Skip to content

Commit 6989a6b

Browse files
author
Ken Lawson
committed
Revised per global admin audit
1 parent 2fba429 commit 6989a6b

File tree

7 files changed

+21
-10
lines changed

7 files changed

+21
-10
lines changed

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/2-create-your-environment.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
title: Create your environment
66
description: "Create your environment"
77
ms.date: 12/19/2024
8-
author: wwlpublish
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
ms.custom:

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/includes/2-create-your-environment.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
1-
When accessing your Microsoft Defender portal settings for Endpoints for the first time, you're able to configure many attributes. You must be a global administrator or security administrator for the tenant. On the Set-up preferences page, you can set the:
1+
When accessing your Microsoft Defender portal settings for Endpoints for the first time, you're able to configure many attributes. You must be a Security Administrator for the tenant. On the Set-up preferences page, you can set the:
2+
3+
> [!IMPORTANT]
4+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
25
36
**Data storage location** - Determine where you want to be primarily hosted: US, EU, or UK. You can't change the location after this set up and Microsoft won't transfer the data from the specified geolocation.
47

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/includes/4-onboard-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Configure Device discovery
22

3-
When accessing your Microsoft Defender portal settings for Endpoints for the first time, the first step is to configure Device discovery. You must be a global administrator or security administrator for the tenant.
3+
When accessing your Microsoft Defender portal settings for Endpoints for the first time, the first step is to configure Device discovery. You must be a Security Administrator for the tenant.
44

55
1. On the **Microsoft Defender XDR** portal, from the navigation menu, select **Settings** from the left.
66

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/includes/5-manage-access.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,8 @@
1-
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do. The following video explains the use of Role-Based Access Control (RBAC) and Device Groups (Machine Groups).
1+
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have precise control over what users with access to the portal can see and do. The following video explains the use of Role-Based Access Control (RBAC) and Device Groups (Machine Groups).
22

3+
> [!IMPORTANT]
4+
> Starting February 16, 2025, new Microsoft Defender for Endpoint customers will only have access to the Unified Role-Based Access Control (URBAC).
5+
> Existing customers keep their current roles and permissions. For more information, see URBAC [Unified Role-Based Access Control (URBAC) for Microsoft Defender for Endpoint](/defender-xdr/manage-rbac)
36
47
>[!VIDEO https://learn-video.azurefd.net/vod/player?id=c9903800-3d26-4b30-bd0b-fed00dfc6a5c]
58
@@ -13,6 +16,9 @@ Defender for Endpoint RBAC is designed to support your tier or role-based model
1316

1417
- Create device groups by specific criteria such as names, tags, domains, and others, then grant role access to them using a specific Microsoft Entra user group.
1518

16-
To implement role-based access, you'll need to define admin roles, assign corresponding permissions, and assign Microsoft Entra user groups assigned to the roles.
19+
To implement role-based access, you need to define admin roles, assign corresponding permissions, and assign Microsoft Entra user groups assigned to the roles.
1720

1821
Before using RBAC, you should understand the roles that can grant permissions and the consequences of turning on RBAC. On your first sign-in to Microsoft Defender XDR you're granted either full access or read-only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Microsoft Entra ID. Read-only access is granted to users with a Security Reader role in Microsoft Entra ID. Someone with a Defender for Endpoint Global administrator role has unrestricted access to all devices, regardless of their device group association and the Microsoft Entra user groups assignments
22+
23+
> [!IMPORTANT]
24+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/includes/6-create-manage-roles-for-role-based-access-control.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
11
The following steps guide you on how to create roles in the Microsoft Defender portal. It assumes that you have already created Microsoft Entra user groups.
22

3-
1. Access the Microsoft Defender portal using an account with a Security administrator or Global administrator role assigned.
3+
> [!IMPORTANT]
4+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
5+
6+
1. Access the Microsoft Defender portal using an account the Security administrator role assigned.
47
1. In the navigation pane, select **Settings** then select **Endpoints**. Under the **Permissions** category, select **Roles**.
58
1. Select the **Turn on roles** button.
69
1. Select **+ Add item**.
@@ -9,7 +12,6 @@ The following steps guide you on how to create roles in the Microsoft Defender p
912
1. Use the filter to select the Microsoft Entra group that you would like to add this role to.
1013
1. Select **Save**.
1114

12-
1315
> [!IMPORTANT]
1416
> After creating roles, you'll need to create a device group and provide access to the device group by assigning it to a role that you just created.
1517

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/includes/7-configure-device-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To create a device group:
3030

3131
1. Select **+ Add device group**.
3232

33-
1. Enter the group name and automation settings and specify the matching rule that determines which devices belong to the group. See How the automated investigation starts.
33+
1. Enter the group name and remediation settings and specify the matching rule that determines which devices belong to the group. See How the automated investigation starts.
3434

3535
1. Preview several devices that will be matched by this rule. If you're satisfied with the rule, select the User access tab.
3636

learn-pr/wwl-sci/deploy-microsoft-defender-for-endpoints-environment/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ uid: learn.wwl.deploy-microsoft-defender-for-endpoints-environment
33
metadata:
44
title: Deploy the Microsoft Defender for Endpoint environment
55
description: "Deploy the Microsoft Defender for Endpoint environment"
6-
ms.date: 1/7/2025
7-
author: wwlpublish
6+
ms.date: 4/3/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.custom:

0 commit comments

Comments
 (0)