Skip to content

Commit e68623b

Browse files
authored
Merge pull request #991 from diannegali/docs-editor/microsoft-365-security-center-1721667163
Update microsoft-365-security-center-defender-cloud.md
2 parents f4111d4 + c93ee52 commit e68623b

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

defender-xdr/microsoft-365-security-center-defender-cloud.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
manager: deniseb
11-
ms.date: 06/05/2024
11+
ms.date: 07/22/2024
1212
audience: ITPro
1313
ms.topic: conceptual
1414
search.appverid:
@@ -41,11 +41,14 @@ To ensure access to Defender for Cloud alerts in the Microsoft Defender portal,
4141

4242
### Required permissions
4343

44-
You must be a global administrator or a security administrator in Azure Active Directory to view Defender for Cloud alerts and correlations. For users that don't have these roles, the integration is available only by applying [unified role-based access control (RBAC) roles](manage-rbac.md) for Defender for Cloud.
45-
4644
> [!NOTE]
4745
> The permission to view Defender for Cloud alerts and correlations is automatic for the entire tenant. Viewing for specific subscriptions is not supported. You can use the **alert subscription ID** filter to view Defender for Cloud alerts associated with a specific Defender for Cloud subscription in the alert and incident queues. Learn more about [filters](incident-queue.md#filters-).
4846
47+
The integration is available only by applying the appropriate [unified role-based access control (RBAC)](manage-rbac.md) for Defender for Cloud. To view Defender for Cloud alerts and correlations without unified RBAC, you must be a Global Administrator or Security Administrator in Azure Active Directory.
48+
49+
> [!IMPORTANT]
50+
> Global Administrator is a highly privileged role that should be limited to scenarios when you can't use an existing role. Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization.
51+
4952
## Investigation experience in the Microsoft Defender portal
5053

5154
> [!IMPORTANT]
@@ -54,11 +57,6 @@ You must be a global administrator or a security administrator in Azure Active D
5457

5558
The following section describes the detection and investigation experience in the Microsoft Defender portal with Defender for Cloud alerts.
5659

57-
> [!NOTE]
58-
> Informational alerts from Defender for Cloud are not integrated to the Microsoft Defender portal to allow focus on the relevant and high severity alerts. This strategy streamlines management of incidents and reduces alert fatigue.
59-
60-
61-
6260
> [!div class="mx-tdCol2BreakAl"]
6361
> |Area |Description |
6462
> |----------|-----------|
@@ -69,6 +67,9 @@ The following section describes the detection and investigation experience in th
6967
> |Unified API|Defender for Cloud alerts and incidents are now included in [Microsoft Defender XDR's public API](api-overview.md), allowing customers to export their security alerts data into other systems using one API.|
7068
> |Advanced hunting (Preview)| Information about cloud audit events for various cloud platforms protected by the organization's Defender for Cloud is available through the [CloudAuditEvents](advanced-hunting-cloudauditevents-table.md) table in [advanced hunting](advanced-hunting-overview.md).|
7169
70+
> [!NOTE]
71+
> Informational alerts from Defender for Cloud are not integrated to the Microsoft Defender portal to allow focus on the relevant and high severity alerts. This strategy streamlines management of incidents and reduces alert fatigue.
72+
7273
## Impact to Microsoft Sentinel users
7374

7475
Microsoft Sentinel customers [integrating Microsoft Defender XDR incidents](/azure/sentinel/microsoft-365-defender-sentinel-integration) *and* ingesting Defender for Cloud alerts are required to make the following configuration changes to ensure that duplicate alerts and incidents aren't created:

0 commit comments

Comments
 (0)