- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
04-01-2026 05:05 AM
Hello community! I'm looking for the best way to delegate Cortex XDR administration to an IT team within a specific department. The goal is to give them full control over a particular group of endpoints, ensuring strict separation: they shouldn't have visibility into or the ability to manage the endpoints in the main network. The problem: I've been testing Scope-Based Access Control (SBAC) to limit permissions on this group of endpoints. However, I've noticed that under this configuration, the departmental IT team can't create or add exceptions specific to their own devices. I need this team to be able to manage their own exceptions independently, as these shouldn't apply to the rest of the organization, nor should this team be able to modify or view global exceptions. My questions are: SBAC limitations: What are the exact limitations of SBAC regarding the creation and assignment of exceptions and prevention profiles? Is it expected that a user restricted by SBAC cannot manage their own exceptions? Configuration best practices: What combination of Roles (RBAC), Scopes (SBAC), or policy/profile structure should I configure to achieve this level of segregation? I need this team to manage their own profiles and exceptions only for their assigned endpoints, without impacting the global tenant. I appreciate your guidance on how to design this permissions architecture.
04-01-2026 08:04 AM - edited 04-01-2026 08:04 AM
Hello @W.MedinaMarquez ,
Greetings for the day.
To delegate Cortex XDR administration to a specific departmental IT team while maintaining strict segregation, you should utilize Scope-Based Access Control (SBAC) in combination with Custom Roles (RBAC). To ensure departmental admins can manage their own exceptions without impacting the rest of the organization.
While SBAC is designed to restrict visibility and management to specific perimeters, it has the following known limitations regarding exceptions and policy management:
It is expected that a scoped user can manage exceptions only if their assigned role has "Edit" permissions for the relevant components and the exceptions are within their assigned scope. SBAC applies to:
How to design this permissions architecture - For further informations,will recommend reaching out to your Account Team, Solution Consultant, or Sales Engineer. They will be able to assist you based on your specific requirements.
If you feel this has answered your query, please let us know by clicking like and on "mark this as a Solution".
Thanks & Regards,
S. Subashkar Sekar
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!

