Assign permissions in Insider Risk Management (2026)

Use six role groups to configure Insider Risk Management features. To make Insider Risk Management available as a menu option in Microsoft Purview and to continue with these configuration steps, you must be assigned to one of the following roles or role groups:

  • Microsoft Entra ID Global Administrator role
  • Microsoft Entra ID Compliance Administrator role
  • Microsoft Purview Organization Management role group
  • Microsoft Purview Compliance Administrator role group
  • Insider Risk Management role group
  • Insider Risk Management Admins role group

Depending on how you want to manage Insider Risk Management policies and alerts, assign users to specific role groups to manage different sets of Insider Risk Management features. You can assign users with different compliance responsibilities to specific role groups to manage different areas of Insider Risk Management features. Or you might decide to assign all user accounts for designated administrators, analysts, investigators, and viewers to the Insider Risk Management role group. Use a single role group or multiple role groups to best fit your compliance management requirements.

Important

After configuring your role groups, it might take up to 30 minutes for the role group permissions to apply to assigned users across your organization.

Choose from these role group options and solution actions when working with Insider Risk Management:

ActionsInsider Risk ManagementInsider Risk Management AdminsInsider Risk Management AnalystsInsider Risk Management InvestigatorsInsider Risk Management AuditorsInsider Risk Management Approvers
Access & investigate alertsYesNoYesYesNoNo
Access & investigate casesYesNoYesYesNoNo
Access & view forensic evidence capturesYesNoNoYesNoNo
Access & view the Content ExplorerYesNoNoYesNoNo
Access analytics insightsYesYesYesNoNoNo
Approve forensic evidence capturing requestsYesNoNoNoNoYes
Configure Adaptive ProtectionYesYesNoNoNoNo
Configure notice templatesYesNoYesYesNoNo
Configure policies and settingsYesYesNoNoNoNo
Create forensic evidence capturing requestYesYesNoNoNoNo
View & export audit logsYesNoNoNoYesNo
View Adaptive Protection users tabYesNoYesYesNoNo
View alert and case reportsYesYesYesYesNoNo

Important

Make sure you always have at least one user in the built-in Insider Risk Management or Insider Risk Management Admins role groups (depending on the option you choose) so that your Insider Risk Management configuration doesn't get into a 'zero administrator' scenario if specific users leave your organization.

Members of the following roles can assign users to Insider Risk Management role groups and have the same solution permissions included with the Insider Risk Management Admins role group:

  • Microsoft Entra ID Global Administrator
  • Microsoft Entra ID Compliance Administrator
  • Microsoft Purview Organization Management
  • Microsoft Purview Compliance Administrator

Important

Microsoft recommends that you use roles with the fewest permissions. Minimizing the number of users with the Global Administrator role helps improve security for your organization. Learn more about Microsoft Purview roles and permissions.

Add users to the Insider Risk Management role group

  1. Sign in to the Microsoft Purview portal with an admin account in your Microsoft 365 organization.
  2. Select Settings in the upper-right corner of the page, select Roles and groups, then select Roles groups in the left navigation pane.
  3. Select the Insider Risk Management role group, then select Edit.
  4. Select Choose users, then select the checkboxes for all the users you want to add to the role group.
  5. Select Select, then select Next.
  6. Select Save to add the users to the role group, then select Done.

Consider administrative units if you want to scope user permissions to a region or department

You can use administrative units in Insider Risk Management to scope user permissions to a particular geography or department. For example, a global company that has subsidiaries throughout the world might want to create an admin unit that provides a German scope for investigators so that they only see user activity for German users.

To use admin units in Insider Risk Management, you must first create the admin units if they aren't already created, then assign the admin units to members of role groups. After you assign admin units to members of role groups, those members become restricted administrators and have limited access to Insider Risk Management settings, policies, and user data in the organization. Members who aren't assigned administrative units are unrestricted administrators and have access to all settings, policies, and user data.

Important

Restricted administrators can't access alerts for the users assigned to them through security groups or distribution groups added in administrative units. Such user alerts are visible only to unrestricted administrators. Microsoft recommends adding users directly to administrative units to ensure their alerts are also visible to restricted administrators with administrative units assigned.

Effect of admin unit scoping on Insider Risk Management roles

The following table shows how admin units, when enforced, affect each combination of Insider Risk Management task and role.

Note

Scoped in the following table means that the admin actions for that role are limited by their assigned admin unit.

TaskScoped Insider Risk ManagementScoped Insider Risk Management AdminScoped Insider Risk Management AnalystsScoped Insider Risk Management InvestigatorsScoped Insider Risk Management Approvers
Access analytics insightsNot allowed, if scopedNot allowed, if scopedNot allowed, if scopedNever allowedNever allowed
Access and investigate alertsScopedNever allowedScopedScopedNever allowed
Access and investigate casesScopedNever allowedScopedScopedNever allowed
Access and view forensic evidence capturesNot allowed, if scopedNever allowedNever allowedNot allowed, if scopedNever allowed
Access and view the Content explorerUnrestrictedNever allowedNever allowedUnrestrictedNever allowed
Approve forensic evidence capturing requestsNot allowed, if scopedNever allowedNever allowedNever allowedNot allowed, if scoped
Assign or reassign alertsNot allowed, if scopedNever allowedNot allowed, if scopedNot allowed, if scopedNever allowed
Assign or reassign casesNot allowed, if scopedNever allowedNot allowed, if scopedNot allowed, if scopedNever allowed
Configure Adaptive ProtectionNot allowed, if scopedNot allowed, if scopedNever allowedNever allowedNever allowed
Configure global settingsUnrestrictedUnrestrictedNever allowedNever allowedNever allowed
Configure notice templatesUnrestrictedNever allowedUnrestrictedUnrestrictedNever allowed
Configure policiesScopedScopedNever allowedNever allowedNever allowed
Configure priority user groupsNot allowed, if scopedNot allowed, if scopedNever allowedNever allowedNever allowed
Configure priority-user-specific policiesNot allowed, if scopedNot allowed, if scopedNever allowedNever allowedNever allowed
Create forensic evidence capturing requestNot allowed, if scopedNot allowed, if scopedNever allowedNever allowedNever allowed
Create quick policiesNot allowed, if scopedNot allowed, if scopedNever allowedNever allowedNever allowed
Investigate user activityScopedNever allowedNever allowedScopedNever allowed
Start scoring activity for usersScopedScopedScopedScopedNever allowed
View Adaptive Protection users tabNot allowed, if scopedNever allowedNot allowed, if scopedNot allowed, if scopedNever allowed
View alert and case reportsScopedScopedScopedScopedScoped
View device health reportNot allowed, if scopedNot allowed, if scopedNever allowedNever allowedNever allowed

Note

You can use adaptive scopes together with admin units. If one or more admin units scope role groups for your organization, the admin units limit the adaptive scopes that you can select when you create or edit a policy.

Assign permissions in Insider Risk Management (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Melvina Ondricka

Last Updated:

Views: 6466

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.