Skip to content

Commit 1f13871

Browse files
committed
pulling in more transition guide content
2 parents 5f0917c + 2a4c7fe commit 1f13871

File tree

4 files changed

+32
-4
lines changed

4 files changed

+32
-4
lines changed

unified-secops-platform/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,8 @@
4545
href: overview-deploy.md
4646
- name: Connect Microsoft Sentinel to Microsoft Defender
4747
href: microsoft-sentinel-onboard.md
48+
- name: Transition to unified SecOps by persona
49+
href: transition.md
4850
- name: Reduce security risk
4951
items:
5052
- name: Improve security posture and reduce risk"
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
ms.topic: include
5+
ms.date: 04/22/2025
6+
---
7+
8+
The minimal required permission for an analyst to view Microsoft Sentinel data is to delegate permissions for the Azure RBAC Sentinel Reader role. These permissions are also applied to the unified portal. Without these permissions, the Microsoft Sentinel navigation menu isn't available on the unified portal, despite the analyst having access to the Microsoft Defender portal.
9+
10+
A best practice is to have all Microsoft Sentinel related resources in the same Azure resource group, then delegate Microsoft Sentinel role permissions (like the Sentinel Reader role) at the resource group level that contains the Microsoft Sentinel workspace. By doing this, the role assignment applies to all the resources that support Microsoft Sentinel.

unified-secops-platform/overview-deploy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,9 +72,11 @@ For more information, see [Onboard Microsoft Sentinel](/azure/sentinel/quickstar
7272

7373
Provision your users based on the access plan you'd [prepared earlier](overview-plan.md#plan-roles-and-permissions). To comply with Zero Trust principles, we recommend that you use role-based access control (RBAC) to provide user access only to the resources that are allowed and relevant for each user, instead of providing access to the entire environment.
7474

75+
[!INCLUDE [mininum-access-requirements](includes/mininum-access-requirements.md)]
76+
7577
For more information, see:
7678

77-
- [Activate Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/activate-defender-rbac)
79+
- [Onboarding prerequisites](microsoft-sentinel-onboard.md#prerequisites)
7880
- [Assign Microsoft Entra ID roles to users](/entra/identity/role-based-access-control/manage-roles-portal)
7981
- [Grant a user access to Azure roles](/azure/role-based-access-control/quickstart-assign-role-user-portal)
8082

unified-secops-platform/overview-plan.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -178,12 +178,19 @@ The following table describes portals for other workloads that can impact your s
178178

179179
## Plan roles and permissions
180180

181-
Use Microsoft Entra role based access control (RBAC) to create and assign roles within your security operations team to grant appropriate access to services included in Microsoft's unified SecOps platform.
181+
Microsoft's unified security operations (SecOps) platform unifies the following role-based access control (RBAC) models:
182182

183-
The Microsoft Defender XDR Unified role-based access control (RBAC) model provides a single permissions management experience that provides one central location for administrators to control user permissions across several security solutions. For more information, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac).
183+
- [Microsoft Entra ID RBAC](/entra/identity/role-based-access-control/custom-overview), used for delegating access to Defender access, like device groups
184+
- [Azure RBAC](/azure/role-based-access-control/), used by Microsoft Sentinel to delegate permissions
185+
- [Defender unified RBAC](/defender-xdr/manage-rbac), used to delegate permissions across Defender solutions
184186

185-
For the following services, use the different roles available, or create custom roles, to give you fine-grained control over what users can see and do. For more information, see:
187+
While permissions granted through Azure RBAC for Microsoft Sentinel are federated during runtime with Defender's unified RBAC, Azure RBAC and Defender RBAC are still managed separately.
188+
189+
Defender's unified RBAC isn't required to onboard your workspace to the Defender portal, and Microsoft Sentinel permissions continue to work as expected in the Defender portal even without unified RBAC. However, using unified RBAC does simplify the delegation of permissions across Defender solutions. For more information, see [Activate Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/activate-defender-rbac).
186190

191+
[!INCLUDE [mininum-access-requirements](includes/mininum-access-requirements.md)]
192+
193+
For the following services, use the different roles available, or create custom roles, to give you fine-grained control over what users can see and do. For more information, see:
187194

188195
| Security service | Link to role requirements |
189196
| ------------------------ | ------------------------------------------- |
@@ -201,6 +208,13 @@ For the following services, use the different roles available, or create custom
201208
| Microsoft Defender for Cloud | [User roles and permissions](/azure/defender-for-cloud/permissions) |
202209
| Microsoft Purview Insider Risk Management | [Enable permissions for insider risk management](/purview/insider-risk-management-configure?tabs=purview-portal#step-1-required-enable-permissions-for-insider-risk-management) |
203210

211+
For more information, see:
212+
213+
- [Plan roles and permissions for Microsoft Sentinel](/azure/sentinel/roles)
214+
- [Azure built-in roles](/azure/role-based-access-control/built-in-roles)
215+
- [Microsoft Sentinel roles](/azure/role-based-access-control/built-in-roles#security)
216+
- [Onboarding prerequisites](microsoft-sentinel-onboard.md#prerequisites)
217+
204218
## Plan Zero Trust activities
205219

206220
Microsoft's unified SecOps platform is part of [Microsoft's Zero Trust security model](zero-trust.md), which includes the following principles:

0 commit comments

Comments
 (0)