Skip to content

Commit 366ded9

Browse files
committed
add Logic App Contributor role assignment
1 parent 11ffd51 commit 366ded9

File tree

1 file changed

+16
-2
lines changed

1 file changed

+16
-2
lines changed

articles/web-application-firewall/afds/automated-detection-response-with-sentinel.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.author: victorh
66
ms.service: web-application-firewall
77
ms.topic: how-to
8-
ms.date: 09/19/2023
8+
ms.date: 09/27/2023
99
---
1010

1111
# Automated detection and response for Azure WAF with Microsoft Sentinel
@@ -68,6 +68,20 @@ Repeat this procedure for the WAF policy resource.
6868
1. Select **Create**.
6969
1. Select your workspace, and then select **Add**.
7070

71+
## Configure the Logic App Contributor role assignment
72+
73+
Your account must have owner permissions on any resource group to which you want to grant Microsoft Sentinel permissions, and you must have the **Logic App Contributor** role on any resource group containing playbooks you want to run.
74+
75+
1. In the Azure portal, select the resource group that contains the playbook.
76+
1. In the left pane, select **Access control (IAM)**.
77+
1. Select **Role assignments**.
78+
1. Select **Add** then **Add role assignment**.
79+
1. Select search for **Logic App Contributor**, select it, and then select **Next**.
80+
1. Select **Select members**.
81+
1. Search for your account and select it.
82+
1. Select **Select**.
83+
1. Select **Next**.
84+
1. Select **Review + assign**.
7185

7286
## Configure detection and response
7387

@@ -85,7 +99,7 @@ There are detection query templates for SQLi and XSS attacks in Sentinel for Azu
8599
1. Select **Rule templates**. It may take a few minutes for the templates to appear.
86100
1. Select the **Front Door Premium WAF - SQLi Detection** template.
87101
1. On the right pane, select **Create rule**.
88-
1. Accept all the defaults and click through to **Automated response**. You can edit these settings later to customize the rule.
102+
1. Accept all the defaults and continue through to **Automated response**. You can edit these settings later to customize the rule.
89103
> [!TIP]
90104
> If you see an error in the rule query, it might be because you don't have any WAF logs in your workspace. You can generate some logs by sending test traffic to your web app. For example, you can simulate a SQLi attack by sending a request like this: `http://x.x.x.x/?text1=%27OR%27%27=%27`. Replace `x.x.x.x` with your Front Door URL.
91105

0 commit comments

Comments
 (0)