Skip to content

Commit c67e085

Browse files
authored
Merge pull request #194991 from cwatson-cat/docs-editor/prerequisites-1649866003
Sentinel - resource locks not supported
2 parents 9a4c06d + 4dd3fd3 commit c67e085

File tree

1 file changed

+25
-31
lines changed

1 file changed

+25
-31
lines changed

articles/sentinel/prerequisites.md

Lines changed: 25 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ ms.custom: ignite-fall-2021
1010

1111
# Pre-deployment activities and prerequisites for deploying Microsoft Sentinel
1212

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
1513
This article introduces the pre-deployment activities and prerequisites for deploying Microsoft Sentinel.
1614

1715
## Pre-deployment activities
@@ -20,27 +18,27 @@ Before deploying Microsoft Sentinel, we recommend taking the following steps to
2018

2119
1. Determine which [data sources](connect-data-sources.md) you need and the data size requirements to help you accurately project your deployment's budget and timeline.
2220

23-
You might determine this information during your business use case review, or by evaluating a current SIEM that you already have in place. If you already have a SIEM in place, analyze your data to understand which data sources provide the most value and should be ingested into Microsoft Sentinel.
21+
You might determine this information during your business use case review, or by evaluating a current SIEM that you already have in place. If you already have a SIEM in place, analyze your data to understand which data sources provide the most value and should be ingested into Microsoft Sentinel.
2422

2523
1. Design your Microsoft Sentinel workspace. Consider parameters such as:
2624

27-
- Whether you'll use a single tenant or multiple tenants
28-
- Any compliance requirements you have for data collection and storage
29-
- How to control access to Microsoft Sentinel data
25+
- Whether you'll use a single tenant or multiple tenants
26+
- Any compliance requirements you have for data collection and storage
27+
- How to control access to Microsoft Sentinel data
3028

31-
For more information, see [Workspace architecture best practices](best-practices-workspace-architecture.md) and [Sample workspace designs](sample-workspace-designs.md).
29+
For more information, see [Workspace architecture best practices](best-practices-workspace-architecture.md) and [Sample workspace designs](sample-workspace-designs.md).
3230

3331
1. After the business use cases, data sources, and data size requirements have been identified, [start planning your budget](billing.md), considering cost implications for each planned scenario.
3432

35-
Make sure that your budget covers the cost of data ingestion for both Microsoft Sentinel and Azure Log Analytics, any playbooks that will be deployed, and so on.
33+
Make sure that your budget covers the cost of data ingestion for both Microsoft Sentinel and Azure Log Analytics, any playbooks that will be deployed, and so on.
3634

37-
For more information, see:
35+
For more information, see:
3836

39-
- [Microsoft Sentinel costs and billing](billing.md)
40-
- [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/azure-sentinel/)
41-
- [Log Analytics pricing](https://azure.microsoft.com/pricing/details/monitor/)
42-
- [Logic apps (playbooks) pricing](https://azure.microsoft.com/pricing/details/logic-apps/)
43-
- [Integrating Azure Data Explorer for long-term log retention](store-logs-in-azure-data-explorer.md)
37+
- [Microsoft Sentinel costs and billing](billing.md)
38+
- [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/azure-sentinel/)
39+
- [Log Analytics pricing](https://azure.microsoft.com/pricing/details/monitor/)
40+
- [Logic apps (playbooks) pricing](https://azure.microsoft.com/pricing/details/logic-apps/)
41+
- [Integrating Azure Data Explorer for long-term log retention](store-logs-in-azure-data-explorer.md)
4442

4543
1. Nominate an engineer or architect lead the deployment, based on requirements and timelines. This individual should lead the deployment and be the main point of contact on your team.
4644

@@ -52,28 +50,24 @@ Before deploying Microsoft Sentinel, make sure that your Azure tenant has the fo
5250

5351
- After you have a tenant, you must have an [Azure subscription](../cost-management-billing/manage/create-subscription.md) to track resource creation and billing.
5452

55-
- After you have a subscription, you'll need the [relevant permissions](../role-based-access-control/index.yml) to begin using your subscription. If you are using a new subscription, an admin or higher from the AAD tenant should be designated as the [owner/contributor](../role-based-access-control/rbac-and-directory-admin-roles.md) for the subscription.
53+
- After you have a subscription, you'll need the [relevant permissions](../role-based-access-control/index.yml) to begin using your subscription. If you are using a new subscription, an admin or higher from the Azure AD tenant should be designated as the [owner/contributor](../role-based-access-control/rbac-and-directory-admin-roles.md) for the subscription.
5654

57-
- To maintain the least privileged access available, assign roles at the level of the resource group.
58-
- For more control over permissions and access, set up custom roles. For more information, see [Role-based access control](../role-based-access-control/custom-roles.md).
59-
- For extra separation between users and security users, you might want to use [resource-context](resource-context-rbac.md) or [table-level RBAC](https://techcommunity.microsoft.com/t5/azure-sentinel/table-level-rbac-in-azure-sentinel/ba-p/965043).
55+
- To maintain the least privileged access available, assign roles at the level of the resource group.
56+
- For more control over permissions and access, set up custom roles. For more information, see [Role-based access control](../role-based-access-control/custom-roles.md).
57+
- For extra separation between users and security users, you might want to use [resource-context](resource-context-rbac.md) or [table-level RBAC](https://techcommunity.microsoft.com/t5/azure-sentinel/table-level-rbac-in-azure-sentinel/ba-p/965043).
6058

61-
For more information about other roles and permissions supported for Microsoft Sentinel, see [Permissions in Microsoft Sentinel](roles.md).
59+
For more information about other roles and permissions supported for Microsoft Sentinel, see [Permissions in Microsoft Sentinel](roles.md).
6260

63-
- A [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) is required to house all of the data that Microsoft Sentinel will be ingesting and using for its detections, analytics, and other features. For more information, see [Microsoft Sentinel workspace architecture best practices](best-practices-workspace-architecture.md).
61+
- A [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) is required to house all of the data that Microsoft Sentinel will be ingesting and using for its detections, analytics, and other features. For more information, see [Microsoft Sentinel workspace architecture best practices](best-practices-workspace-architecture.md). Microsoft Sentinel doesn't support Log Analytics workspaces with a resource lock applied.
6462

65-
> [!TIP]
66-
> When setting up your Microsoft Sentinel workspace, [create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md) that's dedicated to Microsoft Sentinel and the resources that Microsoft Sentinel users including the Log Analytics workspace, any playbooks, workbooks, and so on.
67-
>
68-
> A dedicated resource group allows for permissions to be assigned once, at the resource group level, with permissions automatically applied to any relevant resources. Managing access via a resource group helps to ensure that you're using Microsoft Sentinel efficiently without potentially issuing improper permissions. Without a resource group for Microsoft Sentinel, where resources are scattered among multiple resource groups, a user or service principal may find themselves unable to perform a required action or view data due to insufficient permissions.
69-
>
70-
> To implement more access control to resources by tiers, use extra resource groups to house the resources that should be accessed only by those groups. Using multiple tiers of resource groups enables you to separate access between those tiers.
71-
>
63+
We recommend that when you set up your Microsoft Sentinel workspace, [create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md) that's dedicated to Microsoft Sentinel and the resources that Microsoft Sentinel users including the Log Analytics workspace, any playbooks, workbooks, and so on.
7264

73-
## Next steps
65+
A dedicated resource group allows for permissions to be assigned once, at the resource group level, with permissions automatically applied to any relevant resources. Managing access via a resource group helps to ensure that you're using Microsoft Sentinel efficiently without potentially issuing improper permissions. Without a resource group for Microsoft Sentinel, where resources are scattered among multiple resource groups, a user or service principal may find themselves unable to perform a required action or view data due to insufficient permissions.
66+
To implement more access control to resources by tiers, use extra resource groups to house the resources that should be accessed only by those groups. Using multiple tiers of resource groups enables you to separate access between those tiers.
7467

68+
## Next steps
7569
> [!div class="nextstepaction"]
76-
>[On-board Microsoft Sentinel](quickstart-onboard.md)
77-
70+
> >[On-board Microsoft Sentinel](quickstart-onboard.md)
7871
> [!div class="nextstepaction"]
79-
>[Get visibility into alerts](get-visibility.md)
72+
> >[Get visibility into alerts](get-visibility.md)
73+

0 commit comments

Comments
 (0)