Skip to content

Commit 71d34ac

Browse files
authored
Apply suggestions from code review
1 parent 8c8381e commit 71d34ac

6 files changed

+6
-7
lines changed

articles/sentinel/connect-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Micros
3737

3838
- Your user must be assigned the [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role on the workspace.
3939

40-
- Your user must have at least a [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from.
40+
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
4141

4242
- Your user must have read and write permissions to the Microsoft Entra diagnostic settings in order to be able to see the connection status.
4343
- Install the solution for **Microsoft Entra ID** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The Defender XDR connector, especially its incident integration feature, is the
2323
Before you begin, you must have the appropriate licensing, access, and configured resources described in this section.
2424

2525
- You must have a valid license for Microsoft Defender XDR, as described in [Microsoft Defender XDR prerequisites](/microsoft-365/security/mtp/prerequisites).
26-
- Your user must have at least a [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from.
26+
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
2727
- You must have read and write permissions on your Microsoft Sentinel workspace.
2828
- To make any changes to the connector settings, your account must be a member of the same Microsoft Entra tenant with which your Microsoft Sentinel workspace is associated.
2929
- Install the solution for **Microsoft Defender XDR** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).

articles/sentinel/connect-microsoft-purview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Before you begin, verify that you have:
5454
- A defined Microsoft Sentinel workspace.
5555
- A valid license to M365 E3, M365 A3, Microsoft Business Basic or any other Audit eligible license. Read more about [auditing solutions in Microsoft Purview](/microsoft-365/compliance/audit-solutions-overview).
5656
- [Enabled Sensitivity labels for Office](/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files?view=o365-worldwide#use-the-microsoft-purview-compliance-portal-to-enable-support-for-sensitivity-labels&preserve-view=true) and [enabled auditing](/microsoft-365/compliance/turn-audit-log-search-on-or-off?view=o365-worldwide#use-the-compliance-center-to-turn-on-auditing&preserve-view=true).
57-
- At least the Security Administrator role on the workspace.
57+
- The Security Administrator role on the tenant, or the equivalent permissions.
5858

5959
## Set up the connector
6060

articles/sentinel/connect-services-api-based.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article presents information that is common to the group of API-based data
1818
## Prerequisites
1919

2020
- You must have read and write permissions on the Log Analytics workspace.
21-
- You must have at least a Security administrator role on your Microsoft Sentinel workspace's tenant.
21+
- You must have a Security administrator role on your Microsoft Sentinel workspace's tenant, or the equivalent permissions.
2222
- Data connector specific requirements:
2323

2424
|Data connector |Licensing, costs, and other prerequisites |

articles/sentinel/connect-threat-intelligence-tip.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Learn more about [Threat Intelligence](understand-threat-intelligence.md) in Mic
3434
## Prerequisites
3535

3636
- In order to install, update and delete standalone content or solutions in content hub, you need the **Microsoft Sentinel Contributor** role at the resource group level.
37-
- You must have at least the **Security administrator** Microsoft Entra role in order to grant permissions to your TIP product or to any other custom application that uses direct integration with the Microsoft Graph Security tiIndicators API.
37+
- To grant permissions to your TIP product or any other custom application that uses direct integration with the Microsoft Graph TI Indicators API, you must have the **Security administrator** Microsoft Entra role, or the equivalent permissions.
3838
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
3939

4040
## Instructions
@@ -90,7 +90,6 @@ You can get this information from your Microsoft Entra ID through a process call
9090

9191
#### Get consent from your organization to grant these permissions
9292

93-
<!--does this need to be a global admin?-->
9493
1. To grant consent, a privileged role is required. For more information, see [Grant tenant-wide admin consent to an application](/entra/identity/enterprise-apps/grant-admin-consent?pivots=portal).
9594

9695
:::image type="content" source="media/connect-threat-intelligence-tip/threat-intel-api-permissions-2.png" alt-text="Grant consent":::

articles/sentinel/enable-entity-behavior-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ As Microsoft Sentinel collects logs and alerts from all of its connected data so
2424

2525
To enable or disable this feature (these prerequisites are not required to use the feature):
2626

27-
- Your user must be assigned to at least the Microsoft Entra ID **Security Administrator** role in your tenant.
27+
- Your user must be assigned to the Microsoft Entra ID **Security Administrator** role in your tenant or the equivalent permissions.
2828

2929
- Your user must be assigned at least one of the following **Azure roles** ([Learn more about Azure RBAC](roles.md)):
3030
- **Microsoft Sentinel Contributor** at the workspace or resource group levels.

0 commit comments

Comments
 (0)