Lines changed: 0 additions & 129 deletions
This file was deleted.

unified-secops-platform/mto-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,11 +51,11 @@ Here’s an example of the policy setting in the Microsoft Entra admin center.
5151

5252
## Content assignment failure in cross-cloud tenant management
5353

54-
You see the following error when assigning content to distribution profiles:
54+
You see the following error when assigning content to deployment profiles:
5555

5656
:::image type="content" source="media/mto-troubleshoot/tenant-perms-error-small.png" alt-text="Screenshot of permissions error when assigning content to tenants" lightbox="media/mto-troubleshoot/tenant-perms-error.png":::
5757

58-
When a cross-cloud tenant is added to a distribution profile and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won't be available for content management, which causes the error. This is a recognized limitation of cross-cloud tenant management and is currently under review.
58+
When a cross-cloud tenant is added to a deployment profile and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won't be available for content management, which causes the error. This is a recognized limitation of cross-cloud tenant management and is currently under review.
5959

6060
## Related content
6161

0 commit comments

Comments
 (0)