Skip to content

Commit 1f7468d

Browse files
committed
new drafts for transition guide
1 parent 1f13871 commit 1f7468d

File tree

5 files changed

+28
-33
lines changed

5 files changed

+28
-33
lines changed

unified-secops-platform/TOC.yml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,6 @@
1818
items:
1919
- name: Experience in the Defender portal
2020
href: /azure/sentinel/microsoft-sentinel-defender-portal?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
21-
- name: Move your Microsoft Sentinel experience to the Defender portal
22-
href: /azure/sentinel/move-to-defender?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
2321
- name: Integration with Defender XDR
2422
href: /azure/sentinel/microsoft-365-defender-sentinel-integration?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json&tabs=defender-portal
2523
- name: Microsoft Copilot
@@ -43,13 +41,13 @@
4341
items:
4442
- name: Overview
4543
href: overview-deploy.md
44+
- name: Transition your Microsoft Sentinel environment to the Defender portal
45+
href: /azure/sentinel/move-to-defender?branch=pr-en-us-299308&toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
4646
- name: Connect Microsoft Sentinel to Microsoft Defender
4747
href: microsoft-sentinel-onboard.md
48-
- name: Transition to unified SecOps by persona
49-
href: transition.md
5048
- name: Reduce security risk
5149
items:
52-
- name: Improve security posture and reduce risk"
50+
- name: Improve security posture and reduce risk
5351
href: reduce-risk-overview.md
5452
- name: Protect your environment with Exposure Management
5553
href: overview-msem-strategy.md

unified-secops-platform/gov-support.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Support for US Government customers
2+
title: Microsoft Unified Security Operations Support for US Government Customers
33
description: Learn about support for Microsoft's unified SecOps platform for US Government clouds.
44
author: batamig
55
ms.author: bagol
@@ -14,9 +14,9 @@ ms.collection:
1414

1515
---
1616

17-
# Microsoft's unified security operations platform for US Government customers
17+
# Microsoft's unified security operations support for US Government customers
1818

19-
This article provides information about Microsoft's unified security operations (SecOps) platform for US Government customers.
19+
This article provides information about Microsoft's unified security operations (SecOps) support for US Government customers.
2020

2121
## Feature availability
2222

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -56,15 +56,17 @@ To onboard and use Microsoft Sentinel in the Defender portal, you must have the
5656

5757
|Task |Microsoft Entra or Azure built-in role required |Scope |
5858
|---------|---------|---------|
59-
|Onboard Microsoft Sentinel to the Defender portal|[Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) or [security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) in Microsoft Entra ID|Tenant|
60-
|Connect or disconnect a workspace with Microsoft Sentinel enabled|[Owner](/azure/role-based-access-control/built-in-roles#owner) or </br>[User Access Administrator](/azure/role-based-access-control/built-in-roles#user-access-administrator) and [Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) |- Subscription for Owner or User Access Administrator roles </br></br>- Subscription, resource group, or workspace resource for Microsoft Sentinel Contributor |
61-
|Change the primary workspace|[Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) or [security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) in Microsoft Entra ID|Tenant|
62-
|View Microsoft Sentinel in the Defender portal|[Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-reader) |Subscription, resource group, or workspace resource |
63-
|Query Microsoft Sentinel data tables or view incidents |[Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-reader) or a role with the following actions:</br>- Microsoft.OperationalInsights/workspaces/read</br>- Microsoft.OperationalInsights/workspaces/query/read</br>- Microsoft.SecurityInsights/Incidents/read</br>- Microsoft.SecurityInsights/incidents/comments/read</br>- Microsoft.SecurityInsights/incidents/relations/read</br>- Microsoft.SecurityInsights/incidents/tasks/read|Subscription, resource group, or workspace resource |
64-
|Take investigative actions on incidents |[Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) or a role with the following actions:</br>- Microsoft.OperationalInsights/workspaces/read</br>- Microsoft.OperationalInsights/workspaces/query/read</br>- Microsoft.SecurityInsights/incidents/read</br>- Microsoft.SecurityInsights/incidents/write</br>- Microsoft.SecurityInsights/incidents/comments/read</br>- Microsoft.SecurityInsights/incidents/comments/write</br>- Microsoft.SecurityInsights/incidents/relations/read</br>- Microsoft.SecurityInsights/incidents/relations/write</br>- Microsoft.SecurityInsights/incidents/tasks/read</br>- Microsoft.SecurityInsights/incidents/tasks/write |Subscription, resource group, or workspace resource |
65-
|Create a support request |[Owner](/azure/role-based-access-control/built-in-roles#owner) or </br> [Contributor](/azure/role-based-access-control/built-in-roles#contributor) or </br> [Support request contributor](/azure/role-based-access-control/built-in-roles#support-request-contributor) or a custom role with Microsoft.Support/*|Subscription |
59+
|**Onboard Microsoft Sentinel to the Defender portal**|[Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) or [security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) in Microsoft Entra ID|Tenant|
60+
|**Connect or disconnect a workspace with Microsoft Sentinel enabled**|[Owner](/azure/role-based-access-control/built-in-roles#owner) or </br>[User Access Administrator](/azure/role-based-access-control/built-in-roles#user-access-administrator) and [Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) |- Subscription for Owner or User Access Administrator roles </br></br>- Subscription, resource group, or workspace resource for Microsoft Sentinel Contributor |
61+
|**Change the primary workspace**|[Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) or [security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) in Microsoft Entra ID|Tenant|
62+
|**View Microsoft Sentinel in the Defender portal**|[Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-reader) |Subscription, resource group, or workspace resource |
63+
|**Query Microsoft Sentinel data tables or view incidents** |[Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-reader) or a role with the following actions:</br>- Microsoft.OperationalInsights/workspaces/read</br>- Microsoft.OperationalInsights/workspaces/query/read</br>- Microsoft.SecurityInsights/Incidents/read</br>- Microsoft.SecurityInsights/incidents/comments/read</br>- Microsoft.SecurityInsights/incidents/relations/read</br>- Microsoft.SecurityInsights/incidents/tasks/read|Subscription, resource group, or workspace resource |
64+
|**Take investigative actions on incidents** |[Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) or a role with the following actions:</br>- Microsoft.OperationalInsights/workspaces/read</br>- Microsoft.OperationalInsights/workspaces/query/read</br>- Microsoft.SecurityInsights/incidents/read</br>- Microsoft.SecurityInsights/incidents/write</br>- Microsoft.SecurityInsights/incidents/comments/read</br>- Microsoft.SecurityInsights/incidents/comments/write</br>- Microsoft.SecurityInsights/incidents/relations/read</br>- Microsoft.SecurityInsights/incidents/relations/write</br>- Microsoft.SecurityInsights/incidents/tasks/read</br>- Microsoft.SecurityInsights/incidents/tasks/write |Subscription, resource group, or workspace resource |
65+
|**Create a support request** |[Owner](/azure/role-based-access-control/built-in-roles#owner) or </br> [Contributor](/azure/role-based-access-control/built-in-roles#contributor) or </br> [Support request contributor](/azure/role-based-access-control/built-in-roles#support-request-contributor) or a custom role with Microsoft.Support/*|Subscription |
6666

67-
After you connect Microsoft Sentinel to the Defender portal, your existing Azure role-based access control (RBAC) permissions allow you to work with the Microsoft Sentinel features that you have access to. Continue to manage roles and permissions for your Microsoft Sentinel users from the Azure portal. Any Azure RBAC changes are reflected in the Defender portal. For more information about Microsoft Sentinel permissions, see [Roles and permissions in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/roles) and [Manage access to Microsoft Sentinel data by resource | Microsoft Learn](/azure/sentinel/resource-context-rbac).
67+
After you connect Microsoft Sentinel to the Defender portal, your existing Azure role-based access control (RBAC) permissions allow you to work with the Microsoft Sentinel features that you have access to. Continue to manage roles and permissions for your Microsoft Sentinel users from the Azure portal, as any Azure RBAC changes are reflected in the Defender portal.
68+
69+
For more information, see [Roles and permissions in Microsoft Sentinel](/azure/sentinel/roles) and [Manage access to Microsoft Sentinel data by resource](/azure/sentinel/resource-context-rbac).
6870

6971
### Microsoft's unified SecOps platform prerequisites
7072

@@ -76,22 +78,14 @@ To unify capabilities with Defender XDR in Microsoft's unified SecOps platform,
7678

7779
If applicable, complete these prerequisites:
7880

79-
- If your organization uses Microsoft Purview Insider Risk Management, integrate that data by enabling the data connector **Microsoft 365 Insider Risk Management** on your primary workspace for Microsoft Sentinel. Disable that connector on any secondary workspaces for Microsoft Sentinel that you plan to onboard to the Defender portal.
80-
- Install the **Microsoft Purview Insider Risk Management** solution from the **Content hub** on the primary workspace.
81-
- Configure the data connector.
82-
- For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy).
83-
- To stream Defender for Cloud incidents that are correlated across all subscriptions of the tenant to the primary workspace for Microsoft Sentinel:
84-
- Connect the **Tenant-based Microsoft Defender for Cloud (Preview)** data connector in the primary workspace.
85-
- Disconnect the **Subscription-based Microsoft Defender for Cloud (Legacy)** alerts connector from all workspaces in the tenant.
86-
87-
If you don't want to stream correlated tenant data for Defender for Cloud to the primary workspace, continue to use the **Subscription-based Microsoft Defender for Cloud (Legacy)** connector on your workspaces.
88-
89-
For more information, see [Ingest Microsoft Defender for Cloud incidents with Microsoft Defender XDR integration](/azure/sentinel/ingest-defender-for-cloud-incidents).
90-
81+
|Service |Prerequisite |
82+
|---------|---------|
83+
|**Microsoft Purview Insider Risk Management*** | If your organization uses Microsoft Purview Insider Risk Management, integrate that data by enabling the data connector **Microsoft 365 Insider Risk Management** on your primary workspace for Microsoft Sentinel. Disable that connector on any secondary workspaces for Microsoft Sentinel that you plan to onboard to the Defender portal. <br><br>- Install the **Microsoft Purview Insider Risk Management** solution from the **Content hub** on the primary workspace.<br>- Configure the data connector. <br><br>For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy). |
84+
|**Microsoft Defender for Cloud** | To stream Defender for Cloud incidents that are correlated across all subscriptions of the tenant to the primary workspace for Microsoft Sentinel: <br><br>- Connect the **Tenant-based Microsoft Defender for Cloud (Preview)** data connector in the primary workspace.<br> - Disconnect the **Subscription-based Microsoft Defender for Cloud (Legacy)** alerts connector from all workspaces in the tenant. <br><br>If you don't want to stream correlated tenant data for Defender for Cloud to the primary workspace, continue to use the **Subscription-based Microsoft Defender for Cloud (Legacy)** connector on your workspaces. For more information, see [Ingest Microsoft Defender for Cloud incidents with Microsoft Defender XDR integration](/azure/sentinel/ingest-defender-for-cloud-incidents). |
9185

9286
## Onboard Microsoft Sentinel
9387

94-
To connect a Microsoft Sentinel workspace to the Defender portal, complete the following steps. If you're onboarding Microsoft Sentinel without Defender XDR (preview), there's an extra step to trigger the connection with Microsoft Sentinel and Defender portal.
88+
To connect a Microsoft Sentinel workspace to the Defender portal, complete the following steps. If you're onboarding Microsoft Sentinel without Defender XDR, there's an extra step to trigger the connection with Microsoft Sentinel and Defender portal.
9589

9690
1. Go to the [Microsoft Defender portal](https://security.microsoft.com/) and sign in.
9791
1. To onboard Microsoft Sentinel without Defender XDR in the Defender portal:

unified-secops-platform/overview-deploy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,7 @@ For more information, see:
7979
- [Onboarding prerequisites](microsoft-sentinel-onboard.md#prerequisites)
8080
- [Assign Microsoft Entra ID roles to users](/entra/identity/role-based-access-control/manage-roles-portal)
8181
- [Grant a user access to Azure roles](/azure/role-based-access-control/quickstart-assign-role-user-portal)
82+
- [Managing unified RBAC in Microsoft Defender](https://aka.ms/defender_RBAC) (video demo)
8283

8384
## Onboard to unified SecOps
8485

unified-secops-platform/overview-plan.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Plan your deployment | Microsoft Defender
3-
description: Plan to deploy Microsoft's unified security operations platform with the Microsoft Defender portal, Microsoft Sentinel, and other Microsoft Defender services.
2+
title: Planning Guidance for Unified Security Operations in the Microsoft Defender Portal
3+
description: Plan to deploy unified security operations in the Microsoft Defender portal, including Microsoft Sentinel and other Microsoft Defender services.
44
author: batamig
55
ms.author: bagol
66
ms.service: unified-secops-platform
@@ -12,11 +12,11 @@ ms.collection:
1212
- msftsolution-secops
1313

1414

15-
#customer intent: As a security administrator, I want to plan my unified security operations platform deployment so that I can access Microsoft Sentinel services together with other Microsoft Defender services in the Microsoft Defender portal.
15+
#customer intent: As a security administrator, I want to plan my unified security operations deployment so that I can access Microsoft Sentinel services together with other Microsoft Defender services in the Microsoft Defender portal.
1616

1717
---
1818

19-
# Microsoft's unified security operations platform planning overview
19+
# Planning guidance for unified security operations in the Microsoft Defender portal
2020

2121
This article outlines activities to plan a deployment of Microsoft's security products to Microsoft's unified security operations platform for end-to-end security operations (SecOps). Unify your SecOps on Microsoft's platform to help you reduce risk, prevent attacks, detect and disrupt cyberthreats in real time, and respond faster with AI-enhanced security capabilities, all from the [Microsoft Defender portal](https://security.microsoft.com).
2222

@@ -214,6 +214,8 @@ For more information, see:
214214
- [Azure built-in roles](/azure/role-based-access-control/built-in-roles)
215215
- [Microsoft Sentinel roles](/azure/role-based-access-control/built-in-roles#security)
216216
- [Onboarding prerequisites](microsoft-sentinel-onboard.md#prerequisites)
217+
- [Managing unified RBAC in Microsoft Defender](https://aka.ms/defender_RBAC) (video demo)
218+
217219

218220
## Plan Zero Trust activities
219221

0 commit comments

Comments
 (0)