Skip to content

Commit db8cdd5

Browse files
authored
Merge pull request #2425 from MicrosoftDocs/main
Published main to live, Monday 5:00 PM IST, 01/13
2 parents 558fa2d + 6504e5d commit db8cdd5

File tree

6 files changed

+26
-19
lines changed

6 files changed

+26
-19
lines changed

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,11 @@ Below is a list of the activity filters that can be applied. Most filters suppor
2020
- Activity objects – Search for the objects the activity was done on. This filter applies to files, folders, users, or app objects.
2121
- Activity object ID - the ID of the object (file, folder, user, or app ID).
2222

23-
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contain**, **Equal**, or **Starts with** the specific item.
23+
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contains**, **Equals**, or **Starts with** the specific item.
2424

25+
> [!NOTE]
26+
> Activity-Policy's **Activity object Item** filter supports the **Equals** operator only.
27+
2528
- Action type - Search for a more specific action performed in an app.
2629

2730
- Activity type - Search for the app activity.

defender-xdr/create-custom-rbac-roles.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 10/31/2024
15+
ms.date: 11/17/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -30,6 +30,7 @@ search.appverid: met150
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
3232
- [Microsoft Security Exposure Management](/security-exposure-management/)
33+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
3334

3435
## Create a custom role
3536

defender-xdr/custom-permissions-details.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 08/03/2023
15+
ms.date: 11/17/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -32,6 +32,7 @@ In Microsoft Defender XDR Unified role-based access control (RBAC) you can selec
3232
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3333
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
3434
- [Microsoft Security Exposure Management](/security-exposure-management/)
35+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
3536

3637
<a name='microsoft-365-defender-unified-rbac-permission-details'></a>
3738

defender-xdr/edit-delete-rbac-roles.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 06/27/2024
15+
ms.date: 11/17/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -30,6 +30,7 @@ search.appverid: met150
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
3232
- [Microsoft Security Exposure Management](/security-exposure-management/)
33+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
3334

3435
In Microsoft Defender XDR Unified role-based access control (RBAC), you can edit and delete custom roles or roles that were imported from Defender for Endpoint, Defender for Identity, or Defender for Office 365.
3536

@@ -39,7 +40,7 @@ The following steps guide you on how to edit roles in Microsoft Defender XDR Uni
3940

4041
> [!IMPORTANT]
4142
> You must be a Global Administrator or Security Administrator in Microsoft Entra ID, or have all the Authorization permissions assigned in Microsoft Defender XDR Unified RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](manage-rbac.md#permissions-prerequisites).
42-
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
43+
> Microsoft recommends that you use roles with the fewest permissions to help improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4344
4445
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as global administrator or security administrator.
4546

@@ -49,7 +50,7 @@ The following steps guide you on how to edit roles in Microsoft Defender XDR Uni
4950

5051
4. Select the role you want to edit. You can only edit one role at a time.
5152

52-
5. Once selected, this opens a flyout pane where you can edit the role:
53+
5. Once selected, a flyout pane opens where you can edit the role:
5354

5455
:::image type="content" source="/defender/media/defender/m365-defender-rbac-edit-roles.png" alt-text="Screenshot of the edit roles flyout page" lightbox="/defender/media/defender/m365-defender-rbac-edit-roles.png":::
5556

@@ -60,7 +61,7 @@ The following steps guide you on how to edit roles in Microsoft Defender XDR Uni
6061

6162
To delete roles in Microsoft Defender XDR Unified RBAC, select the role or roles you want to delete and select **Delete roles**.
6263

63-
If the workload is active, by removing the role all assigned user permission will be deleted.
64+
If the workload is active, all assigned user permission are deleted by removing the role.
6465

6566
> [!NOTE]
6667
> After deleting an imported role, the role won't be deleted from the individual product RBAC model. If needed, you can re-import it to the Microsoft Defender XDR Unified RBAC list of roles.
@@ -76,7 +77,7 @@ The Export feature enables you to export the following roles data:
7677
- The assigned data sources
7778
- The assigned users or user groups
7879

79-
When a role has multiple assignments, each assignment will be represented as a separate row in the CSV file.
80+
When a role has multiple assignments, each assignment is represented as a separate row in the CSV file.
8081

8182
The CSV also includes a snapshot of the Defender XDR Unified RBAC activation status for each workload available on the tenant.
8283

@@ -97,7 +98,7 @@ The following steps guide you on how to export roles in Microsoft Defender XDR U
9798

9899
:::image type="content" source="/defender/media/defender/m365-defender-rbac-export-roles.png" alt-text="Screenshot of the export roles page" lightbox="/defender/media/defender/m365-defender-rbac-export-roles.png":::
99100

100-
A CSV file containing all the roles data will be generated and downloaded to the local machine.
101+
A CSV file containing all the roles data is generated and downloaded to the local computer.
101102

102103
## Next steps
103104

defender-xdr/import-rbac-roles.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 07/01/2024
15+
ms.date: 11/17/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -29,14 +29,15 @@ search.appverid: met150
2929
- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
32+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
3233

3334
<a name='import-roles-to-microsoft-365-defender-unified-rbac-from-individual-rbac-models'></a>
3435

3536
## Import roles to Microsoft Defender XDR Unified RBAC from individual RBAC models
3637

3738
You can import existing roles that are maintained as part of individual supported products in Microsoft Defender XDR (for example, Microsoft Defender for Endpoint) to the Microsoft Defender XDR Unified RBAC model.
3839

39-
Importing roles will migrate and maintain the roles with full parity in relation to their permissions and user assignments in the Microsoft Defender XDR Unified RBAC model.
40+
Importing roles migrates and maintains the roles with full parity in relation to their permissions and user assignments in the Microsoft Defender XDR Unified RBAC model.
4041

4142
> [!NOTE]
4243
> Once roles are migrated, you can modify the imported roles and change the level of permissions as needed.
@@ -45,7 +46,7 @@ The following steps guide you on how to import roles into Microsoft Defender XDR
4546

4647
> [!IMPORTANT]
4748
> You must be a Global Administrator or Security Administrator in Microsoft Entra ID, or have all the **Authorization** permissions assigned in Microsoft Defender XDR Unified RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](manage-rbac.md#permissions-prerequisites).
48-
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
49+
> Microsoft recommends that you use roles with the fewest permissions to help improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4950
5051
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
5152

@@ -72,14 +73,14 @@ The following steps guide you on how to import roles into Microsoft Defender XDR
7273

7374
9. Select **Done** on the confirmation page.
7475

75-
Now that you have imported your roles you will be able to [View and edit roles](edit-delete-rbac-roles.md) and activate the workloads.
76+
After importing your roles, you are be able to [View and edit roles](edit-delete-rbac-roles.md) and activate the workloads.
7677

77-
For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new or imported roles, you'll need to activate the new Defender XDR Unified RBAC model. For more information, see [Activate the workloads](activate-defender-rbac.md).
78+
You need to activate the new Defender XDR Unified RBAC model to start enforcing the permissions and assignments configured in your new or imported roles within the Microsoft Defender portal. For more information, see [Activate the workloads](activate-defender-rbac.md).
7879

79-
Imported roles appear in the **Permissions and roles** list together with any custom roles you might have created. All imported roles will be marked as **Imported** in the description. Once you edit an imported role it will no longer be marked as **Imported**.
80+
Imported roles appear in the **Permissions and roles** list together with any custom roles you created. All imported roles are marked as **Imported** in the description. Once you edit an imported role, it will no longer be marked as **Imported**.
8081

8182
> [!NOTE]
82-
> You can import roles as frequently as required. After you edit an imported role, the changes will not affect the original role where it was imported from. This means you have the option to delete an imported role and re-import the original role, if required. If you import the same role twice you will create a duplicate role.
83+
> You can import roles as frequently as required. After you edit an imported role, the changes will not affect the original role where it was imported from. This means you have the option to delete an imported role and re-import the original role, if necessary. If you import the same role twice, you create a duplicate role.
8384
8485
## Next steps
8586

defender-xdr/manage-rbac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: overview
15-
ms.date: 07/02/2024
15+
ms.date: 11/17/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -30,6 +30,7 @@ search.appverid: met150
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
3232
- [Microsoft Security Exposure Management](/security-exposure-management/)
33+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
3334

3435
Microsoft Defender XDR provides integrated threat protection, detection, and response across endpoints, email, identities, applications, and data within a single portal. Controlling a user's permissions around their access to view data or complete tasks is essential for organizations to minimize the risks associated with unauthorized access.
3536

@@ -50,11 +51,10 @@ Centralized permissions management is supported for the following solutions:
5051
|Microsoft Defender for Identity|Full support for all identity data and actions. </br></br> **Note:** Defender for Identity experiences also adhere to permissions granted from [Microsoft Defender for Cloud Apps](https://security.microsoft.com/cloudapps/permissions/roles). For more information, see [Microsoft Defender for Identity role groups](https://go.microsoft.com/fwlink/?linkid=2202729).|
5152
|Microsoft Defender for Cloud|Support access management for all Defender for Cloud data that is available in Microsoft Defender portal.|
5253
|Microsoft Security Exposure Management|Full support for all Exposure Management data and actions, including Microsoft Secure Score data.|
54+
|Microsoft Defender for Cloud Apps|Full support for all cloud apps data and actions. </br></br> **Note:** Once Unified RBAC is activated, some built-in scoped roles will no longer be supported. For more information, see [Map Microsoft Defender for Cloud Apps permissions to the Microsoft Defender XDR Unified RBAC permissions](compare-rbac-roles.md#map-microsoft-defender-for-cloud-apps-permissions-to-the-microsoft-defender-xdr-unified-rbac-permissions).|
5355

5456
> [!NOTE]
5557
> Scenarios and experiences controlled by Compliance permissions are still managed in the Microsoft Purview compliance portal.
56-
>
57-
> This offering isn't currently available for Microsoft Defender for CloudApps.
5858
5959
## Before you start
6060

0 commit comments

Comments
 (0)