Skip to content

Commit cae3588

Browse files
committed
Update permissions needed for running playbooks
1 parent 51d8a2d commit cae3588

File tree

3 files changed

+9
-3
lines changed

3 files changed

+9
-3
lines changed

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ When a Microsoft Sentinel automation rule runs a playbook, it uses a special Mic
123123

124124
In order for an automation rule to run a playbook, this account must be granted explicit permissions to the resource group where the playbook resides. At that point, any automation rule will be able to run any playbook in that resource group.
125125

126-
When you're configuring an automation rule and adding a **run playbook** action, a drop-down list of playbooks will appear. Playbooks to which Microsoft Sentinel does not have permissions will show as unavailable ("grayed out"). You can grant Microsoft Sentinel permission to the playbooks' resource groups on the spot by selecting the **Manage playbook permissions** link.
126+
When you're configuring an automation rule and adding a **run playbook** action, a drop-down list of playbooks will appear. Playbooks to which Microsoft Sentinel does not have permissions will show as unavailable ("grayed out"). You can grant Microsoft Sentinel permission to the playbooks' resource groups on the spot by selecting the **Manage playbook permissions** link. To grant those permissions, you'll need **Owner** permissions on those resource groups. [See the full permissions requirements](tutorial-respond-threats-playbook.md#respond-to-incidents).
127127

128128
#### Permissions in a multi-tenant architecture
129129

articles/sentinel/roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,9 +46,9 @@ Users with particular job requirements may need to be assigned additional roles
4646

4747
- **Giving Microsoft Sentinel permissions to run playbooks**
4848

49-
Microsoft Sentinel uses a special service account to run playbooks manually or to call them from automation rules. The use of this account (as opposed to your user account) increases the security level of the service.
49+
Microsoft Sentinel uses a special service account to run incident-trigger playbooks manually or to call them from automation rules. The use of this account (as opposed to your user account) increases the security level of the service.
5050

51-
In order for an automation rule to run a playbook, this account must be granted explicit permissions to the resource group where the playbook resides. At that point, any automation rule will be able to run any playbook in that resource group.
51+
In order for an automation rule to run a playbook, this account must be granted explicit permissions to the resource group where the playbook resides. At that point, any automation rule will be able to run any playbook in that resource group. To grant these permissions to this service account, your account must have **Owner** permissions on the resource groups containing the playbooks.
5252

5353
- **Connecting data sources to Microsoft Sentinel**
5454

articles/sentinel/tutorial-respond-threats-playbook.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -256,14 +256,20 @@ To create an automation rule:
256256
<a name="explicit-permissions"></a>
257257

258258
> [!IMPORTANT]
259+
>
259260
> **Microsoft Sentinel must be granted explicit permissions in order to run playbooks based on the incident trigger**, whether manually or from automation rules. If a playbook appears "grayed out" in the drop-down list, it means Sentinel does not have permission to that playbook's resource group. Click the **Manage playbook permissions** link to assign permissions.
261+
>
260262
> In the **Manage permissions** panel that opens up, mark the check boxes of the resource groups containing the playbooks you want to run, and click **Apply**.
263+
>
261264
> :::image type="content" source="./media/tutorial-respond-threats-playbook/manage-permissions.png" alt-text="Manage permissions":::
265+
>
262266
> - You yourself must have **owner** permissions on any resource group to which you want to grant Microsoft Sentinel permissions, and you must have the **Logic App Contributor** role on any resource group containing playbooks you want to run.
267+
>
263268
> - In a multi-tenant deployment, if the playbook you want to run is in a different tenant, you must grant Microsoft Sentinel permission to run the playbook in the playbook's tenant.
264269
> 1. From the Microsoft Sentinel navigation menu in the playbooks' tenant, select **Settings**.
265270
> 1. In the **Settings** blade, select the **Settings** tab, then the **Playbook permissions** expander.
266271
> 1. Click the **Configure permissions** button to open the **Manage permissions** panel mentioned above, and continue as described there.
272+
>
267273
> - If, in an **MSSP** scenario, you want to [run a playbook in a customer tenant](automate-incident-handling-with-automation-rules.md#permissions-in-a-multi-tenant-architecture) from an automation rule created while signed into the service provider tenant, you must grant Microsoft Sentinel permission to run the playbook in ***both tenants***. In the **customer** tenant, follow the instructions for the multi-tenant deployment in the preceding bullet point. In the **service provider** tenant, you must add the Azure Security Insights app in your Azure Lighthouse onboarding template:
268274
> 1. From the Azure Portal go to **Azure Active Directory**.
269275
> 1. Click on **Enterprise Applications**.

0 commit comments

Comments
 (0)