diff --git a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md index 9291c2ab1b..fe9aed2b3a 100644 --- a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -9,6 +9,12 @@ ms.sitesec: library ms.pagetype: security author: mjcaparas --- +**Applies to:** + +- Windows 10 Insider Preview Build 14332 or later +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.] # Assign user access to the Windows Defender ATP portal **Applies to:** @@ -22,11 +28,11 @@ Windows Defender ATP users and access permissions are managed in Azure Active Di - Full access (Read and Write) - Read only access -**Full access** +**Full access**
Users with full access can log in, view all system information as well as resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to the “Security Administrator” or “Global Administrator” AAD built-in roles. -**Read only access** +**Read only access**
Users with read only access can log in, view all alerts, and related information. They will not be able to change alert states, submit files for deep analysis or perform any state changing operations. Assigning read only access rights requires adding the users to the “Security Reader” AAD built-in role.