Skip to content

Commit b03080d

Browse files
committed
clarifying with footnote
1 parent cca9e59 commit b03080d

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/sentinel/roles.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,13 +80,15 @@ For example, a user who is assigned the **Azure Sentinel Reader** role, but not
8080

8181
The following table summarizes the Azure Sentinel roles and their allowed actions in Azure Sentinel.
8282

83-
| Role | Create and run playbooks| Create and edit analytic rules and other Azure Sentinel resources | Manage incidents (dismiss, assign, etc.) | View data, incidents, workbooks, and other Azure Sentinel resources |
83+
| Role | Create and run playbooks| Create and edit analytic rules and other Azure Sentinel resources [*](#workbooks) | Manage incidents (dismiss, assign, etc.) | View data, incidents, workbooks, and other Azure Sentinel resources |
8484
|---|---|---|---|---|
8585
| Azure Sentinel Reader | -- | -- | -- | ✓ |
8686
| Azure Sentinel Responder | -- | -- | ✓ | ✓ |
8787
| Azure Sentinel Contributor | -- | ✓ | ✓ | ✓ |
8888
| Azure Sentinel Contributor + Logic App Contributor | ✓ | ✓ | ✓ | ✓ |
89+
| | | | | |
8990

91+
<a name=workbooks></a>* Creating and deleting workbooks requires the additional [Monitoring Contributor](../role-based-access-control/built-in-roles.md#monitoring-contributor) role. For more information, see [Additional roles and permissions](#additional-roles-and-permissions).
9092
## Custom roles and advanced Azure RBAC
9193

9294
- **Custom roles**. In addition to, or instead of, using Azure built-in roles, you can create Azure custom roles for Azure Sentinel. Azure custom roles for Azure Sentinel are created the same way you create other [Azure custom roles](../role-based-access-control/custom-roles-rest.md#create-a-custom-role), based on [specific permissions to Azure Sentinel](../role-based-access-control/resource-provider-operations.md#microsoftsecurityinsights) and to [Azure Log Analytics resources](../role-based-access-control/resource-provider-operations.md#microsoftoperationalinsights).

0 commit comments

Comments
 (0)