Skip to content

Commit 026f2d7

Browse files
Merge pull request #295597 from yelevin/patch-2
Added required roles/permissions
2 parents 0aac009 + 1bda296 commit 026f2d7

File tree

2 files changed

+17
-6
lines changed

2 files changed

+17
-6
lines changed

articles/sentinel/create-incident-manually.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,17 @@ There are three ways to create an incident manually:
5454

5555
After onboarding Microsoft Sentinel to the Microsoft Defender portal, manually created incidents aren't synchronized with the Defender portal, though they can still be viewed and managed in Microsoft Sentinel in the Azure portal, and through Logic Apps and the API.
5656

57+
### Permissions
58+
59+
The following roles and permissions are required to manually create an incident.
60+
61+
| Method | Required role |
62+
| ------ | ------------- |
63+
| Azure portal and API | One of the following:<li>[Microsoft Sentinel Responder](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-responder)<li>[Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-contributor) |
64+
| Azure Logic Apps | One of the above, plus:<li>[Microsoft Sentinel Playbook Operator](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-playbook-operator) to use an existing playbook<li>[Logic App Contributor](/azure/role-based-access-control/built-in-roles/integration#logic-app-contributor) to create a new playbook |
65+
66+
Learn more about [roles in Microsoft Sentinel](roles.md).
67+
5768
### Create an incident using the Azure portal
5869

5970
1. Select **Microsoft Sentinel** and choose your workspace.
@@ -103,7 +114,7 @@ After onboarding Microsoft Sentinel to the Microsoft Defender portal, manually c
103114

104115
Select the incident in the queue to see its full details, add bookmarks, change its owner and status, and more.
105116

106-
If for some reason you change your mind after the fact about creating the incident, you can [delete it](delete-incident.md) from the queue grid, or from within the incident itself.
117+
If for some reason you change your mind after the fact about creating the incident, you can [delete it](delete-incident.md) from the queue grid, or from within the incident itself. You must have the [Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-contributor) role in order to delete an incident.
107118

108119
### Create an incident using Azure Logic Apps
109120

@@ -176,5 +187,5 @@ Here's an example of what a request body might look like:
176187
For more information, see:
177188
- [Relate alerts to incidents in Microsoft Sentinel](relate-alerts-to-incidents.md)
178189
- [Delete incidents in Microsoft Sentinel](delete-incident.md)
179-
- [Investigate incidents with Microsoft Sentinel](investigate-cases.md)
180-
- [Create custom analytics rules to detect threats](detect-threats-custom.md)
190+
- [Navigate, triage, and manage Microsoft Sentinel incidents](incident-navigate-triage.md)
191+
- [Investigate Microsoft Sentinel incidents in depth](investigate-incidents.md)

articles/sentinel/delete-incident.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The ability to create incidents from scratch in Microsoft Sentinel in the Azure
2626
- Faulty incidents were generated in bulk by a broken analytics rule.
2727
- The incident contains no data - alerts, entities, bookmarks, and so on.
2828

29-
In all other cases, when an incident is no longer needed, it should be **closed**, not deleted. [Closing an incident](investigate-cases.md#close-an-incident) requires you to specify the reason for closing it, and allows you to add additional comments for context and clarification. Closing old incidents in this way preserves the transparency and integrity of your SOC, and also allows for the possibility of reopening the incident if the problem resurfaces.
29+
In all other cases, when an incident is no longer needed, it should be **closed**, not deleted. [Closing an incident](incident-navigate-triage.md#close-an-incident) requires you to specify the reason for closing it, and allows you to add additional comments for context and clarification. Closing old incidents in this way preserves the transparency and integrity of your SOC, and also allows for the possibility of reopening the incident if the problem resurfaces.
3030

3131

3232

@@ -90,5 +90,5 @@ DELETE https://management.azure.com/subscriptions/{subscriptionId}/resourceGroup
9090
For more information, see:
9191
- [Create your own incidents manually in Microsoft Sentinel](create-incident-manually.md)
9292
- [Relate alerts to incidents in Microsoft Sentinel](relate-alerts-to-incidents.md)
93-
- [Investigate incidents with Microsoft Sentinel](investigate-cases.md)
94-
- [Create custom analytics rules to detect threats](detect-threats-custom.md)
93+
- [Navigate, triage, and manage Microsoft Sentinel incidents](incident-navigate-triage.md)
94+
- [Investigate Microsoft Sentinel incidents in depth](investigate-incidents.md)

0 commit comments

Comments
 (0)