add line break

This commit is contained in:
Joey Caparas
2016-07-13 17:36:06 +10:00
parent 5d5891993b
commit 6198c9eaa0

View File

@ -9,6 +9,12 @@ ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: mjcaparas author: mjcaparas
--- ---
**Applies to:**
- Windows 10 Insider Preview Build 14332 or later
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
<span style="color:#ED1C24;">[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]</span>
# Assign user access to the Windows Defender ATP portal # Assign user access to the Windows Defender ATP portal
**Applies to:** **Applies to:**
@ -22,11 +28,11 @@ Windows Defender ATP users and access permissions are managed in Azure Active Di
- Full access (Read and Write) - Full access (Read and Write)
- Read only access - Read only access
**Full access** **Full access** <br>
Users with full access can log in, view all system information as well as resolve alerts, submit files for deep analysis, and download the onboarding package. Users with full access can log in, view all system information as well as resolve alerts, submit files for deep analysis, and download the onboarding package.
Assigning full access rights requires adding the users to the “Security Administrator” or “Global Administrator” AAD built-in roles. Assigning full access rights requires adding the users to the “Security Administrator” or “Global Administrator” AAD built-in roles.
**Read only access** **Read only access** <br>
Users with read only access can log in, view all alerts, and related information. Users with read only access can log in, view all alerts, and related information.
They will not be able to change alert states, submit files for deep analysis or perform any state changing operations. They will not be able to change alert states, submit files for deep analysis or perform any state changing operations.
Assigning read only access rights requires adding the users to the “Security Reader” AAD built-in role. Assigning read only access rights requires adding the users to the “Security Reader” AAD built-in role.