Skip to content

Commit 2d73369

Browse files
Merge pull request #313727 from mberdugo/Scoping-SyncRBOnly
Scopes - Tomas
2 parents 861aa20 + 917af65 commit 2d73369

1 file changed

Lines changed: 22 additions & 15 deletions

File tree

articles/sentinel/scoping.md

Lines changed: 22 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,15 @@ Scoping is configured in the Microsoft Defender portal.
2020

2121
## What is Microsoft Sentinel scoping?
2222

23-
Microsoft Sentinel scoping extends permissions management in the Defender portal to enable:
23+
Microsoft Sentinel scoping extends permissions management in the Defender portal so the administrator can grant permissions to specific subsets of data in Sentinel tables. To create scopes, do the following:
2424

25-
- **Define logical scopes**: Create scope definitions that align with your organizational structure (by business unit, region, or data sensitivity)
26-
- **Tag data rows at ingestion time**: Apply scope tags to rows in tables using Table Management, allowing you to create rules that tag newly ingested data automatically
27-
- **Assign users or groups to scopes**: Assign specific users or groups to one or more scopes using Unified RBAC
28-
- **Restrict access by scope**: Limit user access to alerts, incidents, hunting queries, and data lake exploration based on their assigned scope
25+
- [Define logical scopes](#step-1-create-a-sentinel-scope): Create scope definitions that align with your organizational structure (by business unit, region, or data sensitivity)
26+
- [Assign users or groups to scopes](#step-2-assign-scopes-tags-to-users-or-groups): Assign specific users or groups to one or more scopes using Unified RBAC
27+
- [Tag data rows at ingestion time](#step-3-tag-tables-with-scope): Apply scope tags to rows in tables using Table Management, allowing you to create rules that tag newly ingested data automatically
28+
- [Restrict access by scope](#step-4-access-scoped-data): Limit user access to alerts, incidents, hunting queries, and data lake exploration based on their assigned scope
29+
30+
> [!NOTE]
31+
> Scopes are additive. Users assigned multiple roles get the broadest permissions available to them from all their assignments. For example, if you hold both an Entra global reader role and a Defender XDR URBAC role that provides scoped permissions on *System tables*, you're unrestricted by scopes on System tables due to the Entra role. Another example is if you hold the same role permissions in Microsoft Defender XDR for a workspace, with two different scopes, you have that permission for both scopes.
2932
3033
Scopes apply to Sentinel tables that support ingestion-time transformations.
3134

@@ -61,19 +64,19 @@ You can create multiple scopes and define your own values for each scope to refl
6164
> [!NOTE]
6265
> You can create up to 100 unique Sentinel scopes per tenant.
6366
64-
:::image type="content" source="./media/scoping/add-scope.png" alt-text="Screenshot of the Add Sentinel scope tab and dialog." lightbox="./media/scoping/add-scope.png":::
67+
:::image type="content" source="./media/scoping/add-scope.png" alt-text="Screenshot of the Add Sentinel scope tab and dialog.":::
6568

6669
## Step 2: Assign scopes tags to users or groups
6770

6871
1. In **Permissions**, open the **Roles** tab.
6972
1. Select **Create custom role**.
7073
1. Configure the role name and description and select **Next**.
7174

72-
:::image type="content" source="./media/scoping/set-up-basics.png" alt-text="Screenshot of dialog for creating name and description of a custom role." lightbox="./media/scoping/set-up-basics.png":::
75+
:::image type="content" source="./media/scoping/set-up-basics.png" alt-text="Screenshot of dialog for creating name and description of a custom role.":::
7376

7477
1. Assign the required permissions to the role and select **Apply**.
7578

76-
:::image type="content" source="./media/scoping/assign-permissions.png" alt-text="Screenshot of dialog for assigning permissions to a custom role." lightbox="./media/scoping/assign-permissions.png":::
79+
:::image type="content" source="./media/scoping/assign-permissions.png" alt-text="Screenshot of dialog for assigning permissions to a custom role.":::
7780

7881
1. In **Assignments**, give it a name and select:
7982
- Users or user groups (Azure AD groups)
@@ -84,7 +87,7 @@ You can create multiple scopes and define your own values for each scope to refl
8487

8588
Users can be assigned to multiple scopes simultaneously over multiple workspaces, with access rights aggregated across all assigned scopes. Restricted users can only access SIEM data associated with their assigned scopes.
8689

87-
:::image type="content" source="./media/scoping/edit-scope.png" alt-text="Screenshot of assigning Sentinel scopes to a custom role." lightbox="./media/scoping/edit-scope.png":::
90+
:::image type="content" source="./media/scoping/edit-scope.png" alt-text="Screenshot of assigning Sentinel scopes to a custom role.":::
8891

8992
## Step 3: Tag tables with scope
9093

@@ -94,7 +97,7 @@ You enforce scopes by tagging data during ingestion. This tagging creates a Data
9497
1. Select a table that supports ingestion-time transformations.
9598
1. Select **Scope tag rule**.
9699

97-
:::image type="content" source="./media/scoping/scope-tag-rule.png" alt-text="Screenshot of the Scope tag rule tab." lightbox="./media/scoping/scope-tag-rule.png":::
100+
:::image type="content" source="./media/scoping/scope-tag-rule.png" alt-text="Screenshot of the Scope tag rule tab.":::
98101

99102
1. Enable the **Allow use of scope tags for RBAC** toggle.
100103
1. Enable the **Scope tag rule** toggle.
@@ -109,12 +112,12 @@ You enforce scopes by tagging data during ingestion. This tagging creates a Data
109112
1. Select the scope to apply to rows matching the expression.
110113
1. Save the rule.
111114
112-
Only newly ingested data is tagged. Previously ingested data isn't included. After tagging, it can take 5-10 minutes for the new rule to take effect.
115+
Only newly ingested data is tagged. Previously ingested data isn't included. After tagging, it can take up to an hour for the new rule to take effect.
113116
114117
> [!TIP]
115118
> You can create multiple scope tag rules on the same table to tag different rows with different scopes. Records can belong to multiple scopes simultaneously.
116119
117-
:::image type="content" source="./media/scoping/table-scope-tag-rule.png" alt-text="Screenshot of the table scope tag rule." lightbox="./media/scoping/table-scope-tag-rule.png":::
120+
:::image type="content" source="./media/scoping/table-scope-tag-rule.png" alt-text="Screenshot of the table scope tag rule.":::
118121
119122
## Step 4: Access scoped data
120123
@@ -134,23 +137,27 @@ Alerts inherit scope from the underlying data. Incidents are visible if at least
134137
135138
The `SentinelScope_CF` custom field is available for use in queries and detection rules to reference scope in your analytics.
136139
137-
:::image type="content" source="./media/scoping/scoped-alerts-view.png" alt-text="Screenshot of alerts filtered by Sentinel scope." lightbox="./media/scoping/scoped-alerts-view.png":::
140+
> [!NOTE]
141+
When you create custom detections and analytics rules, you must project the `SentinelScope_CF` column in their KQL to make the triggered alerts visible to scoped analysts. If you don't project this column, alerts are unscoped and hidden from scoped users.
142+
143+
:::image type="content" source="./media/scoping/scoped-alerts-view.png" alt-text="Screenshot of alerts filtered by Sentinel scope.":::
138144
139145
## Limitations
140146
141147
The following limitations apply:
142148
143149
- **Historical data**: Only newly ingested data is scoped. Previously ingested data isn't included and can't be retroactively scoped.
144-
- **Table support**: Only tables that support ingestion-time transformations can be tagged. Custom tables (CLv1) aren't supported.
150+
- **Table support**: Only tables that support ingestion-time transformations can be tagged. Custom tables (CLv1) aren't supported. CLv2 Tables are supported.
145151
- **Transformation placement**: Transformations can only be added in the same subscription as the user's subscription.
146152
- **Maximum scopes**: You can create a maximum of 100 unique Sentinel scopes per tenant.
147153
- **Defender portal only**: Sentinel in the Azure portal (Ibiza) doesn't support scoping. Use the Defender portal instead.
148154
- **XDR tables not supported**: XDR tables aren't directly supported. If you extend retention of XDR tables into Log Analytics, you can tag, but only data with 30+ days retention, and not data between 0-30 days.
149155
- **No automatic scope inheritance**: The Log Analytics tables `SecurityAlerts` and `SecurityIncidents` don't automatically inherit the scope from the raw data/tables from which they were generated. Therefore, scoped users can't access them by default. As a workaround you can do one of the following actions:
150156
- Use the XDR `AlertsInfo` and `AlertsEvidence` tables where scope is automatically inherited, or
151157
- Apply scope to these Log Analytics tables manually (this method is limited to the attributes in the table and might not be equivalent to inheritance of the data tables that generated these alerts).
158+
- **Supported experiences**: Sentinel scopes can only be assigned to Defender XDR RBAC roles. Azure RBAC permissions on workspaces or Entra global role permissions aren't supported. Experiences that can't use row level RBAC, such as Jupyter Notebooks, don't allow users who are restricted to a scope to view data for those respective workspaces.
152159
153-
## Known issues
160+
## Known Issues
154161
155162
**Scope application issue**: Sometimes, scope doesn't correctly apply to a table. In that case, create a blank transformation rule on the table first (in Azure), and then continue to tag the table with scope.
156163

0 commit comments

Comments
 (0)