Skip to content

Commit 09aa75c

Browse files
author
Ken Lawson
committed
Updates per global admin audit
1 parent 6989a6b commit 09aa75c

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/2-create-your-environment.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Create your environment
44
metadata:
55
title: Create your environment
66
description: "Create your environment"
7-
ms.date: 12/19/2024
7+
ms.date: 04/03/2025
88
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/includes/2-create-your-environment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ When accessing your Microsoft Defender portal settings for Endpoints for the fir
33
> [!IMPORTANT]
44
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
55
6-
**Data storage location** - Determine where you want to be primarily hosted: US, EU, or UK. You can't change the location after this set up and Microsoft won't transfer the data from the specified geolocation.
6+
**Data storage location** - Determine where you want to be primarily hosted: US, EU, or UK. You can't change the location after this is set up, and Microsoft won't transfer the data from the specified geolocation.
77

88
**Data retention** - The default is six months.
99

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/includes/7-configure-device-groups.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ In Microsoft Defender for Endpoint, you can create device groups and use them to
44

55
- Limit access to related alerts and data to specific Microsoft Entra user groups with assigned RBAC roles
66

7-
- Configure different auto-remediation settings for different sets of devices
7+
- Configure different autoremediation settings for different sets of devices
88

99
- Assign specific remediation levels to apply during automated investigations
1010

1111
- In an investigation, filter the Devices list to specific device groups by using the Group filter.
1212

13-
You can create device groups in the context of role-based access (RBAC) to control who can take specific action or see information by assigning the device group(s) to a user group.
13+
You can create device groups in the context of role-based access (RBAC) to control who can take specific action or see information by assigning the device groups to a user group.
1414

1515
As part of the process of creating a device group, you'll:
1616

@@ -34,6 +34,6 @@ To create a device group:
3434

3535
1. Preview several devices that will be matched by this rule. If you're satisfied with the rule, select the User access tab.
3636

37-
1. Assign the user groups that can access the device group you created. You can only grant access to Microsoft Entra user groups that have been assigned to RBAC roles.
37+
1. Assign the user groups that can access the device group you created. You can only grant access to Microsoft Entra user groups that are assigned to RBAC roles.
3838

3939
1. Select **Close**. The configuration changes are applied.

0 commit comments

Comments
 (0)