Skip to content

Commit bb3c12c

Browse files
Merge pull request #284497 from batamig/global-admin
Sentinel fixing global admin
2 parents 020636c + 71d34ac commit bb3c12c

7 files changed

+8
-8
lines changed

articles/sentinel/connect-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Micros
3737

3838
- Your user must be assigned the [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role on the workspace.
3939

40-
- Your user must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
40+
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
4141

4242
- Your user must have read and write permissions to the Microsoft Entra diagnostic settings in order to be able to see the connection status.
4343
- Install the solution for **Microsoft Entra ID** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The Defender XDR connector, especially its incident integration feature, is the
2323
Before you begin, you must have the appropriate licensing, access, and configured resources described in this section.
2424

2525
- You must have a valid license for Microsoft Defender XDR, as described in [Microsoft Defender XDR prerequisites](/microsoft-365/security/mtp/prerequisites).
26-
- Your user account must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
26+
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
2727
- You must have read and write permissions on your Microsoft Sentinel workspace.
2828
- To make any changes to the connector settings, your account must be a member of the same Microsoft Entra tenant with which your Microsoft Sentinel workspace is associated.
2929
- Install the solution for **Microsoft Defender XDR** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).

articles/sentinel/connect-microsoft-purview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Before you begin, verify that you have:
5454
- A defined Microsoft Sentinel workspace.
5555
- A valid license to M365 E3, M365 A3, Microsoft Business Basic or any other Audit eligible license. Read more about [auditing solutions in Microsoft Purview](/microsoft-365/compliance/audit-solutions-overview).
5656
- [Enabled Sensitivity labels for Office](/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files?view=o365-worldwide#use-the-microsoft-purview-compliance-portal-to-enable-support-for-sensitivity-labels&preserve-view=true) and [enabled auditing](/microsoft-365/compliance/turn-audit-log-search-on-or-off?view=o365-worldwide#use-the-compliance-center-to-turn-on-auditing&preserve-view=true).
57-
- The Global Administrator or Security Administrator role on the workspace.
57+
- The Security Administrator role on the tenant, or the equivalent permissions.
5858

5959
## Set up the connector
6060

articles/sentinel/connect-services-api-based.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article presents information that is common to the group of API-based data
1818
## Prerequisites
1919

2020
- You must have read and write permissions on the Log Analytics workspace.
21-
- You must have the Global administrator or Security administrator role on your Microsoft Sentinel workspace's tenant.
21+
- You must have a Security administrator role on your Microsoft Sentinel workspace's tenant, or the equivalent permissions.
2222
- Data connector specific requirements:
2323

2424
|Data connector |Licensing, costs, and other prerequisites |

articles/sentinel/connect-threat-intelligence-tip.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Learn more about [Threat Intelligence](understand-threat-intelligence.md) in Mic
3434
## Prerequisites
3535

3636
- In order to install, update and delete standalone content or solutions in content hub, you need the **Microsoft Sentinel Contributor** role at the resource group level.
37-
- You must have either the **Global administrator** or **Security administrator** Microsoft Entra roles in order to grant permissions to your TIP product or to any other custom application that uses direct integration with the Microsoft Graph Security tiIndicators API.
37+
- To grant permissions to your TIP product or any other custom application that uses direct integration with the Microsoft Graph TI Indicators API, you must have the **Security administrator** Microsoft Entra role, or the equivalent permissions.
3838
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
3939

4040
## Instructions
@@ -90,7 +90,7 @@ You can get this information from your Microsoft Entra ID through a process call
9090

9191
#### Get consent from your organization to grant these permissions
9292

93-
1. To get consent, you need a Microsoft Entra Global Administrator to select the **Grant admin consent for your tenant** button on your app’s **API permissions** page. If you do not have the Global Administrator role on your account, this button will not be available, and you will need to ask a Global Administrator from your organization to perform this step.
93+
1. To grant consent, a privileged role is required. For more information, see [Grant tenant-wide admin consent to an application](/entra/identity/enterprise-apps/grant-admin-consent?pivots=portal).
9494

9595
:::image type="content" source="media/connect-threat-intelligence-tip/threat-intel-api-permissions-2.png" alt-text="Grant consent":::
9696

articles/sentinel/enable-entity-behavior-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ As Microsoft Sentinel collects logs and alerts from all of its connected data so
2424

2525
To enable or disable this feature (these prerequisites are not required to use the feature):
2626

27-
- Your user must be assigned the Microsoft Entra ID **Global Administrator** or **Security Administrator** roles in your tenant.
27+
- Your user must be assigned to the Microsoft Entra ID **Security Administrator** role in your tenant or the equivalent permissions.
2828

2929
- Your user must be assigned at least one of the following **Azure roles** ([Learn more about Azure RBAC](roles.md)):
3030
- **Microsoft Sentinel Contributor** at the workspace or resource group levels.

articles/sentinel/roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ After understanding how roles and permissions work in Microsoft Sentinel, you ca
122122
| | [Logic Apps Contributor](../role-based-access-control/built-in-roles.md#logic-app-contributor) | Microsoft Sentinel's resource group, or the resource group where your playbooks are stored | Attach playbooks to analytics and automation rules. <br>Run and modify playbooks. |
123123
| **Service Principal** | [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) | Microsoft Sentinel's resource group | Automated configuration for management tasks |
124124

125-
More roles might be required depending on the data you ingest or monitor. For example, Microsoft Entra roles might be required, such as the Global Administrator or Security Administrator roles, to set up data connectors for services in other Microsoft portals.
125+
More roles might be required depending on the data you ingest or monitor. For example, Microsoft Entra roles might be required, such as the Security Administrator role, to set up data connectors for services in other Microsoft portals.
126126

127127
## Resource-based access control
128128

0 commit comments

Comments
 (0)