Skip to content

Commit 4825755

Browse files
fix minor acrolinx items
1 parent 932bdf4 commit 4825755

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/sentinel/prerequisites.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ Before deploying Microsoft Sentinel, make sure that your Azure tenant meets the
1919

2020
- Assign [relevant permissions](../role-based-access-control/index.yml) to your subscription. For new subscriptions, designate an [owner/contributor](../role-based-access-control/rbac-and-directory-admin-roles.md).
2121

22-
- To maintain the least privileged access, assign additional roles at resource group level.
23-
- For more control over permissions and access, set up custom roles. For more information, see [Role-based access control](../role-based-access-control/custom-roles.md).
22+
- To maintain the least privileged access, assign roles at resource group level.
23+
- For more control over permissions and access, set up custom roles. For more information, see [Role-based access control](../role-based-access-control/custom-roles.md) (RBAC).
2424
- For extra separation between users and security users, consider [resource-context](resource-context-rbac.md) or [table-level RBAC](https://techcommunity.microsoft.com/t5/azure-sentinel/table-level-rbac-in-azure-sentinel/ba-p/965043).
2525

2626
For more information about other roles and permissions supported for Microsoft Sentinel, see [Permissions in Microsoft Sentinel](roles.md).
@@ -33,7 +33,7 @@ Before deploying Microsoft Sentinel, make sure that your Azure tenant meets the
3333

3434
A dedicated resource group allows for permissions to be assigned once, at the resource group level, with permissions automatically applied to dependent resources. With a dedicated resource group, access management of Microsoft Sentinel is efficient and less prone to improper permissions. Reducing permission complexity ensures users and service principals have the permissions required to complete actions and makes it easier to keep less privileged roles from accessing inappropriate resources.
3535

36-
Implement extra resource groups to control access by tiers. Use the extra resource groups to house resources that should be accessed only by groups with higher permissions. Use multiple tiers to separate access between resource groups even more granularly.
36+
Implement extra resource groups to control access by tiers. Use the extra resource groups to house resources only accessible by groups with higher permissions. Use multiple tiers to separate access between resource groups even more granularly.
3737

3838
## Next steps
3939

0 commit comments

Comments
 (0)