Skip to content

Commit 84289da

Browse files
authored
Merge pull request #151403 from batamig/workbook-req-role
adding monitoring contributor role
2 parents 6838a63 + b03080d commit 84289da

File tree

1 file changed

+14
-12
lines changed

1 file changed

+14
-12
lines changed

articles/sentinel/roles.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: na
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: conceptual
17-
ms.date: 06/28/2020
17+
ms.date: 04/11/2021
1818
ms.author: yelevin
1919

2020
---
@@ -30,8 +30,6 @@ Use Azure RBAC to create and assign roles within your security operations team t
3030

3131
### Azure Sentinel-specific roles
3232

33-
There are three dedicated built-in Azure Sentinel roles.
34-
3533
**All Azure Sentinel built-in roles grant read access to the data in your Azure Sentinel workspace.**
3634

3735
- [Azure Sentinel Reader](../role-based-access-control/built-in-roles.md#azure-sentinel-reader) can view data, incidents, workbooks, and other Azure Sentinel resources.
@@ -52,41 +50,45 @@ There are three dedicated built-in Azure Sentinel roles.
5250

5351
Users with particular job requirements may need to be assigned additional roles or specific permissions in order to accomplish their tasks.
5452

55-
- Working with playbooks to automate responses to threats
53+
- **Working with playbooks to automate responses to threats**
5654

5755
Azure Sentinel uses **playbooks** for automated threat response. Playbooks are built on **Azure Logic Apps**, and are a separate Azure resource. You might want to assign to specific members of your security operations team the ability to use Logic Apps for Security Orchestration, Automation, and Response (SOAR) operations. You can use the [Logic App Contributor](../role-based-access-control/built-in-roles.md#logic-app-contributor) role to assign explicit permission for using playbooks.
5856

59-
- Connecting data sources to Azure Sentinel
57+
- **Connecting data sources to Azure Sentinel**
6058

6159
For a user to add **data connectors**, you must assign the user write permissions on the Azure Sentinel workspace. Also, note the required additional permissions for each connector, as listed on the relevant connector page.
6260

63-
- Guest users assigning incidents
61+
- **Guest users assigning incidents**
62+
63+
If a guest user needs to be able to assign incidents, then in addition to the Azure Sentinel Responder role, the user will also need to be assigned the role of [Directory Reader](../active-directory/roles/permissions-reference.md#directory-readers). Note that this role is *not* an Azure role but an **Azure Active Directory** role, and that regular (non-guest) users have this role assigned by default.
6464

65-
If a guest user needs to be able to assign incidents, then in addition to the Azure Sentinel Responder role, the user will also need to be assigned the role of [Directory Reader](../active-directory/roles/permissions-reference.md#directory-readers). Note that this role is *not* an Azure role but an **Azure Active Directory** role, and that regular (non-guest) users have this role assigned by default.
65+
- **Creating and deleting workbooks**
6666

67-
For a side-by-side comparison, see the [table below](#roles-and-allowed-actions).
67+
For a user to create and delete an Azure Sentinel workbook, the user will also need to be assigned with the Azure Monitor role of [Monitoring Contributor](../role-based-access-control/built-in-roles.md#monitoring-contributor). This role is not necessary for *using* workbooks, but only for creating and deleting.
6868

6969
### Other roles you might see assigned
7070

7171
In assigning Azure Sentinel-specific Azure roles, you may come across other Azure and Log Analytics Azure roles that may have been assigned to users for other purposes. You should be aware that these roles grant a wider set of permissions that includes access to your Azure Sentinel workspace and other resources:
7272

7373
- **Azure roles:** [Owner](../role-based-access-control/built-in-roles.md#owner), [Contributor](../role-based-access-control/built-in-roles.md#contributor), and [Reader](../role-based-access-control/built-in-roles.md#reader). Azure roles grant access across all your Azure resources, including Log Analytics workspaces and Azure Sentinel resources.
7474

75-
- **Log Analytics roles:** [Log Analytics Contributor](../role-based-access-control/built-in-roles.md#log-analytics-contributor) and [Log Analytics Reader](../role-based-access-control/built-in-roles.md#log-analytics-reader). Log Analytics roles grant access to your Log Analytics workspaces.
75+
- **Log Analytics roles:** [Log Analytics Contributor](../role-based-access-control/built-in-roles.md#log-analytics-contributor) and [Log Analytics Reader](../role-based-access-control/built-in-roles.md#log-analytics-reader). Log Analytics roles grant access to your Log Analytics workspaces.
7676

7777
For example, a user who is assigned the **Azure Sentinel Reader** role, but not the **Azure Sentinel Contributor** role, will still be able to edit items in Azure Sentinel if assigned the Azure-level **Contributor** role. Therefore, if you want to grant permissions to a user only in Azure Sentinel, you should carefully remove this user’s prior permissions, making sure you do not break any needed access to another resource.
7878

79-
## Roles and allowed actions
79+
## Azure Sentinel roles and allowed actions
8080

81-
The following table summarizes the roles and allowed actions in Azure Sentinel.
81+
The following table summarizes the Azure Sentinel roles and their allowed actions in Azure Sentinel.
8282

83-
| Role | Create and run playbooks| Create and edit workbooks, analytic rules, and other Azure Sentinel resources | Manage incidents (dismiss, assign, etc.) | View data, incidents, workbooks, and other Azure Sentinel resources |
83+
| Role | Create and run playbooks| Create and edit analytic rules and other Azure Sentinel resources [*](#workbooks) | Manage incidents (dismiss, assign, etc.) | View data, incidents, workbooks, and other Azure Sentinel resources |
8484
|---|---|---|---|---|
8585
| Azure Sentinel Reader | -- | -- | -- | ✓ |
8686
| Azure Sentinel Responder | -- | -- | ✓ | ✓ |
8787
| Azure Sentinel Contributor | -- | ✓ | ✓ | ✓ |
8888
| Azure Sentinel Contributor + Logic App Contributor | ✓ | ✓ | ✓ | ✓ |
89+
| | | | | |
8990

91+
<a name=workbooks></a>* Creating and deleting workbooks requires the additional [Monitoring Contributor](../role-based-access-control/built-in-roles.md#monitoring-contributor) role. For more information, see [Additional roles and permissions](#additional-roles-and-permissions).
9092
## Custom roles and advanced Azure RBAC
9193

9294
- **Custom roles**. In addition to, or instead of, using Azure built-in roles, you can create Azure custom roles for Azure Sentinel. Azure custom roles for Azure Sentinel are created the same way you create other [Azure custom roles](../role-based-access-control/custom-roles-rest.md#create-a-custom-role), based on [specific permissions to Azure Sentinel](../role-based-access-control/resource-provider-operations.md#microsoftsecurityinsights) and to [Azure Log Analytics resources](../role-based-access-control/resource-provider-operations.md#microsoftoperationalinsights).

0 commit comments

Comments
 (0)