Skip to content

Commit 49de0ea

Browse files
author
ecfan
committed
Add access roles for Standard and fix formatting
1 parent 32986bc commit 49de0ea

File tree

3 files changed

+29
-21
lines changed

3 files changed

+29
-21
lines changed

articles/sentinel/automation/create-playbooks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,8 @@ This article describes how to create and manage Microsoft Sentinel playbooks. Yo
2727

2828
To create and manage playbooks, you need access to Microsoft Sentinel with one of the following Azure roles:
2929

30-
| Logic app workflow | Azure roles | Description |
31-
|--------------------|-------------|-------------|
30+
| Logic app | Azure roles | Description |
31+
|-----------|-------------|-------------|
3232
| Consumption | **Logic App Contributor** | Edit and manage logic apps. |
3333
| Consumption | **Logic App Operator** | Read, enable, and disable logic apps. |
3434
| Standard | **Logic Apps Standard Operator** | Enable, resubmit, and disable workflows. |

articles/sentinel/automation/logic-apps-playbooks.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,19 +36,19 @@ Azure Logic Apps also supports other types of connectors, such as managed connec
3636

3737
## Supported logic app types
3838

39-
Microsoft Sentinel supports both *consumption* and *standard* Azure Logic Apps resource types:
39+
Microsoft Sentinel supports both Consumption and Standard logic apps:
4040

41-
- **Consumption** resources run in multitenant Azure Logic Apps and use the classic, original Azure Logic Apps engine.
41+
- **Consumption**: Runs in multitenant Azure Logic Apps, and uses the classic, original Azure Logic Apps engine.
4242

43-
- **Standard** resources run in single-tenant Azure Logic Apps and use a more recently designed Azure Logic Apps engine.
43+
- **Standard**: Runs in single-tenant Azure Logic Apps, and uses a more recently designed Azure Logic Apps engine.
4444

45-
Standard resources offer higher performance, fixed pricing, multiple workflow capability, easier API connections management, built-in network capabilities and CI/CD features, and more. However, the following playbook functionality differs for Standard resources in Microsoft Sentinel:
45+
Standard resources offer higher performance, fixed pricing, multiple workflow capability, easier API connections management, built-in network capabilities and CI/CD features, and more. However, the following playbook functionality differs for Standard logic apps in Microsoft Sentinel:
4646

47-
|Feature |Description |
48-
|---------|---------|
49-
|**Creating playbooks** | Playbook templates aren't currently supported for Standard workflows, which means that you can't use a template to create your playbook directly in Microsoft Sentinel. <br><br>Instead, create your workflow manually in Azure Logic Apps to use it as a playbook in Microsoft Sentinel. |
50-
|**Private endpoints** | If you're using Standard workflows with private endpoints, Microsoft Sentinel requires you to [define an access restriction policy in Logic apps](../define-playbook-access-restrictions.md) to support those private endpoints in any playbooks based on Standard workflows. <br><br> Without an access restriction policy, workflows with private endpoints might still be visible and selectable in Microsoft Sentinel, but running them will fail. |
51-
|**Stateless workflows** | While Standard workflows support both *stateful* and *stateless* in Azure Logic Apps, Microsoft Sentinel doesn't support stateless workflows. <br><br>For more information, see [Stateful and stateless workflows](/azure/logic-apps/single-tenant-overview-compare#stateful-and-stateless-workflows).
47+
| Feature | Description |
48+
|---------|-------------|
49+
| **Creating playbooks** | Playbook templates aren't currently supported for Standard workflows, which means that you can't use a template to create your playbook directly in Microsoft Sentinel. <br><br>Instead, create your workflow manually in Azure Logic Apps to use it as a playbook in Microsoft Sentinel. |
50+
| **Private endpoints** | If you're using Standard workflows with private endpoints, Microsoft Sentinel requires you to [define an access restriction policy in Logic apps](../define-playbook-access-restrictions.md) to support those private endpoints in any playbooks based on Standard workflows. <br><br>Without an access restriction policy, workflows with private endpoints might still be visible and selectable in Microsoft Sentinel, but running them will fail. |
51+
| **Stateless workflows** | While Standard workflows support both *stateful* and *stateless* in Azure Logic Apps, Microsoft Sentinel doesn't support stateless workflows. <br><br>For more information, see [Stateful and stateless workflows](/azure/logic-apps/single-tenant-overview-compare#stateful-and-stateless-workflows). |
5252

5353
## Playbook authentications to Microsoft Sentinel
5454

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,27 @@
11
---
22
title: include
3-
ms.date: 04/17/2024
3+
ms.date: 08/15/2024
44
ms.topic: include
55
---
66

77
<!-- docutune:disable -->
88

9-
|Role |Description |
10-
|---------|---------|
9+
| Role | Description |
10+
|------|--------------|
1111
| **Owner** | Lets you grant access to playbooks in the resource group. |
12-
| **Logic App Contributor** | Lets you manage logic apps and run playbooks. Doesn't allow you to grant access to playbooks. |
13-
| **Logic App Operator** | Lets you read, enable, and disable logic apps. Doesn't allow you to edit or update logic apps.
14-
| **Microsoft Sentinel Contributor** | Lets you attach a playbook to an analytics or automation rule. |
15-
| **Microsoft Sentinel Responder** | Lets you access an incident in order to run a playbook manually, but doesn't allow you to run the playbook. |
16-
|**Microsoft Sentinel Playbook Operator** | Lets you run a playbook manually.|
17-
| **Microsoft Sentinel Automation Contributor**| Allows automation rules to run playbooks. This role isn't used for any other purpose.|
12+
| **Microsoft Sentinel Contributor** |Lets you attach a playbook to an analytics or automation rule. |
13+
| **Microsoft Sentinel Responder** | Lets you access an incident in order to run a playbook manually, but doesn't allow you to run the playbook. |
14+
| **Microsoft Sentinel Playbook Operator** | Lets you run a playbook manually. |
15+
| **Microsoft Sentinel Automation Contributor** | Allows automation rules to run playbooks. This role isn't used for any other purpose. |
1816

19-
The **Active playbooks** tab on the **Automation** page displays all active playbooks available across any selected subscriptions. By default, a playbook can be used only within the subscription to which it belongs, unless you specifically grant Microsoft Sentinel permissions to the playbook's resource group.
17+
The following table describes required roles based on whether you select a *Consumption* or *Standard* logic app to create your playbook:
18+
19+
| Logic app | Azure roles | Description |
20+
|-----------|-------------|-------------|
21+
| Consumption | **Logic App Contributor** | Edit and manage logic apps. Run playbooks. Doesn't allow you to grant access to playbooks. |
22+
| Consumption | **Logic App Operator** | Read, enable, and disable logic apps. Doesn't allow you to edit or update logic apps. |
23+
| Standard | **Logic Apps Standard Operator** | Enable, resubmit, and disable workflows in a logic app. |
24+
| Standard | **Logic Apps Standard Developer** | Create and edit logic apps. |
25+
| Standard | **Logic Apps Standard Contributor** | Manage all aspects of a logic app. |
26+
27+
The **Active playbooks** tab on the **Automation** page displays all active playbooks available across any selected subscriptions. By default, a playbook can be used only within the subscription to which it belongs, unless you specifically grant Microsoft Sentinel permissions to the playbook's resource group.

0 commit comments

Comments
 (0)