You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/roles.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: na
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: conceptual
17
-
ms.date: 06/28/2020
17
+
ms.date: 04/11/2021
18
18
ms.author: yelevin
19
19
20
20
---
@@ -30,8 +30,6 @@ Use Azure RBAC to create and assign roles within your security operations team t
30
30
31
31
### Azure Sentinel-specific roles
32
32
33
-
There are three dedicated built-in Azure Sentinel roles.
34
-
35
33
**All Azure Sentinel built-in roles grant read access to the data in your Azure Sentinel workspace.**
36
34
37
35
-[Azure Sentinel Reader](../role-based-access-control/built-in-roles.md#azure-sentinel-reader) can view data, incidents, workbooks, and other Azure Sentinel resources.
@@ -52,41 +50,45 @@ There are three dedicated built-in Azure Sentinel roles.
52
50
53
51
Users with particular job requirements may need to be assigned additional roles or specific permissions in order to accomplish their tasks.
54
52
55
-
- Working with playbooks to automate responses to threats
53
+
-**Working with playbooks to automate responses to threats**
56
54
57
55
Azure Sentinel uses **playbooks** for automated threat response. Playbooks are built on **Azure Logic Apps**, and are a separate Azure resource. You might want to assign to specific members of your security operations team the ability to use Logic Apps for Security Orchestration, Automation, and Response (SOAR) operations. You can use the [Logic App Contributor](../role-based-access-control/built-in-roles.md#logic-app-contributor) role to assign explicit permission for using playbooks.
58
56
59
-
- Connecting data sources to Azure Sentinel
57
+
-**Connecting data sources to Azure Sentinel**
60
58
61
59
For a user to add **data connectors**, you must assign the user write permissions on the Azure Sentinel workspace. Also, note the required additional permissions for each connector, as listed on the relevant connector page.
62
60
63
-
- Guest users assigning incidents
61
+
-**Guest users assigning incidents**
62
+
63
+
If a guest user needs to be able to assign incidents, then in addition to the Azure Sentinel Responder role, the user will also need to be assigned the role of [Directory Reader](../active-directory/roles/permissions-reference.md#directory-readers). Note that this role is *not* an Azure role but an **Azure Active Directory** role, and that regular (non-guest) users have this role assigned by default.
64
64
65
-
If a guest user needs to be able to assign incidents, then in addition to the Azure Sentinel Responder role, the user will also need to be assigned the role of [Directory Reader](../active-directory/roles/permissions-reference.md#directory-readers). Note that this role is *not* an Azure role but an **Azure Active Directory** role, and that regular (non-guest) users have this role assigned by default.
65
+
-**Creating and deleting workbooks**
66
66
67
-
For a side-by-side comparison, see the [table below](#roles-and-allowed-actions).
67
+
For a user to create and delete an Azure Sentinel workbook, the user will also need to be assigned with the Azure Monitor role of [Monitoring Contributor](../role-based-access-control/built-in-roles.md#monitoring-contributor). This role is not necessary for *using* workbooks, but only for creating and deleting.
68
68
69
69
### Other roles you might see assigned
70
70
71
71
In assigning Azure Sentinel-specific Azure roles, you may come across other Azure and Log Analytics Azure roles that may have been assigned to users for other purposes. You should be aware that these roles grant a wider set of permissions that includes access to your Azure Sentinel workspace and other resources:
72
72
73
73
-**Azure roles:**[Owner](../role-based-access-control/built-in-roles.md#owner), [Contributor](../role-based-access-control/built-in-roles.md#contributor), and [Reader](../role-based-access-control/built-in-roles.md#reader). Azure roles grant access across all your Azure resources, including Log Analytics workspaces and Azure Sentinel resources.
74
74
75
-
-**Log Analytics roles:**[Log Analytics Contributor](../role-based-access-control/built-in-roles.md#log-analytics-contributor) and [Log Analytics Reader](../role-based-access-control/built-in-roles.md#log-analytics-reader). Log Analytics roles grant access to your Log Analytics workspaces.
75
+
-**Log Analytics roles:**[Log Analytics Contributor](../role-based-access-control/built-in-roles.md#log-analytics-contributor) and [Log Analytics Reader](../role-based-access-control/built-in-roles.md#log-analytics-reader). Log Analytics roles grant access to your Log Analytics workspaces.
76
76
77
77
For example, a user who is assigned the **Azure Sentinel Reader** role, but not the **Azure Sentinel Contributor** role, will still be able to edit items in Azure Sentinel if assigned the Azure-level **Contributor** role. Therefore, if you want to grant permissions to a user only in Azure Sentinel, you should carefully remove this user’s prior permissions, making sure you do not break any needed access to another resource.
78
78
79
-
## Roles and allowed actions
79
+
## Azure Sentinel roles and allowed actions
80
80
81
-
The following table summarizes the roles and allowed actions in Azure Sentinel.
81
+
The following table summarizes the Azure Sentinel roles and their allowed actions in Azure Sentinel.
82
82
83
-
| Role | Create and run playbooks| Create and edit workbooks, analytic rules, and other Azure Sentinel resources | Manage incidents (dismiss, assign, etc.) | View data, incidents, workbooks, and other Azure Sentinel resources |
83
+
| Role | Create and run playbooks| Create and edit analytic rules and other Azure Sentinel resources[*](#workbooks)| Manage incidents (dismiss, assign, etc.) | View data, incidents, workbooks, and other Azure Sentinel resources |
<aname=workbooks></a>* Creating and deleting workbooks requires the additional [Monitoring Contributor](../role-based-access-control/built-in-roles.md#monitoring-contributor) role. For more information, see [Additional roles and permissions](#additional-roles-and-permissions).
90
92
## Custom roles and advanced Azure RBAC
91
93
92
94
-**Custom roles**. In addition to, or instead of, using Azure built-in roles, you can create Azure custom roles for Azure Sentinel. Azure custom roles for Azure Sentinel are created the same way you create other [Azure custom roles](../role-based-access-control/custom-roles-rest.md#create-a-custom-role), based on [specific permissions to Azure Sentinel](../role-based-access-control/resource-provider-operations.md#microsoftsecurityinsights) and to [Azure Log Analytics resources](../role-based-access-control/resource-provider-operations.md#microsoftoperationalinsights).
0 commit comments