Skip to content

Latest commit

 

History

History
69 lines (54 loc) · 3.89 KB

custom-roles.md

File metadata and controls

69 lines (54 loc) · 3.89 KB
title description ms.service f1.keywords ms.author author ms.localizationpriority ms.date manager audience ms.collection ms.topic search.appverid
Custom roles for role-based access control
Learn how to manage custom roles in the Microsoft Defender portal
defender-xdr
NOCSH
dansimp
dansimp
medium
08/22/2024
dansimp
ITPro
m365-security
tier3
conceptual
MOE150
MET150

Custom roles in role-based access control for Microsoft Defender portal services

By default, access to services available in the Microsoft Defender portal are managed collectively using Microsoft Entra global roles. If you need greater flexibility and control over access to specific product data, and aren't yet using the Microsoft Defender XDR Unified role-based access control (RBAC) for centralized permissions management, we recommend creating custom roles for each service.

For example, create a custom role for Microsoft Defender for Endpoint to manage access to specific Defender for Endpoint data, or create a custom role for Microsoft Defender for Office to manage access to specific email and collaboration data.

Applies to:

  • Microsoft Defender for Cloud
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Identity
  • Microsoft Defender for IoT
  • Microsoft Defender for Office 365
  • Microsoft Defender XDR
  • Microsoft Security Exposure Management (preview)
  • Microsoft Sentinel

[!INCLUDE Prerelease]

Locate custom role management settings in the Microsoft Defender portal

Each Microsoft Defender service has its own custom role management settings, with some services being represented in a central location in the Microsoft Defender portal. To locate custom role management settings in the Microsoft Defender portal:

  1. Sign in to the Microsoft Defender portal at security.microsoft.com.
  2. In the navigation pane, select Permissions.
  3. Select the Roles link for the service where you want to create a custom role. For example, for Defender for Endpoint:

:::image type="content" source="./media/custom-roles/custom-roles-endpoint.png" alt-text="Screenshot that shows Roles link for Defender for Endpoint." lightbox="./media/custom-roles/custom-roles-endpoint.png" :::

In each service, custom role names aren't connected to global roles in Microsoft Entra ID, even if similarly named. For example, a custom role named Security Admin in Microsoft Defender for Endpoint isn't connected to the global Security Admin role in Microsoft Entra ID.

Reference of Defender portal service content

For information about the permissions and roles for each Microsoft Defender XDR service, see the following articles:

Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.