Assign user access to Microsoft Defender Security Center
- Azure Active Directory
- Office 365
- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)
Want to experience Microsoft Defender ATP? Sign up for a free trial.
Microsoft Defender ATP supports two ways to manage permissions:
- Basic permissions management: Set permissions to either full access or read-only.
- Role-based access control (RBAC): Set granular permissions by defining roles, assigning Azure AD user groups to the roles, and granting the user groups access to machine groups. For more information on RBAC, see Manage portal access using role-based access control.
If you have already assigned basic permissions, you may switch to RBAC anytime. Consider the following before making the switch:
- Users with full access (users that are assigned the Global Administrator or Security Administrator directory role in Azure AD), are automatically assigned the default Microsoft Defender ATP administrator role, which also has full access. Additional Azure AD user groups can be assigned to the Microsoft Defender ATP administrator role after switching to RBAC. Only users assigned to the Microsoft Defender ATP administrator role can manage permissions using RBAC.
- Users that have read-only access (Security Readers) will lose access to the portal until they are assigned a role. Note that only Azure AD user groups can be assigned a role under RBAC.
- After switching to RBAC, you will not be able to switch back to using basic permissions management.
Send feedback about: