Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
As organizations grow and their identity environments become more complex, it's important to control who has access to which resources. Microsoft Defender for Identity scoping lets you focus monitoring on specific Active Directory domains. This helps improve efficiency by reducing noise from nonessential data and focusing on critical assets. You can also limit visibility to specific entities, so access matches each person's responsibilities. Scoped access is implemented by creating a custom role using Microsoft Defender XDR Unified RBAC. During the role configuration process, you define which users or groups have access to specific Active Directory domains or Microsoft Entra ID groups.
Prerequisites
Before you begin, make sure you meet the following requirements:
Check that Microsoft Defender for Identity sensor installed.
Confirm the Identity workload for URBAC is activated.
Ensure you have the Global Administrator or Security Administrator role in Microsoft Entra ID to create and manage custom roles.
Make sure Authorization permissions are configured through URBAC to manage roles without Global Administrator or Security Administrator privileges.
Configure scoping rules
To enable identity scoping, follow these steps:
Navigate to Permissions > Microsoft Defender XDR > Roles.
Select + Create custom role and follow the instructions in Create custom roles with Microsoft Defender XDR Unified RBAC
You can edit the role at any time. Select the role from the list of custom roles and choose Edit.
Select Add assignments and add the Assignment name.
- Under Assign users and groups, enter the usernames or Microsoft Entra ID groups you want to assign to the role.
- Select Microsoft Defender for Identity as the data source.
- Under Scope, select the user groups (AD domains) that will be scoped to the assignment.
Select Add.
Known limitations (Preview)
Defender for Identity scoping is currently in Public preview. The following table lists the current limitations and supported scenarios for scoped access in Microsoft Defender for Identity.
Note
Custom roles apply only to new alerts and activities. Alerts and activities triggered before a custom role was created aren't retroactively tagged or filtered.
Microsoft Entra ID IP alerts aren't included within scoped MDI detections.
Defender for Identity experience | Status |
---|---|
MDI alerts and incidents | Available |
Hunting tables: AlertEvidence+Info, IdentityInfo, IdentityDirectoryEvents, IdentityLogonEvents, IdentityQueryEvents | Available |
User page and user global search | Available |
MDI alerts based on XDR detection platform (detection source is XDR and service source is MDI) | Available |
Health issues | Available |
Identities inventory and service accounts discovery page | Available |
Identities settings: sensors page, manual tagging, health issues notifications | Available |
Defender XDR Incident email notifications | Unavailable |
ISPMs and exposure management | Unavailable |
Download scheduled reports and Graph API | Unavailable |
Device and group global search and entity page | Unavailable |
Alert tuning and critical asset management | Unavailable |
Related articles
- Microsoft Defender for Identity role groups
- Microsoft Defender XDR Unified role-based access control (RBAC)
- Create custom roles with Microsoft Defender XDR Unified RBAC
- Import roles to Microsoft Defender XDR Unified role-based access control (RBAC)
- Activate Microsoft Defender XDR Unified role-based access control (RBAC)