Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Use Microsoft Defender Unified role-based access control (RBAC) to manage permissions for users and groups in your organization. Unified RBAC supports selecting permissions from each permission group to customize a role.
This article provides details about the permissions available to configure for your users, based on the tasks they need to do.
Unless otherwise stated, all permissions are applicable to all supported workloads and will be applied to the data scope selected during the data source and assignment stage.
Security operations – Security data
Permissions for managing day-to-day operations and responding to incidents and advisories.
Permission name | Level | Description |
---|---|---|
Security data basics | Read | View info about incidents, alerts, investigations, advanced hunting, devices, submissions, evaluation lab, and reports. View data lake data and experiences (Preview). |
Alerts | Manage | Manage alerts, start automated investigations, run scans, collect investigation packages, and manage device tags. |
Response | Manage | Take response actions, approve or dismiss pending remediation actions, and manage blocked and allowed lists for automation. |
Basic live response | Manage | Initiate a live response session, download files, and perform read-only actions on devices remotely. |
Advanced live response | Manage | Create live response sessions and perform advanced actions, including uploading files and running scripts on devices remotely. |
File collection | Manage | Collect or download relevant files for analysis, including executable files. |
Email & collaboration quarantine | Manage | View and release email from quarantine. |
Email & collaboration advanced actions | Manage | Move or Delete email to the junk email folder, deleted items or inbox, including soft and hard delete of email. |
Security operations – Raw data (Email & collaboration)
Permission name | Level | Description |
---|---|---|
Email & collaboration metadata | Read | View email and collaboration data in hunting scenarios, including advanced hunting, threat explorer, campaigns, and email entity. |
Email & collaboration content | Read | View and download email content and attachments. |
Security posture – Posture management
Permissions for managing the organization's security posture and performing vulnerability management.
Permission name | Level | Description |
---|---|---|
Vulnerability management | Read | View Defender Vulnerability Management data for the following: software and software inventory, weaknesses, missing KBs, advanced hunting, security baselines assessment, and devices. |
Exception handling | Manage | Create security recommendation exceptions and manage active exceptions in Defender Vulnerability Management. |
Remediation handling | Manage | Create remediation tickets, submit new requests, and manage remediation activities in Defender Vulnerability Management. |
Application handling | Manage | Manage vulnerable applications and software, including blocking and unblocking them in Defender Vulnerability Management. |
Security baseline assessment | Manage | Create and manage profiles so you can assess if your devices comply with security industry baselines. |
Exposure Management | Read / Manage | View or manage Exposure Management insights, including Microsoft Secure Score recommendations from all products that are covered by Secure Score. |
Authorization and settings
Permissions to manage the security and system settings and to create and assign roles.
Permission name | Level | Description |
---|---|---|
Authorization | Read / Manage | View or manage device groups, and custom and built-in roles. |
Core security settings | Read / Manage | View or manage core security settings for the Microsoft Defender portal. |
Detection tuning | Manage | Manage tasks related to detections in the Microsoft Defender portal including Custom detections, Alerts Tuning and Threat Indicators of compromise. |
System settings | Read / Manage | View or manage general systems settings for the Microsoft Defender portal. |
Data operations (Preview)
Permissions for managing the organization's security data and controlling advanced analytics permissions, supported for Microsoft Sentinel workspaces onboarded to the Defender portal and the Microsoft Sentinel data lake.
The following permissions can be assigned for both Microsoft Sentinel SIEM and data lake capabilities, which includes data lake data stored in the default data lake workspace.
Permission name | Level | Description |
---|---|---|
Data | Manage | Manage data retention, move data between tiers, create data lake tables, and manage connectors for the Microsoft Sentinel data lake. |
Analytics Jobs Schedule | Read / Manage | Schedule and manage analytics jobs within the Microsoft Sentinel data lake using Lake Exploration, Azure Data Explorer, or Notebooks. |
Next steps
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.