System Center, Security Role Permissions... is there a guide that defines all of them?

EricM 1 Reputation point
2020-08-20T16:11:15.69+00:00

I have found a few resources that list the default Scopes and Roles, and which permissions they have been assigned. That's not what I'm looking for.

I want to find the manual, or guide that explains what ALL of the permissions actually mean.

For Example:
In Security Role, the category for Collection has several permissions listed.
I want to find the guide that explains what each of these options do in terms of permissions.

More specific example of the information I am trying to find:
In that same section (Collection permissions), what is the difference between:

  • Modify
  • Modify Resource
  • Modify Object

To be clear... I am not just looking for these three... this is just an example. I want to find a guide, manual, or even a white paper that explains all permissions.
I have combed through the Docs on System Center, but I cannot find anything.

Thanks for any help.

Microsoft Configuration Manager
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. LarryZhou-MSFT 246 Reputation points
    2020-08-21T06:24:24.72+00:00

    Hi,

    Starting in version 1910, Configuration Manager is now part of Microsoft Endpoint Manager, so it is often abbreviated as MECM. For more details, see:
    https://video2.skills-academy.com/en-us/mem/configmgr/core/understand/introduction

    https://video2.skills-academy.com/en-us/mem/configmgr/core/understand/microsoft-endpoint-manager-faq

    For Microsoft Endpoint Configuration Manager, you can view the list of built-in security roles and custom security roles you create, including their descriptions, in the Configuration Manager console. To view the roles, in the Administration workspace, expand Security, and then select Security Roles.

    In addition, the Role-based Administration and Auditing Tool is one of the ConfigMgr tools, you can use it for the following tasks:

    1. Model security roles with specific permissions
    2. Audit the security scopes and security roles that other users have

    For more details, see:
    https://video2.skills-academy.com/en-us/mem/configmgr/core/understand/fundamentals-of-role-based-administration

    https://video2.skills-academy.com/en-us/mem/configmgr/core/support/rbaviewer

    I hope the above information is helpful to you.


    If the response is helpful, please click "Accept Answer" and upvote it.

    Best regards,
    Larry

    0 comments No comments