From 33fbbd92c10ce49b0b64492c07b578c17aa1eda0 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 13 Jul 2016 18:23:18 +1000 Subject: [PATCH] add line break again --- ...rtal-access-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md index c05b44442c..fe9aed2b3a 100644 --- a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -28,11 +28,11 @@ Windows Defender ATP users and access permissions are managed in Azure Active Di - Full access (Read and Write) - Read only access -**Full access** +**Full access**
Users with full access can log in, view all system information as well as resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to the “Security Administrator” or “Global Administrator” AAD built-in roles. -**Read only access** +**Read only access**
Users with read only access can log in, view all alerts, and related information. They will not be able to change alert states, submit files for deep analysis or perform any state changing operations. Assigning read only access rights requires adding the users to the “Security Reader” AAD built-in role.