You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/api/device-health-api-methods-properties.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
5
5
ms.author: siosulli
6
6
author: siosulli
7
7
ms.localizationpriority: medium
8
-
ms.date: 05/15/2024
8
+
ms.date: 06/25/2024
9
9
manager: deniseb
10
10
ms.reviewr: mkaminska
11
11
audience: ITPro
@@ -50,7 +50,7 @@ Data that is collected using either '_JSON response_ or _via files_' is the curr
50
50
> [!IMPORTANT]
51
51
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
52
52
>
53
-
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft 365 Security dashboard, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
53
+
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft Defender portal, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
54
54
55
55
### 1.1 Export device antivirus health details API methods
56
56
@@ -128,4 +128,5 @@ Data that is collected using either '_JSON response_ or _via files_' is the curr
128
128
[Export device antivirus health report](device-health-export-antivirus-health-report-api.md)
129
129
130
130
[Device health and compliance reporting](../device-health-reports.md)
131
+
131
132
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/api/device-health-export-antivirus-health-report-api.md
+2-8Lines changed: 2 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
5
5
ms.author: siosulli
6
6
author: siosulli
7
7
ms.localizationpriority: medium
8
-
ms.date: 11/03/2022
8
+
ms.date: 06/25/2024
9
9
manager: deniseb
10
10
audience: ITPro
11
11
ms.collection:
@@ -46,19 +46,13 @@ This API has two methods to retrieve Microsoft Defender Antivirus device antivir
46
46
47
47
Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages. See [Export device health details API methods and properties](device-health-api-methods-properties.md).
48
48
49
-
> [!IMPORTANT]
50
-
>
51
-
> Currently, only the **Antivirus Health JSON Response** is generally available. **Antivirus Health API via files** is currently only available in public preview.
52
-
>
53
-
> **Advanced Hunting custom query** is currently only available in public preview, even if the queries are still visible.
54
-
55
49
> [!IMPORTANT]
56
50
>
57
51
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
58
52
59
53
> [!NOTE]
60
54
>
61
-
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft 365 Security dashboard, see: [Device health and antivirus compliance report in Microsoft Defender for Endpoint](../device-health-reports.md).
55
+
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft Defender portal, see: [Device health and antivirus compliance report in Microsoft Defender for Endpoint](../device-health-reports.md).
Copy file name to clipboardExpand all lines: defender-endpoint/assign-portal-access.md
+19-12Lines changed: 19 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- m365-security
14
14
- tier2
15
15
ms.topic: conceptual
16
-
ms.date: 3/30/2023
16
+
ms.date: 06/25/2024
17
17
---
18
18
19
19
# Assign user access
@@ -32,19 +32,26 @@ ms.date: 3/30/2023
32
32
33
33
Defender for Endpoint supports two ways to manage permissions:
34
34
35
-
-**Basic permissions management**: Set permissions to either full access or read-only.
35
+
-**Basic permissions management**: Set permissions to either full access or read-only. See [Use basic permissions to access the portal](basic-permissions.md).
36
+
36
37
-**Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Microsoft Entra user groups to the roles, and granting the user groups access to device groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac.md).
37
38
38
-
> [!NOTE]
39
-
> If you have already assigned basic permissions, you may switch to RBAC anytime. Consider the following before making the switch:
40
-
> - Users with full access (users that are assigned the Global Administrator or Security Administrator directory role in Microsoft Entra ID), are automatically assigned the default Defender for Endpoint administrator role, which also has full access. Additional Microsoft Entra user groups can be assigned to the Defender for Endpoint administrator role after switching to RBAC. Only users assigned to the Defender for Endpoint administrator role can manage permissions using RBAC.
41
-
> - Users that have read-only access (Security Readers) will lose access to the portal until they are assigned a role. Note that only Microsoft Entra user groups can be assigned a role under RBAC.
42
-
> - After switching to RBAC, you will not be able to switch back to using basic permissions management.
43
-
>
44
-
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
39
+
## Change from basic permissions to RBAC
40
+
41
+
If you have already assigned basic permissions, you can switch to RBAC anytime. Consider the following before making the switch:
42
+
43
+
- Users who have full access (users who are assigned the Global Administrator or Security Administrator directory role in Microsoft Entra ID), are automatically assigned the default Defender for Endpoint administrator role, which also has full access.
44
+
- Other Microsoft Entra user groups can be assigned to the Defender for Endpoint administrator role after switching to RBAC.
45
+
- Only users who are assigned the Defender for Endpoint administrator role can manage permissions using RBAC.
46
+
- Users who have read-only access (Security Readers) lose access to the portal until they are assigned a role. Only Microsoft Entra user groups can be assigned a role under RBAC.
47
+
- After switching to RBAC, you can't switch back to using basic permissions management.
48
+
49
+
> [!IMPORTANT]
50
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
51
+
52
+
## Related articles
45
53
46
-
## Related topics
54
+
-[Create and manage device groups](machine-groups.md)
55
+
-[Zero Trust with Microsoft Defender for Endpoint](zero-trust-with-microsoft-defender-endpoint.md)
47
56
48
-
-[Use basic permissions to access the portal](basic-permissions.md)
49
-
-[Manage portal access using RBAC](rbac.md)
50
57
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
38
-
39
36
The attack surface reduction rules report provides information about the _attack surface reduction rules_ that are applied to devices in your organization. This report also provides information about:
40
37
41
38
- detected threats
@@ -47,39 +44,31 @@ Additionally, this report provides an easy-to-use interface that enables you to:
47
44
- View threat detections
48
45
- View the configuration of the ASR rules
49
46
- Configure (add) exclusions
50
-
- Easily activate _basic protection_ by enabling the three most recommended ASR rules with a single toggle
51
47
- Drill down to gather detailed information
52
48
53
49
For more information about individual attack surface reduction rules, see [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).
54
50
55
51
## Prerequisites
56
52
57
53
> [!IMPORTANT]
58
-
> To access the **Attack surface reduction rules report**, read permissions are required for the Microsoft Defender portal. Access to this report granted by Microsoft Entra roles, such as Security Global Admin or Security role, is being deprecated and will be removed in April 2023.
59
-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in the **Attack surface reduction rules report**, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
54
+
> To access the attack surface reduction rules report, read permissions are required for the Microsoft Defender portal.
55
+
> For WindowsServer2012R2 and WindowsServer2016 to appear in the attack surface reduction rules report, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
60
56
61
57
## Report access permissions
62
58
63
-
To access the **Attack surface reduction rules report** in the Microsoft 365 Security dashboard, the following permissions are required:
59
+
To access the attack surface reduction rules report in the Microsoft Defender portal, the following permissions are required:
64
60
65
61
| Permission type | Permission | Permission display name |
66
62
|:---|:---|:---|
67
-
| Application | Machine.Read.All | 'Read all machine profiles' |
68
-
|Delegated (work or school account) | Machine.Read | 'Read machine information' |
69
-
70
-
To assign these permissions:
63
+
| Application |`Machine.Read.All`|`Read all machine profiles`|
64
+
| Delegated (work or school account) |`Machine.Read`|`Read machine information`|
71
65
72
-
1. Sign in to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
73
-
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Roles** (under **Permissions**).
74
-
1. Select the role you'd like to edit.
75
-
1. Select **Edit**.
76
-
1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
77
-
1. In **Description** type a brief summary of the role.
78
-
1. In **Permissions**, select **View Data**, and under **View Data** select **Attack surface reduction**.
66
+
You can assign permissions by using Microsoft Entra ID or the Microsoft Defender portal.
79
67
80
-
For more information about user role management, see [Create and manage roles for role-based access control](user-roles.md).
68
+
- To use Microsoft Entra ID, see [Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal)
69
+
- To use the Microsoft Defender portal, see [Assign user access](assign-portal-access.md).
81
70
82
-
## Navigation
71
+
## Navigate to the attack surface reduction rules report
83
72
84
73
To navigate to the summary cards for the attack surface reduction rules report
Copy file name to clipboardExpand all lines: defender-endpoint/basic-permissions.md
+6-13Lines changed: 6 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
ms.topic: conceptual
18
18
search.appverid: met150
19
-
ms.date: 02/21/2024
19
+
ms.date: 06/25/2024
20
20
---
21
21
22
22
# Use basic permissions to access the portal
@@ -31,14 +31,7 @@ ms.date: 02/21/2024
31
31
32
32
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-basicaccess-abovefoldlink)
33
33
34
-
Refer to the instructions below to use basic permissions management.
35
-
36
-
You can use either of the following solutions:
37
-
38
-
- Microsoft Graph PowerShell
39
-
- Azure portal
40
-
41
-
For granular control over permissions, [switch to role-based access control](rbac.md).
34
+
If you want to use basic permissions management for the Microsoft Defender portal, keep in mind that permissions are set to either full access or read only. For granular control over permissions, [use role-based access control](rbac.md).
42
35
43
36
## Assign user access using Microsoft Graph PowerShell
44
37
@@ -57,6 +50,7 @@ You can assign users with one of the following levels of permissions:
57
50
- Connect to your Microsoft Entra ID. For more information, see [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands).
58
51
59
52
-**Full access**: Users with full access can log in, view all system information and resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to the "Security Administrator" or "Global Administrator" Microsoft Entra built-in roles.
53
+
60
54
-**Read-only access**: Users with read-only access can log in, view all alerts, and related information.
61
55
62
56
They will not be able to change alert states, submit files for deep analysis or perform any state changing operations.
@@ -93,11 +87,10 @@ Use the following steps to assign security roles:
93
87
94
88
For more information, see [Add or remove group members using Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-groups-members-azure-portal).
95
89
96
-
## Assign user access using the Azure portal
97
-
98
-
For more information, see [Assign administrator and non-administrator roles to users with Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal).
99
90
100
-
## Related topic
91
+
## Related articles
101
92
93
+
-[Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal)
102
94
-[Manage portal access using RBAC](rbac.md)
95
+
103
96
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments