Forum Discussion
"New" home endpoint https://security.microsoft.com/?tid=<TenantGUID> does not work
====
Sonali,
I am not talking about tenant switch - I am talking about the loss of serviceability.
Scenario:
- Consultant X supports 10 small clients, each has M365-E5 user count of 10 thus having access to Defender for Endpoint.
- Each customer has their CSP licenses using CSP-Direct (some with Insight, some with CDW, etc) -- NOT with consultant X
- Consultant X has O365-E3 license but does NOT have access to Defender for Endpoint on own tenant.
- Consultant X login has access rights to manage/operate Defender for Endpoint, MCAS, Intune, etc. on each client tenant.
Current Access:
- Defender for endpoint: https://securitycenter.windows.com/?tid=<customer
- Intune/Endpoint: https://endpoint.microsoft.com/?tid=<customerID>
- MCAS: https://portal.cloudappsecurity.com/?tid=<customerID>
- AzureAD https://aad.portal.azure.com/<TenantRootDomain> (aka blah.OnMicrosoft.com)
- M365AdminCenter: https://portal.office.com/Partner/BeginClientSession.aspx?CTID=%3CClientTenantID%3E&CSDEST=o365admincenter
PROBLEM: But what doesn't work...
- https://Security.Microsoft.com
That only works if I am logging on with a user WITHIN the tenant.
i.e. Consultant X needs a dedicated user license with each client like mailto:ConsultantX@CustomerY.com just to access the security.microsoft.com page.
Tenant switching within Security.Microsoft.com would be nice .. but at this point I just need an access method where an EXTERNAL user account that has been granted access to manage Defender for Endpoint can login.
Either that or please STOP the forced switch to security.microsoft.com and leave access to securitycenter.microsoft.com
Thank you.
Neil GoldsteinI agree the situation should be more consistent. And thank you very much for sharing the link for switching Azure AD in Office 365!!!
M365AdminCenter: https://portal.office.com/Partner/BeginClientSession.aspx?CTID=%3CClientTenantID%3E&CSDEST=o365admincenter
The above works well.