Skip to content

Commit a1fbb40

Browse files
authored
Merge pull request #5685 from MicrosoftDocs/chrisda
Update m365d-action-center.md
2 parents 06528da + 1c207c9 commit a1fbb40

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

defender-xdr/m365d-action-center.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,8 @@ The improved Action center includes an **Action source** column that tells you w
114114

115115
## Required permissions for Action center tasks
116116

117-
To perform tasks, such as approving or rejecting pending actions in the Action center, you need specific permissions. You have the following options:
117+
To perform tasks, such as approving or rejecting pending actions in the Action center, you need specific permissions.
118+
You have the following options:
118119

119120
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
120121
- _Microsoft Defender for Endpoint remediation (devices)_: Membership in the **Security Administrator** role.
@@ -133,12 +134,12 @@ To perform tasks, such as approving or rejecting pending actions in the Action c
133134

134135
- Membership in a role group in [Email & collaboration permissions](/defender-office-365/mdo-portal-permissions) with the **Search and Purge** role assigned. By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups in Email & collaboration permissions. You can add users to those role groups, or you can [create a new role group in Email & collaboration permissions](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
135136

136-
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac)
137-
- _Microsoft Defender for Endpoint remediation_: **Security operations \ Security data \ Response (manage)**.
138-
- _Microsoft Defender for Office 365 remediation_ (Office content and email, if **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="/defender-office-365/media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
139-
- _Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
140-
- _Remediate malicious email_: **Security operations/Security data/Email & collaboration advanced actions (manage)**.
141-
137+
- [Microsoft Defender XDR Unified role based access control (URBAC)](manage-rbac.md)
138+
- _Microsoft Defender for Endpoint remediation_: **Security operations \ Security data \ Response (manage)**.
139+
- _Microsoft Defender for Office 365 remediation_ (Office content and email, if **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="/defender-office-365/media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
140+
- _Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
141+
- _Remediate malicious email_: **Security operations/Security data/Email & collaboration advanced actions (manage)**.
142+
142143
> [!TIP]
143144
> Membership in the **Security Administrator** role group Email & collaboration permissions doesn't grant access to the Action center or Microsoft Defender XDR capabilities. For those, you need to be a member of the **Security Administrator** role in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
144145

0 commit comments

Comments
 (0)