3.4 KiB
title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title | description | keywords | search.product | search.appverid | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.topic |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Use basic permissions to access Microsoft Defender Security Center | Assign read and write or read only access to the Microsoft Defender Advanced Threat Protection portal. | assign user roles, assign read and write access, assign read only access, user, user roles, roles | eADQiWindows 10XVcnh | met150 | w10 | deploy | library | security | macapara | mjcaparas | medium | dansimp | ITPro | M365-security-compliance | article |
Use basic permissions to access the portal
Applies to:
- Azure Active Directory
- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)
Want to experience Microsoft Defender ATP? Sign up for a free trial.
Refer to the instructions below to use basic permissions management.
You can use either of the following:
- Azure PowerShell
- Azure Portal
For granular control over permissions, switch to role-based access control.
Assign user access using Azure PowerShell
You can assign users with one of the following levels of permissions:
- Full access (Read and Write)
- Read-only access
Before you begin
-
Install Azure PowerShell. For more information see, How to install and configure Azure PowerShell.
Note
You need to run the PowerShell cmdlets in an elevated command-line.
-
Connect to your Azure Active Directory. For more information see, Connect-MsolService.
Full access
Users with full access can log in, view all system information and resolve alerts, submit files for deep analysis, and download the onboarding package.
Assigning full access rights requires adding the users to the "Security Administrator" or "Global Administrator" AAD built-in roles.
Read only access
Users with read only access can log in, view all alerts, and related information.
They will not be able to change alert states, submit files for deep analysis or perform any state changing operations.
Assigning read only access rights requires adding the users to the "Security Reader" AAD built-in role.
Use the following steps to assign security roles:
- For read and write access, assign users to the security administrator role by using the following command:
Add-MsolRoleMember -RoleName "Security Administrator" -RoleMemberEmailAddress "secadmin@Contoso.onmicrosoft.com"
- For read only access, assign users to the security reader role by using the following command:
Add-MsolRoleMember -RoleName "Security Reader" -RoleMemberEmailAddress "reader@Contoso.onmicrosoft.com"
For more information see, Add or remove group memberships.
Assign user access using the Azure portal
For more information, see Assign administrator and non-administrator roles to uses with Azure Active Directory.