Skip to content

Commit 1f960c0

Browse files
committed
Learn Editor: Update roles.md
1 parent 9bc4654 commit 1f960c0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/sentinel/roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Alternatively, you might want to assign the ability to read tables from within a
100100

101101
|Tasks |Permissions |
102102
|---------|---------|
103-
|**Read permissions on the default workspace** | Use a [custom Microsoft Defender XDR unified RBAC role with *data (read)*](/defender-xdr/custom-permissions-details) permissions over the Microsoft Sentinel data collection. |
103+
|**Read permissions on the default workspace** | Use a [custom Microsoft Defender XDR unified RBAC role with ](/defender-xdr/custom-permissions-details)*[data (read)](/defender-xdr/custom-permissions-details)* permissions over the Microsoft Sentinel data collection. |
104104
|**Read permissions on any other workspace enabled for Microsoft Sentinel in the data lake** | Use one of the following built-in roles in Azure RBAC for permissions on that workspace: <br>- [Log Analytics Reader](/azure/role-based-access-control/built-in-roles/monitor#log-analytics-reader) <br>- [Log Analytics Contributor](/azure/role-based-access-control/built-in-roles/monitor#log-analytics-contributor) <br>- [Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-contributor) <br>- [Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-reader) <br>- [Reader](/azure/role-based-access-control/built-in-roles/general#reader)<br>- [Contributor](/azure/role-based-access-control/built-in-roles/privileged#contributor)<br>- [Owner](/azure/role-based-access-control/built-in-roles/privileged#owner)|
105105

106106

@@ -113,7 +113,7 @@ Microsoft Entra ID roles provides broad access across all workspaces in the data
113113
|**Write to tables in the analytics tier using KQL jobs or notebooks** | Use one of the following Microsoft Entra ID roles: <br><br> - [Security operator](/entra/identity/role-based-access-control/permissions-reference#security-operator)<br>- [Security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) <br>- [Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) |
114114
|**Write to tables in the Microsoft Sentinel data lake** | Use one of the following Microsoft Entra ID roles: <br>- [Security operator](/entra/identity/role-based-access-control/permissions-reference#security-operator) <br>- [Security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) <br>- [Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) |
115115

116-
Alternatively, you might want to assign the ability to write output to a specific workspace, including creating, updating, and deleted tables in that workspace. In such cases, use one of the following:
116+
Alternatively, you might want to assign the ability to write output to a specific workspace. This can include the ability to configure connectors to that workspace, modifying retention settings for tables in the workspace, or creating, updating, and deleting custom tables in that workspace. In such cases, use one of the following:
117117

118118
|Tasks |Permissions |
119119
|---------|---------|

0 commit comments

Comments
 (0)