Skip to content

Commit 6cdfec7

Browse files
author
your name
committed
Analytics permissions change
1 parent a117181 commit 6cdfec7

File tree

2 files changed

+20
-2
lines changed

2 files changed

+20
-2
lines changed

articles/sentinel/detect-threats-built-in.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,15 @@ This procedure describes how to use built-in analytics rules templates.
6464
> - You can also **push rules to Microsoft Sentinel via [API](/rest/api/securityinsights/) and [PowerShell](https://www.powershellgallery.com/packages/Az.SecurityInsights/0.1.0)**, although doing so requires additional effort.
6565
>
6666
> When using API or PowerShell, you must first export the rules to JSON before enabling the rules. API or PowerShell may be helpful when enabling rules in multiple instances of Microsoft Sentinel with identical settings in each instance.
67-
>
67+
68+
### Access permissions for analytics rules
69+
70+
When you create an analytics rule, an access permission token is applied to the rule and saved along with it. This token ensures that the rule can access the workspace that contains the data queried by the rule, and that this access will be maintained even if the rule's creator loses access to that workspace.
71+
72+
There is one exception to this, however: when a rule is created to access workspaces in other tenants ***(and? or? and/or? subscriptions? -YL)***, such as what happens in the case of an MSSP, Microsoft Sentinel takes extra security measures to prevent unauthorized access to customer data ***(saying too much? -YL)***: for these kinds of rules, the credentials of the user that created the rule are used instead of an independent access token, so that when the user no longer has access to the other tenant, the rule will stop working ***(until xxxxx? happens? -YL)***.
73+
74+
If you operate Microsoft Sentinel in a cross-tenant scenario, be aware that if one of your analysts or engineers loses access to a particular workspace, any rules created by that user will stop working. You will get a health monitoring message regarding "insufficient access to resource", and the rule will be [auto-disabled](detect-threats-custom.md#issue-a-scheduled-rule-failed-to-execute-or-appears-with-auto-disabled-added-to-the-name).
75+
6876
## Export rules to an ARM template
6977

7078
You can easily [export your rule to an Azure Resource Manager (ARM) template](import-export-analytics-rules.md) if you want to manage and deploy your rules as code. You can also import rules from template files in order to view and edit them in the user interface.

articles/sentinel/detect-threats-custom.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ A permanent failure occurs due to a change in the conditions that allow the rule
295295
- The target table (on which the rule query operated) has been deleted.
296296
- Microsoft Sentinel had been removed from the target workspace.
297297
- A function used by the rule query is no longer valid; it has been either modified or removed.
298-
- Permissions to one of the data sources of the rule query were changed.
298+
- Permissions to one of the data sources of the rule query were changed ([see example below](#permanent-failure-due-to-lost-access-across-tenants)).
299299
- One of the data sources of the rule query was deleted.
300300
301301
**In the event of a predetermined number of consecutive permanent failures, of the same type and on the same rule,** Microsoft Sentinel stops trying to execute the rule, and also takes the following steps:
@@ -319,6 +319,16 @@ To re-enable the rule, you must address the issues in the query that cause it to
319319
320320
Also see [Useful resources for working with Kusto Query Language in Microsoft Sentinel](kusto-resources.md) for further assistance.
321321
322+
#### Permanent failure due to lost access across tenants
323+
324+
One particular example of when a permanent failure could occur due to a permissions change on a data source concerns the case of an MSSP or any other scenario where analytics rules query across tenants ***(and/or subscriptions? -YL)***.
325+
326+
When you create an analytics rule, an access permission token is applied to the rule and saved along with it. This token ensures that the rule can access the workspace that contains the data queried by the rule, and that this access will be maintained even if the rule's creator loses access to that workspace.
327+
328+
There is one exception to this, however: when a rule is created to access workspaces in other tenants ***(and? or? and/or? subscriptions? -YL)***, such as what happens in the case of an MSSP, Microsoft Sentinel takes extra security measures to prevent unauthorized access to customer data ***(saying too much? -YL)***: for these kinds of rules, the credentials of the user that created the rule are used instead of an independent access token, so that when the user no longer has access to the other tenant, the rule will stop working ***(until xxxxx? happens? -YL)***.
329+
330+
If you operate Microsoft Sentinel in a cross-tenant scenario, be aware that if one of your analysts or engineers loses access to a particular workspace, any rules created by that user will stop working. You will get a health monitoring message regarding "insufficient access to resource", and the rule will be [auto-disabled](#permanent-failure---rule-auto-disabled).
331+
322332
## Next steps
323333
324334
When using analytics rules to detect threats from Microsoft Sentinel, make sure that you enable all rules associated with your connected data sources in order to ensure full security coverage for your environment. The most efficient way to enable analytics rules is directly from the data connector page, which lists any related rules. For more information, see [Connect data sources](connect-data-sources.md).

0 commit comments

Comments
 (0)