Skip to content

Latest commit

 

History

History
67 lines (54 loc) · 3.92 KB

File metadata and controls

67 lines (54 loc) · 3.92 KB
title Custom roles for role-based access control
description Learn how to manage custom roles for Microsoft Defender XDR in the Microsoft Defender portal.
ms.service defender-xdr
f1.keywords
NOCSH
ms.author guywild
author guywi-ms
ms.localizationpriority medium
ms.date 04/25/2025
manager deniseb
audience ITPro
ms.collection
m365-security
tier3
ms.topic concept-article
search.appverid
MOE150
MET150
appliesto
Microsoft Defender for Cloud
Microsoft Defender for Cloud Apps
Microsoft Defender for Endpoint
Microsoft Defender for Identity
Microsoft Defender for IoT
Microsoft Defender for Office 365
Microsoft Defender XDR
Microsoft Security Exposure Management (preview)
Microsoft Sentinel

Custom roles in role-based access control for Microsoft Defender portal services

By default, access to services available in the Microsoft Defender portal are managed collectively using Microsoft Entra global roles. If you need greater flexibility and control over access to specific product data, and aren't yet using the Microsoft Defender XDR Unified role-based access control (RBAC) for centralized permissions management, we recommend creating custom roles for each service.

For example, create a custom role for Microsoft Defender for Endpoint to manage access to specific Defender for Endpoint data, or create a custom role for Microsoft Defender for Office to manage access to specific email and collaboration data.

[!INCLUDE Prerelease]

Locate custom role management settings in the Microsoft Defender portal

Each Microsoft Defender service has its own custom role management settings, with some services being represented in a central location in the Microsoft Defender portal. To locate custom role management settings in the Microsoft Defender portal:

  1. Sign in to the Microsoft Defender portal at security.microsoft.com.
  2. In the navigation pane, select Permissions.
  3. Select the Roles link for the service where you want to create a custom role. For example, for Defender for Endpoint:

:::image type="content" source="./media/custom-roles/custom-roles-endpoint.png" alt-text="Screenshot that shows Roles link for Defender for Endpoint." lightbox="./media/custom-roles/custom-roles-endpoint.png" :::

In each service, custom role names aren't connected to global roles in Microsoft Entra ID, even if similarly named. For example, a custom role named Security Admin in Microsoft Defender for Endpoint isn't connected to the global Security Admin role in Microsoft Entra ID.

Reference of Defender portal service content

For information about the permissions and roles for each Microsoft Defender XDR service, see the following articles:

Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.