Skip to content

Commit cd2f5d9

Browse files
committed
validating procedure
2 parents f6f3274 + 5d8a525 commit cd2f5d9

10 files changed

+132
-129
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -191,6 +191,8 @@
191191
".openpublishing.redirection.defender-cloud-apps.json",
192192
".openpublishing.redirection.defender-endpoint.json",
193193
".openpublishing.redirection.defender-office-365.json",
194-
".openpublishing.redirection.defender-xdr.json"
194+
".openpublishing.redirection.defender-xdr.json",
195+
".openpublishing.redirection.unified-secops.json"
196+
195197
]
196198
}
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "unified-secops-platform/mto-tenantgroups.md",
5+
"redirect_url": "mto-distribution-profiles",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

unified-secops-platform/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,8 +113,8 @@
113113
href: mto-tenants.md
114114
- name: Create and manage endpoint security policies
115115
href: mto-endpoint-security-policy.md
116-
- name: Manage content distribution with tenant groups
117-
href: mto-tenantgroups.md
116+
- name: Manage content distribution with profiles
117+
href: mto-deployment-profiles.md
118118
- name: Manage tenants in other Microsoft clouds
119119
href: mto-cross-cloud.md
120120
- name: Manage unified role-based access control (URBAC) for multitenant management
206 KB
Loading
-13.4 KB
Loading

unified-secops-platform/mto-cross-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ To remove tenants from the list, select the tenant, then select **Remove tenants
122122
After successfully adding tenants from other clouds, you can view these tenants in other multitenant pages like the incidents and device inventory pages.
123123

124124
> [!NOTE]
125-
> When a cross-cloud tenant is added to a tenant group and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won’t be available for content management. This is a recognized limitation of cross-cloud visibility and is currently under review. See [Troubleshooting issues](mto-troubleshoot.md#content-assignment-failure-in-cross-cloud-tenant-management) for more information.
125+
> When a cross-cloud tenant is added to a deployment profile and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won’t be available for content management. This is a recognized limitation of cross-cloud visibility and is currently under review. See [Troubleshooting issues](mto-troubleshoot.md#content-assignment-failure-in-cross-cloud-tenant-management) for more information.
126126
127127
## Next steps
128128

Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
---
2+
title: Content distribution using distribution profiles in multitenant management
3+
description: Learn about content distribution across tenants in the Microsoft Defender multitenant portal.
4+
ms.service: unified-secops-platform
5+
ms.author: bagol
6+
author: batamig
7+
ms.localizationpriority: medium
8+
manager: orspodek
9+
audience: ITPro
10+
ms.collection:
11+
- m365-security
12+
- highpri
13+
- tier1
14+
ms.topic: concept-article
15+
ms.date: 07/31/2025
16+
appliesto:
17+
- Microsoft Defender XDR
18+
- Microsoft Sentinel in the Microsoft Defender portal
19+
---
20+
21+
# Content distribution in multitenant management
22+
23+
Content distribution in the Microsoft Defender multitenant portal helps you organize and manage content at scale across your tenants, based on categories like business groups or locations. Create distribution profiles to copy existing content, like custom detection rules, from the source tenant to the target tenants. The distributed content then runs on any relevant device or device groups that you set in the distribution profile scope.
24+
25+
## Supported content for distribution
26+
27+
Create distribution profiles to distribute the following types of of content across multiple tenants:
28+
29+
- Custom detection rules
30+
- Endpoint security policies, supported for Microsoft Defender for Endpoint customers only (Preview)
31+
32+
## Requirements
33+
34+
The following table lists the requirements for using content distribution in the Microsoft Defender multitenant portal.
35+
36+
| Requirement | Description |
37+
|:---|:---|
38+
|**Licensing requirements** | Your organization must have a subscription to Microsoft 365 E5 or Office E5.|
39+
|**Permissions** | Users must be assigned the correct roles and permission at the individual tenant level to view and manage the associated data in multitenant management. <br/> Access to content distribution is granted through the Security settings (manage) or Security Data Basic (read) permission in [Microsoft 365 Defender Unified role-based access control (URBAC)](/defender-xdr/manage-rbac). By default, both of these roles are assigned to the **Security Administrator** and **Security Reader** Microsoft Entra built-in roles.|
40+
|**Delegate access** |Delegated access via [Azure B2B](/entra/external-id/add-users-administrator) or [GDAP (CSP Parters only)](/microsoft-365/lighthouse/m365-lighthouse-setup-gdap) must be obtained for at least one other tenant.|
41+
42+
## Create distribution profiles
43+
44+
To create a new distribution profile:
45+
46+
1. In the Microsoft Defender multitenant portal, go to the [**Multi-tenant management > Content distribution**](https://mto.security.microsoft.com/contentdistribution) page.
47+
48+
1. Select **Create** to open the **Create content distribution profile** wizard. In the wizard, enter the following details, selecting **Next** as needed to navigate through the tabs. Some tabs are only relevant if you've selected that type of content to distribute.
49+
50+
|Tab |Instructions |
51+
|---------|---------|
52+
|**Details** | Enter a name and optional description for your content distribution profile. |
53+
|**Assign tenants**** | Select **Add tenant** to see a list of available tenants that you can add to your distribution profile, select the tenants you want to add, and then select **Add**. |
54+
|**Select content type** | Content types are all selected by default. Verify that the selection matches the content you want to distribute in this distribution profile. |
55+
|**Custom detection rules** | Relevant only if you'd selected **Custom detection rules** in the **Select content type** page. <br><br>1. Select **Add content**.<br>2. In the **Select detection rules** side pane, select the rules that you want to add to the distribution profile, and then select **Add to distribution profile**. |
56+
|**Endpoint security policies** | Relevant only if you'd selected **Endpoint security policies** in the **Select content type page**. <br><br>1. Select **Add content**. <br>2. In the **Select security policies** side pane, select the policies that you want to add to the distribution profile, and then select **Add to distribution profile**. |
57+
58+
At this point, you'll reach either the **Device groups** sub-page or the **Endpoint security policies** subpage, where you define the devices or device groups that need to be in your tenant's scope. Distribution profiles support a single scope for the entire profile, or separate scopes per rule.
59+
60+
Select **Single scope** or **Scope per rule** to toggle between these options, and **Edit scope** to make changes as needed.
61+
62+
1. In the **Summary** tab, review the details of the distribution profile you created. If you want to sync all authorized tenants now, leave the **Sync all authorized tenants** option checked. If you want to sync later, uncheck it.
63+
64+
1. Select **Submit** to finish your distribution profile creation.
65+
66+
If you chose to **Sync all authorized tenants**, all the tenants and scope within the tenants you have permission automatically syncs.
67+
68+
Your newly created distribution profile appears in the distribution profiles page after creation.
69+
70+
:::image type="content" source="media/mto-tenantgroups/distribution-profiles.png" alt-text="Screenshot of the Content distribution page with content distribution profiles created.":::
71+
72+
Select a distribution profile from the list to add or remove content, add, edit, or remove tenants, or sync the distribution profile. Use the toolbar options at the top of the page to edit, remove, or sync distribution profiles.
73+
74+
If you're syncing the profiles, check the sync results under the **Last sync result** column. If the result is *partially successful* or *failed*, select the result to investigate the cause. When selecting the result, a side pane containing the errors, recommendations, and impacted assets appears. For example:
75+
76+
:::image type="content" source="media/mto-tenantgroups/mto-sync-results.png" alt-text="Screenshot of sync results side pane." lightbox="media/mto-tenantgroups/mto-sync-results.png":::
77+
78+
> [!NOTE]
79+
> The maximum number of published items per publish operation is 9,500. Published items are calculated as the number of tenants multiplied by the number of templates. For example, if you publish 10 distribution profiles with 10 target tenants and 95 content templates, then the published items equals to 9,500.
80+
81+
## Syncing content among distribution profiles
82+
83+
To sync content across distribution profiles for the tenants you have permission for:
84+
85+
1. On the **Multi-tenant management > [Content distribution](https://mto.security.microsoft.com/contentdistribution)** page, select any distribution profiles you want to sync, and then select **Sync**.
86+
87+
1. At the prompt, select **Sync** again to confirm the sync operation. Once the sync is completed, you see one of the following statuses:
88+
89+
- Success
90+
- Partially successful
91+
- Failure
92+
93+
1. If you experience a partial success or failure, select the value in the **Last sync result** column to investigate the cause.
94+
95+
Sync results show the number of synced tenants and content. Synced tenants indicate how many tenants had custom detection rules applied successfully.
96+
97+
For example, if all rules are applied in 3 out of 3 tenants, the count is **3**; if only 2 tenants succeed, the count is **2**. Synced content represents the total custom detection rules synced across all target tenants.
98+
99+
## Troubleshooting
100+
101+
Common reasons for a sync to fail include:
102+
103+
- User doesn't have permission to create custom detection rules on the target tenant.
104+
- User doesn't have permission to read custom detection rules from **content source**.
105+
- User doesn't have permission for the target device scope.
106+
107+
If the issue is with the target tenant, try creating an identical custom detection rule for further diagnosis. If the issue is with accessing the source data, try accessing the custom detection.
108+
109+
## Related content
110+
111+
- [Create and manage custom detections rules](/defender-xdr/custom-detection-rules)
112+
- [Add Microsoft Entra B2B collaboration users in the Microsoft Entra admin center](/entra/external-id/add-users-administrator)
113+
- [Set up GDAP for your customers in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-setup-gdap)

unified-secops-platform/mto-tenantgroups.md

Lines changed: 0 additions & 121 deletions
This file was deleted.

unified-secops-platform/mto-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,11 +51,11 @@ Here’s an example of the policy setting in the Microsoft Entra admin center.
5151

5252
## Content assignment failure in cross-cloud tenant management
5353

54-
You see the following error when assigning content to tenant groups:
54+
You see the following error when assigning content to deployment profiles:
5555

5656
:::image type="content" source="media/mto-troubleshoot/tenant-perms-error-small.png" alt-text="Screenshot of permissions error when assigning content to tenants" lightbox="media/mto-troubleshoot/tenant-perms-error.png":::
5757

58-
When a cross-cloud tenant is added to a tenant group and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won't be available for content management, which causes the error. This is a recognized limitation of cross-cloud tenant management and is currently under review.
58+
When a cross-cloud tenant is added to a deployment profile and subsequently removed from cross-cloud visibility, the tenant's name is removed from the tenant list and won't be available for content management, which causes the error. This is a recognized limitation of cross-cloud tenant management and is currently under review.
5959

6060
## Related content
6161

0 commit comments

Comments
 (0)