diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md
index 56d26ab06e..1428abdb80 100644
--- a/windows/security/threat-protection/TOC.md
+++ b/windows/security/threat-protection/TOC.md
@@ -139,7 +139,7 @@
####### [Get user related machines](windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md)
-
+##### [Managed service provider provider support](windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md)
#### [Microsoft threat protection](windows-defender-atp/threat-protection-integration.md)
##### [Protect users, data, and devices with conditional access](windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md)
@@ -307,6 +307,9 @@
######## [Create and manage machine tags](windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md)
+##### [Configure Managed security service provider support](windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md)
+
+
#### Configure Microsoft threat protection integration
##### [Configure conditional access](windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md)
##### [Enable Microsoft Cloud App Security integration](windows-defender-atp/enable-mcas-integration.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index 718c8163b9..fcd5cf2ce8 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -303,7 +303,7 @@
###### [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md)
####### [Create and manage machine tags](machine-tags-windows-defender-advanced-threat-protection.md)
-#### [Configure Managed security service provider support]()
+#### [Configure Managed security service provider support](configure-mssp-support-windows-defender-advanced-threat-protection.md)
### Configure Microsoft threat protection integration
#### [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md
index af6a5d4b30..6c995b3429 100644
--- a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md
@@ -44,12 +44,12 @@ You can assign users with one of the following levels of permissions:
**Full access**
Users with full access can log in, view all system information and resolve alerts, submit files for deep analysis, and download the onboarding package.
-Assigning full access rights requires adding the users to the "Security Administrator” or "Global Administrator” AAD built-in roles.
+Assigning full access rights requires adding the users to the "Security Administrator" or "Global Administrator" AAD built-in roles.
**Read only access**
Users with read only access can log in, view all alerts, and related information.
They will not be able to change alert states, submit files for deep analysis or perform any state changing operations.
-Assigning read only access rights requires adding the users to the "Security Reader” AAD built-in role.
+Assigning read only access rights requires adding the users to the "Security Reader" AAD built-in role.
Use the following steps to assign security roles:
@@ -59,7 +59,7 @@ Add-MsolRoleMember -RoleName "Security Administrator" -RoleMemberEmailAddress "s
```
- For **read only** access, assign users to the security reader role by using the following command:
```text
-Add-MsolRoleMember -RoleName "Security Reader" -RoleMemberEmailAddress "reader@Contoso.onmicrosoft.com”
+Add-MsolRoleMember -RoleName "Security Reader" -RoleMemberEmailAddress "reader@Contoso.onmicrosoft.com"
```
For more information see, [Manage Azure AD group and role membership](https://technet.microsoft.com/library/321d532e-407d-4e29-a00a-8afbe23008dd#BKMK_ManageGroups).
diff --git a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md
index 67d46de869..b2a299bc8c 100644
--- a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md
@@ -34,26 +34,27 @@ The integration will allow MSSPs to take the following actions:
- Get email notifications, and
- Fetch alerts through security information and event management (SIEM) tools
-## Initial steps
Before MSSPs can take these actions, the MSSP customer will need to grant access to their Windows Defender ATP tenant so that the MSSP can access the portal.
-Typically, MSSP customers take the initial configuration steps to grant MSSPs access to their Windows Defender Security Central tenant. After access is granted, , other configuration steps can be done by either the MSSP customer or the MSSP.
+Typically, MSSP customers take the initial configuration steps to grant MSSPs access to their Windows Defender Security Central tenant. After access is granted, other configuration steps can be done by either the MSSP customer or the MSSP.
+In general, the following configuration steps need to be taken:
-In general, the following configuration steps need to be taken
+- **Grant the MSSP access to Windows Defender Security Center**
+This action needs to be done by the MSSP customer. It grants the MSSP access to the MSSP customer's Windows Defender ATP tenant.
-- **Action**: Configure managed service provider user access to the Windows Defender Security Center portal.
**Taken by**: MSSP customer
+- **Configure alert notifications sent to MSSPs**
+This action can be taken by either the MSSP customer or MSSP. This lets the MSSPs know what alerts they need to address for the MSSP customer.
-- **Action**: Configure alert notifications sent to MSSPs
**Taken by**: MSSP customer or MSSP
+- **Fetch alerts from MSSP customer's tenant into SIEM system**
+This action is taken by the MSSP. It allows MSSPs to fetch alerts in SIEM tools.
-- **Action**: Fetch alerts from MSSP customer's tenant into SIEM system
**Taken by**: MSSP
-
-- **Action**: [LZ]Fetch data using WD ATP API's
**Taken by**: MSSP
+- **Fetch alerts from MSSP customer's tenant using APIs**
+This action is taken by the MSSP. It allows MSSPs to fetch alerts using APIs.
-## Configure managed service provider user access to the portal
-
+## Grant the MSSP access to the portal
>[!NOTE]
>These set of steps are directed towards the MSSP customer. Access to the portal can can only be done by the MSSP customer.
@@ -67,24 +68,23 @@ To grant portal access to the MSSP, you must add the MSSP user to your Azure AD
Adding a guest user is done in a similar way to regular users. They must be added to a corresponding group.
-For role-based access control (RBAC) version 1 customers: Guest users must be assigned to directory roles (security administrator or security reader).
+If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role. For more information, see [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md).
-For role-based access control (RBAC) version 2 customers: Guest users must be added to corresponding group or groups.
-
-Fore more information on RBAC in Windows Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection).
+If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups. Fore more information on RBAC in Windows Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection).
>[!NOTE]
> There is no difference between the Member user and Guest user roles from RBAC perspective.
-
It is recommended that groups are created for MSSPs to make authorization access more manageable.
As a MSSP customer, you can always remove or modify the permissions granted to the MSSP by updating the Azure AD user groups.
## Access the Windows Defender Security Center MSSP customer portal
-By default, MSSP customers access their Windows Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`.
+>[!NOTE]
+>These set of steps are directed towards the MSSP.
+By default, MSSP customers access their Windows Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`.
MSSPs however, will need to use a tenant-specific URL in the following format: `https://securitycenter.windows.com?tid=target_tenant_id` to access the MSSP customer portal.
@@ -97,7 +97,7 @@ Use the following steps to obtain the MSSP customer tenant ID and then use the I
2. Switch directory to the MSSP customer's tenant.
-3. Select** Azure Active Directory > Properties**. You'll find the tenant ID in the Directory ID field.
+3. Select **Azure Active Directory > Properties**. You'll find the tenant ID in the Directory ID field.
4. Access the MSSP customer portal by replacing the `tenant_id` value in the following URL: `https://securitycenter.windows.com?tid=target_tenant_id`.
@@ -111,20 +111,27 @@ After access the portal is granted, alert notification rules can to be created s
For more information, see [Create rules for alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md#create-rules-for-alert-notifications).
These check boxes must be checked:
- - **Include organization name** - The customer name will be added to email notifications
- - **Include tenant-specific portal link** - Alert link URL will have tenant specific parameter (tid=target_tenant_id) that allows direct access to target tenant portal
+ - **Include organization name** - The customer name will be added to email notifications
+ - **Include tenant-specific portal link** - Alert link URL will have tenant specific parameter (tid=target_tenant_id) that allows direct access to target tenant portal
+
+
+## Fetch alerts from MSSP customer's tenant into the SIEM system
+
+>[!NOTE]
+>This action is taken by the MSSP.
-## Fetch alerts from customer tenants into mssp SIEM system
To fetch alerts into your SIEM system you'll need to take the following steps:
-Step 1: Create a third-party application
-Step 2: Get access and refresh tokens from your customer's tenant
-Step 3: Whitelist your application on Windows Defender Security Center
+Step 1: Create a third-party application
+
+Step 2: Get access and refresh tokens from your customer's tenant
+
+Step 3: Whitelist your application on Windows Defender Security Center
-## Customer steps
-## Step 1: Create an application in Azure Active Directory (Azure AD)
+
+### Step 1: Create an application in Azure Active Directory (Azure AD)
You'll need to create an application and grant it permissions to fetch alerts from your customer's Windows Defender ATP tenant.
1. Sign in to the [Azure AD portal](https://aad.portal.azure.com/).
@@ -160,7 +167,7 @@ You'll need to create an application and grant it permissions to fetch alerts fr
13. Click **Save**. Save the value is a safe place, you'll need this
-## Step 2: Get access and refresh tokens from your customer's tenant
+### Step 2: Get access and refresh tokens from your customer's tenant
This section guides you on how to use a PowerShell script to get the tokens from your customer's tenant. This script uses the application from the previous step to get the access and refresh tokens using the OAuth Authorization Code Flow.
After providing your credentials, you'll need to grant consent to the application so that the application is provisioned in the customer's tenant.
@@ -235,10 +242,10 @@ After providing your credentials, you'll need to grant consent to the applicatio
8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector.
-## Step 3: Whitelist your application on Windows Defender Security Center
+### Step 3: Whitelist your application on Windows Defender Security Center
You'll need to whitelist the application you created in Windows Defender Security Center.
-You'll need to have Manage portal system settings permission to whitelist the application. Otherwise, you'll need to request your customer to whitelist the application for you.
+You'll need to have **Manage portal system settings** permission to whitelist the application. Otherwise, you'll need to request your customer to whitelist the application for you.
1. Go to `https://securitycenter.windows.com?tid=` (replace \ with the customer's tenant ID.
@@ -246,7 +253,7 @@ You'll need to have Manage portal system settings permission to whitelist the ap
3. Select the **MSSP** tab.
-4. Enter the Application ID from the first step and your Tenant ID.
+4. Enter the **Application ID** from the first step and your **Tenant ID**.
5. Click **Authorize application**.
@@ -254,3 +261,13 @@ You can now download the relevant configuration file for your SIEM and connect t
- In the ArcSight configuration file / Splunk Authentication Properties file – you will have to write your application key manually by settings the secret value.
- Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means).
+
+## Fetch alerts from MSSP customer's tenant using APIs
+For information on how to fetch alerts using REST API, see [Pull alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md).
+
+## Related topics
+- [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md)
+- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection)
+- [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md)
+- [Pull alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md)
+