mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
udpate rbac topic
This commit is contained in:
parent
0b584dee7f
commit
0f794444bd
@ -44,7 +44,7 @@ Windows Defender ATP RBAC is designed to support your tier- or role-based model
|
||||
- **Control who can take specific action**
|
||||
- Create custom roles and control what Windows Defender ATP capabilities they can access with granularity.
|
||||
|
||||
- **Control who can see specific information**
|
||||
- **Control who can see information on specific machine group or groups**
|
||||
- [Create machine groups](machine-groups-windows-defender-advanced-threat-protection.md) by specific criteria such as names, tags, domains, and others, then grant role access to them using a specific Azure AD user group.
|
||||
|
||||
To implement role-based access, you'll need to define admin roles, assign corresponding permissions, and assign Azure Active Directory (Azure AD) user groups assigned to the roles.
|
||||
@ -80,8 +80,6 @@ When you first log in to the Windows Defender ATP portal, you're granted either
|
||||
- **Investigate alerts** - Users can manage alerts, initiate automated investigations, collect investigation packages, manage machine tags, and export machine timeline.
|
||||
- **Approve or take action** - Users can take response actions and approve or dismiss pending remediation actions.
|
||||
- **Manage system settings** - Users can configure settings, SIEM and threat intel API settings, advanced settings, preview features, and automated file uploads.
|
||||
- **Manage security settings** - Users can configure alert suppression settings, manage allowed or blocked lists for automation, manage folder exclusions for automation, onboard and offboard machines, and manage email notifications.
|
||||
- **Monitor dashboards** - Users can view all dashboards.
|
||||
|
||||
4. Click **Next** to assign the user to a group.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user