From 6198c9eaa098eb618571a3e42d9c07f0bab4e3db Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 13 Jul 2016 17:36:06 +1000 Subject: [PATCH] add line break --- ...cess-windows-defender-advanced-threat-protection.md | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md index 9291c2ab1b..fe9aed2b3a 100644 --- a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -9,6 +9,12 @@ ms.sitesec: library ms.pagetype: security author: mjcaparas --- +**Applies to:** + +- Windows 10 Insider Preview Build 14332 or later +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.] # Assign user access to the Windows Defender ATP portal **Applies to:** @@ -22,11 +28,11 @@ Windows Defender ATP users and access permissions are managed in Azure Active Di - Full access (Read and Write) - Read only access -**Full access** +**Full access**
Users with full access can log in, view all system information as well as resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to the “Security Administrator” or “Global Administrator” AAD built-in roles. -**Read only access** +**Read only access**
Users with read only access can log in, view all alerts, and related information. They will not be able to change alert states, submit files for deep analysis or perform any state changing operations. Assigning read only access rights requires adding the users to the “Security Reader” AAD built-in role.