Skip to content

Commit 430e763

Browse files
Merge pull request #5686 from MicrosoftDocs/main
[AutoPublish] main to live - 11/19 13:29 PST | 11/20 02:59 IST
2 parents e6dae85 + a1fbb40 commit 430e763

File tree

2 files changed

+9
-8
lines changed

2 files changed

+9
-8
lines changed

defender-office-365/reports-email-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Reports replaced, moved, or deprecated are described in the following table.
6161
|**Spam detection report** <br><br> Get-MailTrafficReport <br> Get-MailDetailSpamReport|[Threat protection status report: View data by Email \> Spam](#view-data-by-email--spam-and-chart-breakdown-by-detection-technology) <br><br> [Get-MailTrafficATPReport](/powershell/module/exchangepowershell/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchangepowershell/get-maildetailatpreport)|MC250529|October 2021|
6262
|Get-AdvancedThreatProtectionDocumentReport <br><br> Get-AdvancedThreatProtectionDocumentDetail|[Get-ContentMalwareMdoAggregateReport](/powershell/module/exchangepowershell/get-contentmalwaremdoaggregatereport) <br><br> [Get-ContentMalwareMdoDetailReport](/powershell/module/exchangepowershell/get-contentmalwaremdodetailreport)|MC343433|May 2022|
6363
|**Exchange transport rule report** <br><br> [Get-MailTrafficPolicyReport](/powershell/module/exchangepowershell/get-mailtrafficpolicyreport) <br> [Get-MailDetailTransportRuleReport](/powershell/module/exchangepowershell/get-maildetailtransportrulereport)|[Exchange transport rule report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-exchange-transport-rule-report) <br><br> [Get-MailTrafficPolicyReport](/powershell/module/exchangepowershell/get-mailtrafficpolicyreport) <br> [Get-MailDetailTransportRuleReport](/powershell/module/exchangepowershell/get-maildetailtransportrulereport)|MC316157|April 2022|
64-
|Get-MailTrafficTopReport|[Top senders and recipient report](reports-email-security.md#top-senders-and-recipients-report) <br><br> [Get-MailTrafficSummaryReport](/powershell/module/exchangepowershell/get-mailtrafficsummaryreport) <br><br> **Note**: There's no replacement for the encryption reporting capabilities in Get-MailTrafficTopReport.|MC315742|April 2022|
64+
|Get-MailTrafficTopReport|[Top senders and recipient report](reports-email-security.md#top-senders-and-recipients-report) <br><br> [Get-MailTrafficSummaryReport](/powershell/module/exchangepowershell/get-mailtrafficsummaryreport) <br><br> [Microsoft Purview Reports overview](/purview/purview-reports)|MC315742|April 2022|
6565

6666
## Compromised users report
6767

defender-xdr/m365d-action-center.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,8 @@ The improved Action center includes an **Action source** column that tells you w
114114

115115
## Required permissions for Action center tasks
116116

117-
To perform tasks, such as approving or rejecting pending actions in the Action center, you need specific permissions. You have the following options:
117+
To perform tasks, such as approving or rejecting pending actions in the Action center, you need specific permissions.
118+
You have the following options:
118119

119120
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
120121
- _Microsoft Defender for Endpoint remediation (devices)_: Membership in the **Security Administrator** role.
@@ -133,12 +134,12 @@ To perform tasks, such as approving or rejecting pending actions in the Action c
133134

134135
- Membership in a role group in [Email & collaboration permissions](/defender-office-365/mdo-portal-permissions) with the **Search and Purge** role assigned. By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups in Email & collaboration permissions. You can add users to those role groups, or you can [create a new role group in Email & collaboration permissions](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
135136

136-
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac)
137-
- _Microsoft Defender for Endpoint remediation_: **Security operations \ Security data \ Response (manage)**.
138-
- _Microsoft Defender for Office 365 remediation_ (Office content and email, if **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="/defender-office-365/media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
139-
- _Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
140-
- _Remediate malicious email_: **Security operations/Security data/Email & collaboration advanced actions (manage)**.
141-
137+
- [Microsoft Defender XDR Unified role based access control (URBAC)](manage-rbac.md)
138+
- _Microsoft Defender for Endpoint remediation_: **Security operations \ Security data \ Response (manage)**.
139+
- _Microsoft Defender for Office 365 remediation_ (Office content and email, if **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="/defender-office-365/media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
140+
- _Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
141+
- _Remediate malicious email_: **Security operations/Security data/Email & collaboration advanced actions (manage)**.
142+
142143
> [!TIP]
143144
> Membership in the **Security Administrator** role group Email & collaboration permissions doesn't grant access to the Action center or Microsoft Defender XDR capabilities. For those, you need to be a member of the **Security Administrator** role in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
144145

0 commit comments

Comments
 (0)