Skip to content

Commit fb40541

Browse files
authored
Merge pull request #853 from MicrosoftDocs/deniseb-global-admin
2 parents 11e7f95 + 884fc77 commit fb40541

File tree

4 files changed

+64
-33
lines changed

4 files changed

+64
-33
lines changed

defender-xdr/dex-xdr-permissions.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier1
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 05/29/2023
17+
ms.date: 06/28/2024
1818
---
1919

2020
# How Microsoft Defender Experts for XDR permissions work
@@ -32,6 +32,9 @@ For Microsoft Defender Experts for XDR incident investigations, when our experts
3232

3333
## Configuring permissions in customer tenants
3434

35+
> [!IMPORTANT]
36+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
37+
3538
Once you select the permissions you'd like to grant to our experts, we create the following policies in your tenant using the Security Administrator or Global Administrator context:
3639

3740
- **Configure Microsoft Experts as a service provider** – This setting lets our experts access the tenant environment as external collaborators without requiring you to create accounts for them.
@@ -44,4 +47,5 @@ These policies are configured during the onboarding process and require the rele
4447
### See also
4548

4649
[Important considerations for Microsoft Defender Experts for XDR](additional-information-xdr.md)
50+
4751
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/get-started-xdr.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- essentials-get-started
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 05/28/2024
18+
ms.date: 06/28/2024
1919
---
2020

2121
# Get started with Microsoft Defender Experts for XDR
@@ -36,6 +36,9 @@ Select the link in the welcome email to directly launch the Defender Experts set
3636

3737
## Grant permissions to our experts
3838

39+
> [!IMPORTANT]
40+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
41+
3942
By default, Defender Experts for XDR requires **Service provider access** that lets our experts sign into your tenant and deliver services based on assigned security roles. [Learn more about cross-tenant access](/azure/active-directory/external-identities/cross-tenant-access-overview)
4043

4144
You also need to grant our experts one or both of the following permissions:
@@ -53,7 +56,9 @@ You also need to grant our experts one or both of the following permissions:
5356
**To grant our experts permissions:**
5457

5558
1. In the same Defender Experts settings setup, under **Permissions**, choose the access level(s) you want to grant our experts.
59+
5660
1. If you wish to [exclude device and user groups](#exclude-devices-from-remediation) in your organization from remediation actions, select **Manage exclusions**.
61+
5762
1. Select **Next** to [add contact persons or groups](#tell-us-who-to-contact-for-important-matters).
5863

5964
To edit or update permissions after the initial setup, go to **Settings** > **Defender Experts** > **Permissions**.
@@ -65,12 +70,15 @@ Defender Experts for XDR lets you exclude devices and users from remediation act
6570
**To exclude device groups:**
6671

6772
1. In the same Defender Experts settings setup, under **Exclusions**, go to the **Device groups** tab.
73+
6874
2. Select **+ Add device groups**, then search for and choose the device group(s) that you wish to exclude.
6975
> [!NOTE]
7076
> This page only lists existing device groups. If you wish to create a new device group, you first need to go to the Defender for Endpoint settings in your Microsoft Defender portal. Then, refresh this page to search for and choose the newly created group. [Learn more about creating device groups](/defender-endpoint/machine-groups)
7177
7278
3. Select **Add device groups**.
79+
7380
4. Back on the **Device groups** tab, review the list of excluded device groups. If you wish to remove a device group from the exclusion list, choose it then select **Remove device group**.
81+
7482
5. Select **Next** to confirm your exclusion list and proceed to [adding contact persons or groups](#tell-us-who-to-contact-for-important-matters). Otherwise, select **Skip**, and all your added exclusions are discarded.
7583

7684
:::image type="content" source="/defender/media/xdr/exclude-device-groups.png" alt-text="Screenshot of option to exclude device groups." lightbox="/defender/media/xdr/exclude-device-groups.png":::
@@ -127,9 +135,13 @@ Once identified, the individuals or groups will receive an email notifying them
127135
**To add notification contacts:**
128136

129137
1. In the same Defender Experts settings setup, under **Contacts**, search for and add your **Contact person or team** in the text field provided.
138+
130139
2. Add a **Phone number** (optional) that Defender Experts can call for matters that require immediate attention.
140+
131141
3. Under the **Contact for** dropdown box, choose **Incident notification** or **Service review**.
142+
132143
4. Select **Add**.
144+
133145
1. Select **Next** to confirm your contacts list and proceed to [creating a Teams channel](#receive-managed-response-notifications-and-updates-in-microsoft-teams) where you can also receive incident notifications.
134146

135147
To edit or update your notification contacts after the initial setup, go to **Settings** > **Defender Experts** > **Notification contacts**.
@@ -146,8 +158,11 @@ Apart from email and [in-portal chat](communicate-defender-experts-xdr.md#in-por
146158
**To turn on Teams notifications and chat:**
147159

148160
1. In the same Defender Experts settings setup, under **Teams**, select the **Communicate on Teams** checkbox.
161+
149162
2. Select **Next** to review your settings.
163+
150164
3. Select **Submit**. The step-by-step guide then completes the initial setup.
165+
151166
4. Select **View readiness assessment** to complete the necessary actions required to [optimize your security posture](#prepare-your-environment-for-the-defender-experts-service).
152167

153168
> [!NOTE]

defender-xdr/import-rbac-roles.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 06/13/2024
15+
ms.date: 06/28/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -45,16 +45,22 @@ The following steps guide you on how to import roles into Microsoft Defender XDR
4545

4646
> [!IMPORTANT]
4747
> You must be a Global Administrator or Security Administrator in Microsoft Entra ID, or have all the **Authorization** permissions assigned in Microsoft Defender XDR Unified RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](manage-rbac.md#permissions-prerequisites).
48+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4849
4950
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
51+
5052
2. In the navigation pane, select **Permissions**.
53+
5154
3. Select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
55+
5256
4. Select **Import role**.
57+
5358
5. Select the products you want to import roles from.
5459

5560
:::image type="content" source="/defender/media/defender/m365-defender-import-workloads.png" alt-text="Screenshot of the import workloads page" lightbox="/defender/media/defender/m365-defender-import-workloads.png":::
5661

5762
6. Select **Next** to choose the roles to import. You can choose all roles or select specific roles from the list. Select the role name to review the permissions and assigned users or groups for that specific role.
63+
5864
7. Select the roles you want to import and select **Next**.
5965

6066
> [!NOTE]
@@ -63,6 +69,7 @@ The following steps guide you on how to import roles into Microsoft Defender XDR
6369
> To import this role to Unified RBAC, remove the user or user group from the role in the original RBAC model. Select the role to view the list of users that still exist for that role to determine which user or group to remove.
6470
6571
8. Select **Submit**.
72+
6673
9. Select **Done** on the confirmation page.
6774

6875
Now that you have imported your roles you will be able to [View and edit roles](edit-delete-rbac-roles.md) and activate the workloads.
@@ -78,5 +85,6 @@ Imported roles appear in the **Permissions and roles** list together with any cu
7885

7986
- [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md)
8087
- [Edit or delete roles](edit-delete-rbac-roles.md)
88+
8189
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
8290

0 commit comments

Comments
 (0)