Loading...

Centrally manage permissions with the Microsoft 365 Defender role-based access control (RBAC) model

Centrally manage permissions with the Microsoft 365 Defender role-based access control (RBAC) model

We are excited to announce the public preview of a central role-based access control (RBAC) capability to help unify roles and permissions management across Microsoft Defender for Endpoint, Microsoft Defender for Office 365, and Microsoft Defender for Identity.

 

The new Microsoft 365 Defender RBAC model, part of Microsoft’s leading Extended Detection and Response (XDR) solution, is an impactful enabler for security admins to centrally manage privileges across domains. It offers a unified and granular cross-services access permission model to help the Security Operations Center (SOC) increase productivity across the various Microsoft Defender products. Additionally, the new model is fully compatible with existing individual RBAC models currently supported in Microsoft 365 Defender portal.

 

Image 1: Access to the new Microsoft 365 Defender RBAC model from the Permissions pageImage 1: Access to the new Microsoft 365 Defender RBAC model from the Permissions page

 

The new Microsoft 365 Defender RBAC experience
Microsoft 365 Defender provides integrated threat protection, detection, and response across endpoints, email, identities, applications, and data within a single portal. The new RBAC model now takes this experience to the next level by allowing admins to centrally manage privileges across these services with a greater efficiency. While Defender for Cloud Apps is not covered in this initial preview, it will be added to the new RBAC model in the future.


The new model organizes permissions by categories. For example, the “Security operations” category includes permissions that are required to perform daily security operations activities and allows admins to either grant out-of-the-box permissions on a per category basis or select permissions one-by-one for custom roles.


In the new model, permissions can be scoped to individual users and/or security groups. By default, custom roles created in the Microsoft 365 Defender RBAC model are scoped to all data sources. However, if needed, a role can be scoped to one or more specific data sources.


To make it easy for you to adopt the new RBAC model, we support role import capabilities so that you can import existing roles from any of our current individual RBAC models to the new Microsoft 365 Defender RBAC model with a click of a button.

 

Image 2: Microsoft 365 Defender RBAC main grid. Here you can create new custom roles, import existing roles, activate the new RBAC model for one or more of your workloads, and access technical documentation.Image 2: Microsoft 365 Defender RBAC main grid. Here you can create new custom roles, import existing roles, activate the new RBAC model for one or more of your workloads, and access technical documentation.

 

Supported Products

  • Microsoft Defender for Endpoint – full support for all endpoint data and actions. All roles are compatible with Defender for Endpoint’s device group aligning.
  • Microsoft Defender for Office 365 – support for the SecOps scenarios that are managed in the Microsoft Defender portal.
    Note: Scenarios that adhere to Exchange Online roles are not impacted by this new model and will still be managed by Exchange Online.
  • Microsoft Defender for Identity – Full support for all identity data and actions.
    Microsoft Defender for Cloud Apps – Will be added in the future.

 

Getting Started
Here is how you can get started with the new RBAC model:

If you don’t have any existing roles assigned:

  1. Start by creating custom roles: Enter the role name and description, select permissions, assign the role to users/a user group
  2. Activate Microsoft 365 Defender RBAC
  3. Edit or delete roles anytime as needed

You can find more details on how to create custom roles in our technical documentation.

If you have existing roles within any of the workloads:

  1. Import roles from the relevant workloads such as Defender for Endpoint, Defender for Identity or Defender for Office 365
  2. Review and modify as needed
  3. Activate M365 Defender RBAC

You can find more details on how to import roles in our technical documentation.

Notes:

  • There will be no immediate change to the way Microsoft 365 Defender enforces permissions until admins activate the new RBAC model per workload. Only after activation, the new custom roles and imported roles will become effective.
  • Only one permissions model can be honored at any given time, but the users will have the option to revert to the individual RBAC model if desired.

 

What about Azure Active Directory global roles and Privileged Identity Management?

Microsoft 365 Defender security portal will continue to respect existing Azure Active Directory global roles when you activate the Microsoft 365 Defender RBAC model for some or all workloads, i.e., Global Admins will retain assigned admin privileges.


However, with the new RBAC model you will have the flexibility to create more granular roles where appropriate, following the principle of least privilege and granting users only the privileges they need.

 

More information

  • Ready to get started? Check out our technical documentation on how to transition to the new Microsoft 365 Defender RBAC model
  • Let us know what you think! Share your feedback with us in the Microsoft 365 Defender portal feedback tool. Learn more about our feedback tool here.

Published on:

Learn more
Microsoft 365 Defender Blog articles
Microsoft 365 Defender Blog articles

Microsoft 365 Defender Blog articles

Share post:

Related posts

Microsoft SharePoint: Storage insights will be included in Microsoft 365 admin center usage reports

Microsoft SharePoint will add a new Storage tab to the Microsoft 365 admin center usage reports, providing insights on quota consumption and s...

5 hours ago

Microsoft Viva Insights | Copilot Analytics: Unified experience for Copilot Dashboard and Insights analyst workbench

Microsoft Viva Insights will introduce a unified Copilot Analytics experience for Copilot Dashboard users and Viva Insights analysts. This rol...

5 hours ago

Microsoft Viva Engage: Centralized admin role management from the Engage admin center

Microsoft Viva Engage is launching centralized admin role management in mid-May 2025, simplifying role assignments and management. This update...

5 hours ago

Microsoft 365 Copilot for Sales – Seamlessly Capture Sales Meetings with Automatic Recordings

We are announcing the ability to seamlessly Capture Sales Meetings with Automatic Recordings for Microsoft 365 Copilot for Sales. This feature...

1 day ago

Microsoft Teams: Call quality reports for Bring Your Own Device (BYOD) rooms in the Pro Management portal

Admins can now access detailed call quality reports for BYOD rooms in the Pro Management portal, requiring a Teams Shared Devices license. Thi...

1 day ago

Microsoft Teams: Unified attachment flow on Teams Mobile

Microsoft Teams is introducing a new content picker for the Teams Mobile Android app, allowing users to attach any type of content easily. The...

1 day ago

Microsoft 365: Dynamic rules for Microsoft 365 Backup to simplify backup management at scale

Dynamic rules for Microsoft 365 Backup, released in April 2025, automate backup policies based on distribution lists and security group member...

1 day ago

Microsoft Copilot(Microsoft 365 Mobile Apps): Advanced Data Analysis in Copilot Chat

Advanced Data Analysis in Microsoft 365 Mobile Apps’ Copilot Chat will roll out globally from mid-May to late May 2025. It enables users...

1 day ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy