Skip to content

Commit d3ae23a

Browse files
committed
added global admin note
1 parent cc73297 commit d3ae23a

6 files changed

+25
-7
lines changed

defender-xdr/configure-email-notifications.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 10/11/2023
15+
ms.date: 07/08/2024
1616
---
1717

1818
# Configure alert notifications in Microsoft Defender XDR
@@ -37,6 +37,9 @@ You can set the alert severity levels that trigger notifications. You can also a
3737

3838
If you're using role-based access control (RBAC), recipients will only receive notifications based on the device groups that were configured in the notification rule. Users with the proper permission can only create, edit, or delete notifications that are limited to their device group management scope. Only users assigned to the Global administrator role can manage notification rules that are configured for all device groups.
3939

40+
> [!NOTE]
41+
> Microsoft recommends using roles with fewer permissions for better security. The Global Administrator role, which has many permissions, should only be used in emergencies when no other role fits.
42+
4043
The email notification includes basic information about the alert and a link to the portal where you can do further investigation.
4144

4245
## Create rules for alert notifications

defender-xdr/deception-overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 05/02/2023
19+
ms.date: 07/08/2024
2020
---
2121

2222
# Manage the deception capability in Microsoft Defender XDR
@@ -50,6 +50,9 @@ The following table lists the requirements to enable the deception capability in
5050
> |Deployment requirements|Requirements:</br> - Defender for Endpoint is the primary EDR solution</br> - [Automated investigation and response capabilities in Defender for Endpoint](/defender-endpoint/configure-automated-investigations-remediation) is configured</br> - Devices are [joined](/entra/identity/devices/concept-directory-join/) or [hybrid joined](/entra/identity/devices/concept-hybrid-join/) in Microsoft Entra</br> - PowerShell is enabled on the devices</br> - The deception feature covers clients operating on Windows 10 RS5 and later in preview|
5151
> |Permissions|You must have one of the following roles assigned in the [Microsoft Entra admin center](https://entra.microsoft.com) or in the [Microsoft 365 admin center](https://admin.microsoft.com) to configure deception capabilities:</br> - Global administrator</br> - Security administrator</br> - Manage portal system settings|
5252
53+
> [!NOTE]
54+
> Microsoft recommends using roles with fewer permissions for better security. The Global Administrator role, which has many permissions, should only be used in emergencies when no other role fits.
55+
5356
## What is deception technology?
5457

5558
Deception technology is a security measure that provides immediate alerts of a potential attack to security teams, allowing them to respond in real-time. Deception technology creates fake assets like devices, users, and hosts that appear to belong to your network.

defender-xdr/investigate-alerts.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,8 @@ An alert can have system tags and/or custom tags with certain color backgrounds.
7979
You'll need to have any of the following roles to access Microsoft Defender for Office 365 alerts:
8080

8181
- For Microsoft Entra global roles:
82-
- Global administrator
83-
- Security administrator
82+
- Global Administrator
83+
- Security Administrator
8484
- Security Operator
8585
- Global Reader
8686
- Security Reader
@@ -91,6 +91,9 @@ You'll need to have any of the following roles to access Microsoft Defender for
9191

9292
- A [custom role](custom-roles.md)
9393

94+
> [!NOTE]
95+
> Microsoft recommends using roles with fewer permissions for better security. The Global Administrator role, which has many permissions, should only be used in emergencies when no other role fits.
96+
9497
## Analyze an alert
9598

9699
To see the main alert page, select the name of the alert. Here's an example.

defender-xdr/m365d-configure-auto-investigation-response.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: ITPro
99
ms.topic: how-to
1010
ms.service: defender-xdr
1111
ms.localizationpriority: medium
12-
ms.date: 06/11/2024
12+
ms.date: 07/08/2024
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -46,6 +46,9 @@ Then, after you're all set up, you can [view and manage remediation actions in t
4646
|Protection for email content and Office files|<ul><li>[Microsoft Defender for Office 365 is configured](/defender-office-365/mdo-deployment-guide#step-2-configure-protection-policies)</li><li>[Automated investigation and remediation capabilities in Defender for Endpoint are configured](/defender-endpoint/configure-automated-investigations-remediation) (required for manual response actions, such as deleting email messages on devices)</li></ul>|
4747
|Permissions|To configure automated investigation and response capabilities, you must have one of the following roles assigned in either Microsoft Entra ID (<https://portal.azure.com>) or in the Microsoft 365 admin center (<https://admin.microsoft.com>): <ul><li>Global Administrator</li><li>Security Administrator</li></ul>To work with automated investigation and response capabilities, such as by reviewing, approving, or rejecting pending actions, see [Required permissions for Action center tasks](m365d-action-center.md#required-permissions-for-action-center-tasks).|
4848

49+
> [!NOTE]
50+
> Microsoft recommends using roles with fewer permissions for better security. The Global Administrator role, which has many permissions, should only be used in emergencies when no other role fits.
51+
4952
## Review or change the automation level for device groups
5053

5154
Whether automated investigations run, and whether remediation actions are taken automatically or only upon approval for your devices depend on certain settings, such as your organization's device group policies. Review the configured automation level for your device group policies. You must be a global administrator or security administrator to perform the following procedure:

defender-xdr/m365d-notifications-incidents.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 09/18/2023
19+
ms.date: 07/08/2024
2020
---
2121

2222
# Get incident notifications by email in Microsoft Defender XDR
@@ -52,6 +52,9 @@ You can add or remove recipients in the email notifications. New recipients get
5252
> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. <br> <br>
5353
Likewise, if your organization is using role-based access control (RBAC), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage.
5454

55+
> [!NOTE]
56+
> Microsoft recommends using roles with fewer permissions for better security. The Global Administrator role, which has many permissions, should only be used in emergencies when no other role fits.
57+
5558
## Create a rule for email notifications
5659

5760
Follow these steps to create a new rule and customize email notification settings.

defender-xdr/m365d-response-actions-notifications.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 03/28/2024
19+
ms.date: 07/08/2024
2020
---
2121

2222
# Get email notifications for response actions in Microsoft Defender XDR
@@ -38,6 +38,9 @@ You can set up Microsoft Defender XDR to notify you through email about manual o
3838
> [!NOTE]
3939
> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. Likewise, if your organization is using [role-based access control (RBAC)](manage-rbac.md), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage.
4040
41+
> [!NOTE]
42+
> Microsoft recommends using roles with fewer permissions for better security. The Global Administrator role, which has many permissions, should only be used in emergencies when no other role fits.
43+
4144
## Create a rule for email notifications
4245

4346
> [!NOTE]

0 commit comments

Comments
 (0)