Edit

Share via


Configure scoped access for Microsoft Defender for Identity

As organizations grow and their identity environments become more complex, it's important to control who has access to which resources. Microsoft Defender for Identity scoping lets you focus monitoring on specific Active Directory domains. This helps improve efficiency by reducing noise from nonessential data and focusing on critical assets. You can also limit visibility to specific entities, so access matches each person's responsibilities. Scoped access is implemented by creating a custom role using Microsoft Defender XDR Unified RBAC. During the role configuration process, you define which users or groups have access to specific Active Directory domains or Microsoft Entra ID groups.

Prerequisites

Before you begin, make sure you meet the following requirements:

  • Check that Microsoft Defender for Identity sensor installed.

  • Confirm the Identity workload for URBAC is activated.

  • Ensure you have the Global Administrator or Security Administrator role in Microsoft Entra ID to create and manage custom roles.

  • Make sure Authorization permissions are configured through URBAC to manage roles without Global Administrator or Security Administrator privileges.

Configure scoping rules

To enable identity scoping, follow these steps:​

  1. Navigate to Permissions > Microsoft Defender XDR > Roles​.

    Screenshot showing the roles page in the Defender XDR portal.

  2. Select + Create custom role and follow the instructions in Create custom roles with Microsoft Defender XDR Unified RBAC

    Screenshot showing the create custom roles button.

  3. You can edit the role at any time. Select the role from the list of custom roles and choose Edit.

    Screenshot showing how to edit a custom role.

  4. Select Add assignments and add the Assignment name.

    1. Under Assign users and groups, enter the usernames or Microsoft Entra ID groups you want to assign to the role.
    2. Select Microsoft Defender for Identity as the data source.
    3. Under Scope, select the user groups (AD domains) that will be scoped to the assignment. Screenshot showing how to add Defender for Identity to your scoping role.
  5. Select Add.

Known limitations (Preview)

Defender for Identity scoping is currently in Public preview. The following table lists the current limitations and supported scenarios for scoped access in Microsoft Defender for Identity.

Note

  • Custom roles apply only to new alerts and activities. Alerts and activities triggered before a custom role was created aren't retroactively tagged or filtered.

  • Microsoft Entra ID IP alerts aren't included within scoped MDI detections.

Defender for Identity experience Status
MDI alerts and incidents Available
Hunting tables: AlertEvidence+Info, IdentityInfo, IdentityDirectoryEvents, IdentityLogonEvents, IdentityQueryEvents Available
User page and user global search Available
MDI alerts based on XDR detection platform (detection source is XDR and service source is MDI) Available
Health issues Available
Identities inventory and service accounts discovery page Available
Identities settings: sensors page, manual tagging, health issues notifications Available
Defender XDR Incident email notifications Unavailable
ISPMs and exposure management Unavailable
Download scheduled reports and Graph API Unavailable
Device and group global search and entity page Unavailable
Alert tuning and critical asset management Unavailable