Skip to content

Commit b08fb1c

Browse files
authored
Merge pull request #49218 from mestew/ASCupdate
ASC edits for RBAC roles
2 parents 6ff0398 + 127e829 commit b08fb1c

File tree

1 file changed

+26
-23
lines changed

1 file changed

+26
-23
lines changed

articles/security-center/security-center-management-groups.md

Lines changed: 26 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 07/18/2018
16+
ms.date: 08/22/2018
1717
ms.author: terrylan
1818

1919
---
@@ -82,21 +82,26 @@ An Azure Active Directory tenant administrator doesn’t have direct access to A
8282

8383
5. Do the tasks you need to make at the elevated access. When you're done, set the switch back to **No**.
8484

85-
### Open or refresh Security Center
86-
Once you have elevated access, open or refresh Azure Security Center to verify you have visibility into all subscriptions under your Azure AD tenant.
85+
86+
### Assign RBAC roles to users
87+
To gain visibility to all subscriptions, tenant administrators need to assign the appropriate RBAC role to any users they wish to grant tenant-wide visibility, including themselves, at the root management group level. The recommended roles to assign are either **Security Admin** or **Security Reader**. Generally, the Security Admin role is required to apply policies on the root level, while Security Reader will suffice to provide tenant-level visibility. For more information about the permissions granted by these roles, see the [Security Admin built-in role description](../role-based-access-control/built-in-roles.md#security-admin) or the [Security Reader built-in role description](../role-based-access-control/built-in-roles.md#security-reader).
88+
89+
90+
#### Assign RBAC roles to users through the Azure portal:
8791

8892
1. Sign in to the [Azure portal](https://portal.azure.com).
89-
2. Ensure you select all the subscriptions in the subscription selector that you would like to view in Security Center.
90-
![Subscription selector screenshot](./media/security-center-management-groups/subscription-selector.png)
91-
1. Select **All services** under the Azure main menu then select **Security Center**.
92-
2. In the **Overview**, there's a subscription coverage chart.
93-
![Subscription coverage chart screenshot](./media/security-center-management-groups/security-center-subscription-coverage.png)
94-
3. Click on **Coverage** to see the list of subscriptions covered.
95-
![Subscription coverage list screenshot](./media/security-center-management-groups/security-center-coverage.png)
93+
2. To view management groups, select **All services** under the Azure main menu then select **Management Groups**.
94+
3. Select a management group and click **details**.
95+
96+
![Management Groups details screenshot](./media/security-center-management-groups/management-group-details.PNG)
97+
98+
4. Click **Access control (IAM)** then **Add**.
99+
5. Select the role to assign and the user, then click **Save**.
100+
101+
![Add Security Reader role screenshot](./media/security-center-management-groups/asc-security-reader.png)
96102

97-
### Assign RBAC roles to users
98-
Once a tenant administrator has elevated access, they can assign an RBAC role to relevant users on the root management group level. The recommended role to assign is [**Reader**](../role-based-access-control/built-in-roles.md#reader). This role is required to provide tenant-level visibility. The assigned role will be automatically propagated to all management groups and subscriptions under the root management group. For more information about RBAC roles, see [Available roles](../active-directory/users-groups-roles/directory-assign-admin-roles.md#available-roles).
99103

104+
#### Assign RBAC roles to users with PowerShell:
100105
1. Install [Azure PowerShell](/powershell/azure/install-azurerm-ps).
101106
2. Run the following commands:
102107

@@ -125,19 +130,17 @@ Once a tenant administrator has elevated access, they can assign an RBAC role to
125130
Remove-AzureRmRoleAssignment -SignInName "[email protected]" -RoleDefinitionName "Reader" -Scope "/"
126131
```
127132
128-
<!-- Currently, PowerShell method only 6/26/18
133+
### Open or refresh Security Center
134+
Once you have elevated access, open or refresh Azure Security Center to verify you have visibility into all subscriptions under your Azure AD tenant.
129135
130136
1. Sign in to the [Azure portal](https://portal.azure.com).
131-
2. To view management groups, select **All services** under the Azure main menu then select **Management Groups**.
132-
3. Select a management group and click **details**.
133-
134-
![Management Groups details screenshot](./media/security-center-management-groups/management-group-details.PNG)
135-
136-
4. Click **Access control (IAM)** then **Add**.
137-
5. Select the role to assign and the user, then click **Save**.
138-
139-
![Add Security Reader role screenshot](./media/security-center-management-groups/asc-security-reader.png)
140-
-->
137+
2. Make sure you select all the subscriptions in the subscription selector that you would like to view in Security Center.
138+
![Subscription selector screenshot](./media/security-center-management-groups/subscription-selector.png)
139+
1. Select **All services** under the Azure main menu then select **Security Center**.
140+
2. In the **Overview**, there's a subscription coverage chart.
141+
![Subscription coverage chart screenshot](./media/security-center-management-groups/security-center-subscription-coverage.png)
142+
3. Click on **Coverage** to see the list of subscriptions covered.
143+
![Subscription coverage list screenshot](./media/security-center-management-groups/security-center-coverage.png)
141144
142145
### Remove elevated access
143146
Once the RBAC roles have been assigned to the users, the tenant administrator should remove itself from the user access administrator role.

0 commit comments

Comments
 (0)