From 86659ded2eba2d846d3f08f82c1d789a6cdddae4 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Wed, 13 Jul 2016 18:05:05 +1000 Subject: [PATCH] add line break --- ...rtal-access-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md index 9291c2ab1b..03237e1d15 100644 --- a/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -22,11 +22,11 @@ Windows Defender ATP users and access permissions are managed in Azure Active Di - Full access (Read and Write) - Read only access -**Full access** +**Full access**
Users with full access can log in, view all system information as well as resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to the “Security Administrator” or “Global Administrator” AAD built-in roles. -**Read only access** +**Read only access**
Users with read only access can log in, view all alerts, and related information. They will not be able to change alert states, submit files for deep analysis or perform any state changing operations. Assigning read only access rights requires adding the users to the “Security Reader” AAD built-in role.