"New" home endpoint https://security.microsoft.com/?tid=<TenantGUID> does not work


So windows defender ATP .. err.. Microsoft Defender Endpoint is now starting to push the console functionality from the old securecenter.microsoft.com url to the "new" consolidated security.microsoft.com


One huge problem is that the "new" url does not support the https://security.microsoft.com/?tid=<TenantGUID> functionality.


Please fix the "https://security.microsoft.com/?tid=" functionality before you start moving blades/links on the DefenderATP console to take you to the new page.


Thank you!


3 Replies
Hi Neil,
Thank you for your feedback on this issue.
Currently, we do not support tenant switch in same browser. If you want to switch tenants, please sign out of the first tenant from your browser and then sign in to the next tenant using the above URL pattern for delegated access.

Thank You!






I am not talking about tenant switch - I am talking about the loss of serviceability.



  • Consultant X supports 10 small clients, each has M365-E5 user count of 10 thus having access to Defender for Endpoint.
  • Each customer has their CSP licenses using CSP-Direct (some with Insight, some with CDW, etc) -- NOT with consultant X
  • Consultant X has O365-E3 license but does NOT have access to Defender for Endpoint on own tenant.
  • Consultant X login has access rights to manage/operate Defender for Endpoint, MCAS, Intune, etc. on each client tenant.


Current Access:

  1. Defender for endpoint: https://securitycenter.windows.com/?tid=<customerID>
  2. Intune/Endpoint:           https://endpoint.microsoft.com/?tid=<customerID>
  3. MCAS:                           https://portal.cloudappsecurity.com/?tid=<customerID>
  4. AzureAD                        https://aad.portal.azure.com/<TenantRootDomain> (aka blah.OnMicrosoft.com)
  5. M365AdminCenter:      https://portal.office.com/Partner/BeginClientSession.aspx?CTID=<CustomerID>&CSDEST=o365admincenter 


PROBLEM: But what doesn't work...


That only works if I am logging on with a user WITHIN the tenant.

i.e. Consultant X needs a dedicated user license with each client like ConsultantX@CustomerY.com just to access the security.microsoft.com page.


Tenant switching within Security.Microsoft.com would be nice .. but at this point I just need an access method where an EXTERNAL user account that has been granted access to manage Defender for Endpoint can login.


Either that or please STOP the forced switch to security.microsoft.com and leave access to securitycenter.microsoft.com


Thank you.


@Neil GoldsteinI agree the situation should be more consistent. And thank you very much for sharing the link for switching Azure AD in Office 365!!!


M365AdminCenter:      https://portal.office.com/Partner/BeginClientSession.aspx?CTID=<CustomerID>&CSDEST=o365admincenter


The above works well.