Skip to content

Commit dbe9064

Browse files
committed
GA fixes
1 parent 9da5031 commit dbe9064

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

defender-endpoint/rbac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,9 @@ To implement role-based access, you'll need to define admin roles, assign corres
6666
Before using RBAC, it's important that you understand the roles that can grant permissions and the consequences of turning on RBAC.
6767

6868
> [!WARNING]
69-
> Before enabling the feature, it's important that you have a Global Administrator role or Security Administrator role in Microsoft Entra ID and that you have your Microsoft Entra groups ready to reduce the risk of being locked out of the portal.
69+
> Before enabling the feature, it's important that you have an appropriate role, such as Security Administrator assigned in Microsoft Entra ID, and that you have your Microsoft Entra groups ready to reduce the risk of being locked out of the portal.
7070
71-
When you first sign in to the Microsoft Defender portal, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Microsoft Entra ID. Read only access is granted to users with a Security Reader role in Microsoft Entra ID.
71+
When you first sign in to the Microsoft Defender portal, you're granted either full access or read only access. Full access rights are granted to users with the Security Administrator role in Microsoft Entra ID. Read only access is granted to users with a Security Reader role in Microsoft Entra ID.
7272

7373
Someone with a Defender for Endpoint Global Administrator role has unrestricted access to all devices, regardless of their device group association and the Microsoft Entra user groups assignments.
7474

defender-endpoint/respond-file-alerts.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -166,10 +166,10 @@ The **Download file** button can have the following states:
166166
For Microsoft Defender for Endpoint role-based access control (RBAC):
167167

168168
For Portable Executable file (.exe, .sys, .dll, and others)
169-
- Global admin or Advanced live response or Alerts
169+
- Security Administrator or Advanced live response or Alerts
170170

171171
Non-Portable Executable file (.txt, .docx, and others)
172-
- Global admin or Advanced live response
172+
- Security Administrator or Advanced live response
173173
- Tenants with [role-based access (RBAC) permissions](/defender-xdr/manage-rbac) enabled
174174

175175

@@ -212,10 +212,10 @@ The **Collect file** button can have the following states:
212212
The following permissions are required:
213213

214214
For Portable Executable file (.exe, .sys, .dll, and others)
215-
- Global admin or Advanced live response or Alerts
215+
- Security Administrator or Advanced live response or Alerts
216216

217217
Non-Portable Executable file (.txt, .docx, and others)
218-
- Global admin or Advanced live response
218+
- Security Administrator or Advanced live response
219219

220220

221221
If a file hasn't been seen in the organization in the past 30 days, **Collect file** is disabled.

0 commit comments

Comments
 (0)