diff --git a/defender-office-365/office-365-ti.md b/defender-office-365/office-365-ti.md index 16c92de83a..e0981460a6 100644 --- a/defender-office-365/office-365-ti.md +++ b/defender-office-365/office-365-ti.md @@ -106,6 +106,8 @@ Microsoft Defender for Office 365 uses role-based access control. Permissions ar |View Incidents (also referred to as Investigations)

Add email messages to an incident|One of the following:
These roles can be assigned in either Microsoft Entra ID () or the Microsoft 365 admin center ().| |Trigger email actions in an incident

Find and delete suspicious email messages|One of the following:
The **Global Administrator**\* and **Security Administrator** roles can be assigned in either Microsoft Entra ID () or the Microsoft 365 admin center ().

The **Search and Purge** role must be assigned in the **Email & collaboration roles** in the Microsoft 36 Defender portal ().| |Integrate Microsoft Defender for Office 365 Plan 2 with Microsoft Defender for Endpoint

Integrate Microsoft Defender for Office 365 Plan 2 with a SIEM server|Either the **Global Administrator**\* or the **Security Administrator** role assigned in either Microsoft Entra ID () or the Microsoft 365 admin center ().

--- **plus** ---

An appropriate role assigned in additional applications (such as [Microsoft Defender Security Center](/windows/security/threat-protection/microsoft-defender-atp/user-roles) or your SIEM server).| +|View email preview/download .eml of Quarantined emails (view/download only Quarantined emails)|One of the following:
  • **Global Administrator**\*
  • **Security Administrator**
  • **Security Reader**

These roles can be assigned in either Microsoft Entra ID () or the Microsoft 365 admin center ().| +|View email preview/download .eml of ANY email in Explorer|One of the following:
  • **Security Administrator**
  • **Security Reader**

These roles can be assigned in either Microsoft Entra ID () or the Microsoft 365 admin center ().| > [!IMPORTANT] > \* Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.