The built-in roles in Azure Active Directory are not for everyone. They are over-privileged and configured so by default.
In this session, you will learn how to implement a role-based access (RBAC) model in Microsoft Defender. Using Azure native features such as Privileged Access Groups (PAGs), Privileged Identity Management (PIM), and Privileged Access Workstations (PAWs), we can solidify the access model towards the Defender features, thus making sure that everyone has a role following Principle of Least Privilege (PoLP) and are connecting to some of the most sensitive things in the security stack in a secure way.