Microsoft Defender for Identity role groups

Microsoft Defender for Identity offers role-based security to safeguard data according to your organization's specific security and compliance needs. We recommend that you use role groups to manage access to Defender for Identity, segregating responsibilities across your security team and granting only the amount of access that users need to do their jobs.

Unified role-based access control (RBAC)

Users that are already Global Administrators or Security Administrators on your tenant's Microsoft Entra ID are also automatically Defender for Identity administrator. Microsoft Entra Global and Security Administrators don't need extra permissions to access Defender for Identity.

For other users, use Microsoft 365 role-based access control (RBAC) to create custom roles and manage access to Defender for Identity.

When creating your custom roles, make sure that you apply the permissions listed in the following table:

Defender for Identity access level Minimum required Microsoft 365 unified RBAC permissions
Administrators - Authorization and settings/Security settings/Read
- Authorization and settings/Security settings/All permissions
- Authorization and settings/System settings/Read
- Authorization and settings/System settings/All permissions
- Security operations/Security data/Alerts (manage)
-Security operations/Security data /Security data basics (Read)
- Authorization and settings/Authorization/All permissions
- Authorization and settings/Authorization/Read
Users - Security operations/Security data /Security data basics (Read)
- Authorization and settings/System settings/Read
- Authorization and settings/Security settings/Read
- Security operations/Security data/Alerts (manage)
- microsoft.xdr/configuration/security/manage
Viewers - Security operations/Security data /Security data basics (Read)
- Authorization and settings/System settings/Read
- Authorization and settings/Security settings/Read

For more information, see Custom roles in role-based access control for Microsoft Defender XDR and Create custom roles with Microsoft Defender XDR Unified RBAC.

Note

Information included from the Defender for Cloud Apps activity log may still contain Defender for Identity data. This content adheres to existing Defender for Cloud Apps permissions.

Required permissions Defender for Identity in Microsoft Defender XDR

The following table details the specific permissions required for Defender for Identity activities in Microsoft Defender XDR.

Activity Required permissions
Onboard Defender for Identity (create workspace) One of the following Microsoft Entra roles:
- Global Administrator
- Security Administrator
Configure Defender for Identity settings One of the following Microsoft Entra roles:
- Global Administrator
- Security Administrator
Or
The following Unified RBAC permissions:
- Authorization and settings/Security settings/Read
- Authorization and settings/Security settings/All permissions
- Authorization and settings/System settings/Read
- Authorization and settings/System settings/All permissions
Manage Defender for Identity security alerts and activities One of the Microsoft Entra roles required by Microsoft Defender XDR
Or
The following Unified RBAC permissions:
- Security operations/Security data/Alerts (Manage)
- Security operations/Security data /Security data basics (Read)
View Defender for Identity security assessments
(now part of Microsoft Secure Score)
Permissions to access Microsoft Secure Score
And
The following Unified RBAC permissions: Security operations/Security data /Security data basics (Read)
View the Assets / Identities page Permissions to access Defender for Cloud Apps
Or
One of the Microsoft Entra roles required by Microsoft Defender XDR
Perform Defender for Identity response actions A custom role defined with permissions for Response (manage)
Or
One of the Microsoft Entra roles required by Microsoft Defender XDR

Defender for Identity security groups

Defender for Identity provides the following security groups to help manage access to Defender for Identity resources:

  • Azure ATP (workspace name) Administrators
  • Azure ATP (workspace name) Users
  • Azure ATP (workspace name) Viewers

The following table lists the activities available for each security group:

Activity Azure ATP (workspace name) Administrators Azure ATP (Workspace name) Users Azure ATP (Workspace name) Viewers
Change health issue status Available Not available Not available
Change security alert status (reopen, close, exclude, suppress) Available Available Not available
Delete workspace Available Not available Not available
Download a report Available Available Available
Sign in Available Available Available
Share/Export security alerts (via email, get link, download details) Available Available Available
Update Defender for Identity configuration (updates) Available Not available Not available
Update Defender for Identity configuration (entity tags, including both sensitive and honeytoken) Available Available Not available
Update Defender for Identity configuration (exclusions) Available Available Not available
Update Defender for Identity configuration (language) Available Available Not available
Update Defender for Identity configuration (notifications, including both email and syslog) Available Available Not available
Update Defender for Identity configuration (preview detections) Available Available Not available
Update Defender for Identity configuration (scheduled reports) Available Available Not available
Update Defender for Identity configuration (data sources, including directory services, SIEM, VPN, Defender for Endpoint) Available Not available Not available
Update Defender for Identity configuration (sensor management, including downloading software, regenerating keys, configuring, deleting) Available Not available Not available
View entity profiles and security alerts Available Available Available

Add and remove users

Defender for Identity uses Microsoft Entra security groups as a basis for role groups.

Manage your role groups from Groups management page on the Azure portal. Only Microsoft Entra users can be added or removed from security groups.

Next step