Forum Discussion
"New" home endpoint https://security.microsoft.com/?tid=<TenantGUID> does not work
So windows defender ATP .. err.. Microsoft Defender Endpoint is now starting to push the console functionality from the old securecenter.microsoft.com url to the "new" consolidated security.microsoft.com
One huge problem is that the "new" url does not support the https://security.microsoft.com/?tid=<TenantGUID> functionality.
Please fix the "https://security.microsoft.com/?tid=" functionality before you start moving blades/links on the DefenderATP console to take you to the new page.
Thank you!
3 Replies
- Sonali_Meshram
Microsoft
Hi Neil,
Thank you for your feedback on this issue.
Currently, we do not support tenant switch in same browser. If you want to switch tenants, please sign out of the first tenant from your browser and then sign in to the next tenant using the above URL pattern for delegated access.
Thank You!- Neil GoldsteinIron Contributor
====
Sonali,
I am not talking about tenant switch - I am talking about the loss of serviceability.
Scenario:
- Consultant X supports 10 small clients, each has M365-E5 user count of 10 thus having access to Defender for Endpoint.
- Each customer has their CSP licenses using CSP-Direct (some with Insight, some with CDW, etc) -- NOT with consultant X
- Consultant X has O365-E3 license but does NOT have access to Defender for Endpoint on own tenant.
- Consultant X login has access rights to manage/operate Defender for Endpoint, MCAS, Intune, etc. on each client tenant.
Current Access:
- Defender for endpoint: https://securitycenter.windows.com/?tid=<customer
- Intune/Endpoint: https://endpoint.microsoft.com/?tid=<customerID>
- MCAS: https://portal.cloudappsecurity.com/?tid=<customerID>
- AzureAD https://aad.portal.azure.com/<TenantRootDomain> (aka blah.OnMicrosoft.com)
- M365AdminCenter: https://portal.office.com/Partner/BeginClientSession.aspx?CTID=%3CClientTenantID%3E&CSDEST=o365admincenter
PROBLEM: But what doesn't work...
- https://Security.Microsoft.com
That only works if I am logging on with a user WITHIN the tenant.
i.e. Consultant X needs a dedicated user license with each client like mailto:ConsultantX@CustomerY.com just to access the security.microsoft.com page.
Tenant switching within Security.Microsoft.com would be nice .. but at this point I just need an access method where an EXTERNAL user account that has been granted access to manage Defender for Endpoint can login.
Either that or please STOP the forced switch to security.microsoft.com and leave access to securitycenter.microsoft.com
Thank you.
- SerggIron Contributor
Neil GoldsteinI agree the situation should be more consistent. And thank you very much for sharing the link for switching Azure AD in Office 365!!!
M365AdminCenter: https://portal.office.com/Partner/BeginClientSession.aspx?CTID=%3CClientTenantID%3E&CSDEST=o365admincenter
The above works well.