You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/scoping.md
+22-15Lines changed: 22 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,12 +20,15 @@ Scoping is configured in the Microsoft Defender portal.
20
20
21
21
## What is Microsoft Sentinel scoping?
22
22
23
-
Microsoft Sentinel scoping extends permissions management in the Defender portal to enable:
23
+
Microsoft Sentinel scoping extends permissions management in the Defender portal so the administrator can grant permissions to specific subsets of data in Sentinel tables. To create scopes, do the following:
24
24
25
-
-**Define logical scopes**: Create scope definitions that align with your organizational structure (by business unit, region, or data sensitivity)
26
-
-**Tag data rows at ingestion time**: Apply scope tags to rows in tables using Table Management, allowing you to create rules that tag newly ingested data automatically
27
-
-**Assign users or groups to scopes**: Assign specific users or groups to one or more scopes using Unified RBAC
28
-
-**Restrict access by scope**: Limit user access to alerts, incidents, hunting queries, and data lake exploration based on their assigned scope
25
+
-[Define logical scopes](#step-1-create-a-sentinel-scope): Create scope definitions that align with your organizational structure (by business unit, region, or data sensitivity)
26
+
-[Assign users or groups to scopes](#step-2-assign-scopes-tags-to-users-or-groups): Assign specific users or groups to one or more scopes using Unified RBAC
27
+
-[Tag data rows at ingestion time](#step-3-tag-tables-with-scope): Apply scope tags to rows in tables using Table Management, allowing you to create rules that tag newly ingested data automatically
28
+
-[Restrict access by scope](#step-4-access-scoped-data): Limit user access to alerts, incidents, hunting queries, and data lake exploration based on their assigned scope
29
+
30
+
> [!NOTE]
31
+
> Scopes are additive. Users assigned multiple roles get the broadest permissions available to them from all their assignments. For example, if you hold both an Entra global reader role and a Defender XDR URBAC role that provides scoped permissions on *System tables*, you're unrestricted by scopes on System tables due to the Entra role. Another example is if you hold the same role permissions in Microsoft Defender XDR for a workspace, with two different scopes, you have that permission for both scopes.
29
32
30
33
Scopes apply to Sentinel tables that support ingestion-time transformations.
31
34
@@ -61,19 +64,19 @@ You can create multiple scopes and define your own values for each scope to refl
61
64
> [!NOTE]
62
65
> You can create up to 100 unique Sentinel scopes per tenant.
63
66
64
-
:::image type="content" source="./media/scoping/add-scope.png" alt-text="Screenshot of the Add Sentinel scope tab and dialog." lightbox="./media/scoping/add-scope.png":::
67
+
:::image type="content" source="./media/scoping/add-scope.png" alt-text="Screenshot of the Add Sentinel scope tab and dialog.":::
65
68
66
69
## Step 2: Assign scopes tags to users or groups
67
70
68
71
1. In **Permissions**, open the **Roles** tab.
69
72
1. Select **Create custom role**.
70
73
1. Configure the role name and description and select **Next**.
71
74
72
-
:::image type="content" source="./media/scoping/set-up-basics.png" alt-text="Screenshot of dialog for creating name and description of a custom role." lightbox="./media/scoping/set-up-basics.png":::
75
+
:::image type="content" source="./media/scoping/set-up-basics.png" alt-text="Screenshot of dialog for creating name and description of a custom role.":::
73
76
74
77
1. Assign the required permissions to the role and select **Apply**.
75
78
76
-
:::image type="content" source="./media/scoping/assign-permissions.png" alt-text="Screenshot of dialog for assigning permissions to a custom role." lightbox="./media/scoping/assign-permissions.png":::
79
+
:::image type="content" source="./media/scoping/assign-permissions.png" alt-text="Screenshot of dialog for assigning permissions to a custom role.":::
77
80
78
81
1. In **Assignments**, give it a name and select:
79
82
- Users or user groups (Azure AD groups)
@@ -84,7 +87,7 @@ You can create multiple scopes and define your own values for each scope to refl
84
87
85
88
Users can be assigned to multiple scopes simultaneously over multiple workspaces, with access rights aggregated across all assigned scopes. Restricted users can only access SIEM data associated with their assigned scopes.
86
89
87
-
:::image type="content" source="./media/scoping/edit-scope.png" alt-text="Screenshot of assigning Sentinel scopes to a custom role." lightbox="./media/scoping/edit-scope.png":::
90
+
:::image type="content" source="./media/scoping/edit-scope.png" alt-text="Screenshot of assigning Sentinel scopes to a custom role.":::
88
91
89
92
## Step 3: Tag tables with scope
90
93
@@ -94,7 +97,7 @@ You enforce scopes by tagging data during ingestion. This tagging creates a Data
94
97
1. Select a table that supports ingestion-time transformations.
95
98
1. Select **Scope tag rule**.
96
99
97
-
:::image type="content" source="./media/scoping/scope-tag-rule.png" alt-text="Screenshot of the Scope tag rule tab." lightbox="./media/scoping/scope-tag-rule.png":::
100
+
:::image type="content" source="./media/scoping/scope-tag-rule.png" alt-text="Screenshot of the Scope tag rule tab.":::
98
101
99
102
1. Enable the **Allow use of scope tags for RBAC** toggle.
100
103
1. Enable the **Scope tag rule** toggle.
@@ -109,12 +112,12 @@ You enforce scopes by tagging data during ingestion. This tagging creates a Data
109
112
1. Select the scope to apply to rows matching the expression.
110
113
1. Save the rule.
111
114
112
-
Only newly ingested data is tagged. Previously ingested data isn't included. After tagging, it can take 5-10 minutes for the new rule to take effect.
115
+
Only newly ingested data is tagged. Previously ingested data isn't included. After tagging, it can take up to an hour for the new rule to take effect.
113
116
114
117
> [!TIP]
115
118
> You can create multiple scope tag rules on the same table to tag different rows with different scopes. Records can belong to multiple scopes simultaneously.
116
119
117
-
:::image type="content" source="./media/scoping/table-scope-tag-rule.png" alt-text="Screenshot of the table scope tag rule." lightbox="./media/scoping/table-scope-tag-rule.png":::
120
+
:::image type="content" source="./media/scoping/table-scope-tag-rule.png" alt-text="Screenshot of the table scope tag rule.":::
118
121
119
122
## Step 4: Access scoped data
120
123
@@ -134,23 +137,27 @@ Alerts inherit scope from the underlying data. Incidents are visible if at least
134
137
135
138
The `SentinelScope_CF` custom field is available for use in queries and detection rules to reference scope in your analytics.
136
139
137
-
:::image type="content" source="./media/scoping/scoped-alerts-view.png" alt-text="Screenshot of alerts filtered by Sentinel scope." lightbox="./media/scoping/scoped-alerts-view.png":::
140
+
> [!NOTE]
141
+
When you create custom detections and analytics rules, you must project the `SentinelScope_CF` column in their KQL to make the triggered alerts visible to scoped analysts. If you don't project this column, alerts are unscoped and hidden from scoped users.
142
+
143
+
:::image type="content" source="./media/scoping/scoped-alerts-view.png" alt-text="Screenshot of alerts filtered by Sentinel scope.":::
138
144
139
145
## Limitations
140
146
141
147
The following limitations apply:
142
148
143
149
- **Historical data**: Only newly ingested data is scoped. Previously ingested data isn't included and can't be retroactively scoped.
144
-
- **Table support**: Only tables that support ingestion-time transformations can be tagged. Custom tables (CLv1) aren't supported.
150
+
- **Table support**: Only tables that support ingestion-time transformations can be tagged. Custom tables (CLv1) aren't supported. CLv2 Tables are supported.
145
151
- **Transformation placement**: Transformations can only be added in the same subscription as the user's subscription.
146
152
- **Maximum scopes**: You can create a maximum of 100 unique Sentinel scopes per tenant.
147
153
- **Defender portal only**: Sentinel in the Azure portal (Ibiza) doesn't support scoping. Use the Defender portal instead.
148
154
- **XDR tables not supported**: XDR tables aren't directly supported. If you extend retention of XDR tables into Log Analytics, you can tag, but only data with 30+ days retention, and not data between 0-30 days.
149
155
- **No automatic scope inheritance**: The Log Analytics tables `SecurityAlerts` and `SecurityIncidents` don't automatically inherit the scope from the raw data/tables from which they were generated. Therefore, scoped users can't access them by default. As a workaround you can do one of the following actions:
150
156
- Use the XDR `AlertsInfo` and `AlertsEvidence` tables where scope is automatically inherited, or
151
157
- Apply scope to these Log Analytics tables manually (this method is limited to the attributes in the table and might not be equivalent to inheritance of the data tables that generated these alerts).
158
+
- **Supported experiences**: Sentinel scopes can only be assigned to Defender XDR RBAC roles. Azure RBAC permissions on workspaces or Entra global role permissions aren't supported. Experiences that can't use row level RBAC, such as Jupyter Notebooks, don't allow users who are restricted to a scope to view data for those respective workspaces.
152
159
153
-
## Known issues
160
+
## Known Issues
154
161
155
162
**Scope application issue**: Sometimes, scope doesn't correctly apply to a table. In that case, create a blank transformation rule on the table first (in Azure), and then continue to tag the table with scope.
0 commit comments