Skip to content

Commit

Permalink
Merge pull request #4733 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
7/17/2023 AM Publish
  • Loading branch information
Taojunshen authored Jul 17, 2023
2 parents 8187011 + 7066f8c commit ba70917
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -175,7 +175,7 @@ This section describes how you should monitor and protect Azure resources in sub

MDE uses the [Microsoft 365 Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal) and [permissions model](/microsoft-365/admin/add-users/about-admin-roles). So you must use external identities (B2B guests) to give security operators in the primary tenant access to MDE. Assign MDE roles to Azure AD security groups and add the guests as group members so they can [take response actions](/microsoft-365/security/defender-endpoint/respond-machine-alerts) on servers.

*Configure MDE.* You need to configure a manage [device groups](/microsoft-365/security/defender-endpoint/machine-groups) and [roles](/microsoft-365/security/defender-endpoint/user-roles) in Microsoft Defender for Endpoint for the secondary tenant.
*Configure MDE.* You need to configure and manage [device groups](/microsoft-365/security/defender-endpoint/machine-groups) and [roles](/microsoft-365/security/defender-endpoint/user-roles) in Microsoft Defender for Endpoint for the secondary tenant.

## Next step

Expand Down

0 comments on commit ba70917

Please sign in to comment.