%3CLINGO-SUB%20id%3D%22lingo-sub-1265376%22%20slang%3D%22en-US%22%3ERe%3A%20Table%20Level%20RBAC%20In%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1265376%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F185177%22%20target%3D%22_blank%22%3E%40Yaniv%20Shasha%3C%2FA%3EGood%20article%20and%20explanation%20is%20crystal%20clear.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1302283%22%20slang%3D%22en-US%22%3ERe%3A%20Table%20Level%20RBAC%20In%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1302283%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F185177%22%20target%3D%22_blank%22%3E%40Yaniv%20Shasha%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20could%20you%20explain%20why%20we%20grant%20the%20sentinel%20reader%20permission%20at%20the%20sub%20level%20and%20not%20at%20the%20RG%3F%3C%2FP%3E%0A%3CP%3EThanks%20alot%2C%3C%2FP%3E%0A%3CP%3EGuy%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1303375%22%20slang%3D%22en-US%22%3ERe%3A%20Table%20Level%20RBAC%20In%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1303375%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F335314%22%20target%3D%22_blank%22%3E%40Guy_P%3C%2FA%3E%26nbsp%3Byour%20comment%20is%20relevant%20and%20current%20for%20must%20of%20the%20cases.%3C%2FP%3E%0A%3CP%3EIf%20the%20need%20is%20only%20to%20retrieve%20the%20logs%20so%20RG%20level%20RBAC%20is%20ok.%3C%2FP%3E%0A%3CP%3Ebut%20if%20your%20playbook%20or%20workbook%20ii%20on%20other%20RG's%20so%20you%20need%20wider%20permission%20than%20the%20subscription.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1327445%22%20slang%3D%22en-US%22%3ERe%3A%20Table%20Level%20RBAC%20In%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1327445%22%20slang%3D%22en-US%22%3E%3CP%3EVery%20interesting%20and%20useful%20use%20case%20!!!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-965043%22%20slang%3D%22en-US%22%3ETable%20Level%20RBAC%20In%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-965043%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fplatform%2Fmanage-access%23table-level-rbac%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3ETable%20level%20RBAC%3C%2FSTRONG%3E%26nbsp%3B%3C%2FA%3Eallows%20you%20to%20define%20more%20granular%20control%20to%20data%20in%20a%20Log%20Analytics%20workspace%20in%20addition%20to%20the%20other%20permissions%20%3CSTRONG%3Eis%20now%20available%20for%20Log%20analytics%20and%20for%20Azure%20sentinel%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEarlier%20this%20year%2C%20my%20colleague%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F214230%22%20target%3D%22_blank%22%3E%40Tiander%20Turpijn%3C%2FA%3E%3C%2FSPAN%3E%26nbsp%3Bpublished%20a%20great%20post%20on%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Sentinel%2FBest-practices-for-designing-an-Azure-Sentinel-or-Azure-Security%2Fba-p%2F832574%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBest%20practices%20for%20designing%20an%20Azure%20Sentinel%20or%20Azure%20Security%20Center%20Log%20Analytics%20workspace%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHis%20post%20shares%20in%20great%20detail%20the%20architecture%20and%20confederation%20for%20centralizing%20log%20analytics%20workspace%20vs%20multi%20workspaces%20in%20Sentinel%20and%20Azure%20security%20center.%3C%2FP%3E%0A%3CP%3EOn%20this%20blog%20post%2C%20we%20will%20review%20how%20the%20Table%20level%20RBAC%20lets%20you%20ingest%20your%20collected%20data%20into%20a%20centralize%20workspace%20and%20still%20keep%20your%20data%20segregate%20for%20a%20specific%20user%20or%20group.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-2047189074%22%20id%3D%22toc-hId-2047189074%22%20id%3D%22toc-hId-2047189074%22%3EExample%20use%20case%3C%2FH1%3E%0A%3CP%3EContoso%20installed%20several%20Windows%20servers%20and%20wants%20to%20send%20their%20performance%20logs%20into%20a%20centralized%20workspace%20that%20combines%20Security%20logs%20and%20operational%20logs.%3CBR%20%2F%3EThe%20Contoso%20OPS%20team%20that%20manage%20the%20performance%20monitor%20workload%20in%20the%20organization%20need%20access%20only%20to%20the%20performance%20log%20table%20and%20not%20to%20Other%20sensitive%20data%20like%20the%20security%20events%20logs%20that%20store%20on%20the%20same%20workspace.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--504967887%22%20id%3D%22toc-hId--504967887%22%20id%3D%22toc-hId--504967887%22%3EConfigure%20RBAC%20table%20Level%20Access%3C%2FH1%3E%0A%3CP%3ETo%20configure%20the%20RBAC%20table%20level%20access%20we%20need%20to%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EDefine%20a%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Frole-based-access-control%2Fcustom-roles%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERBAC%20custom%20role%3C%2FA%3E%20by%20creating%20custom%20JSON%20file%20that%20looks%20like%20this%3A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3E%7B%0A%20%20%20%20%22Name%22%3A%20%22Contoso%20Performance%20Monitor%20Team%22%2C%0A%20%20%20%20%22Id%22%3A%20null%2C%0A%20%20%20%20%22IsCustom%22%3A%20true%2C%0A%20%20%20%20%22Description%22%3A%20%22Enable%20users%20to%20monitor%20Linux%20servers%20performance%20logs%22%2C%0A%20%20%20%20%22Actions%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%22Microsoft.OperationalInsights%2Fworkspaces%2Fread%22%2C%0A%20%20%20%20%20%20%20%20%22Microsoft.OperationalInsights%2Fworkspaces%2Fquery%2Fread%22%2C%0A%20%20%20%20%20%20%20%20%22Microsoft.OperationalInsights%2Fworkspaces%2Fquery%2FPerf%2Fread%22%0A%20%20%20%20%5D%2C%0A%20%20%20%20%22NotActions%22%3A%20%5B%0A%20%20%20%20%5D%2C%0A%20%20%20%20%22AssignableScopes%22%3A%20%5B%0A%20%20%20%20%20%20%20%22%2Fsubscriptions%2F8f153238-e602-xxxx-xxxx-3043fbe50918%22%0A%20%20%20%20%5D%0A%20%20%7D%0A%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2.%20Add%20the%20custom%20role%20to%20our%20subscription%2C%20run%20the%20above%20PS%20command%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2Faz.resources%2Fnew-azroledefinition%3Fview%3Dazps-2.8.0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ENew-AzRoleDefinition%3C%2FA%3E%20and%20Point%20to%20the%20custom%20role%20JSON%20file%20from%20the%20preview%20step.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20face%3D%22courier%20new%2Ccourier%22%3E%3CEM%3ETo%20run%20AZ%20PowerShell%20commands%20first%20install%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fazure%2Finstall-az-ps%3Fview%3Dazps-2.8.0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAZ%20PS%20module%3C%2FA%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-php%22%3E%3CCODE%3ENew-AzRoleDefinition%20-InputFile%20%22C%3A%5CUsers%5Cyanivsh%5COneDrive%5CDemos%5CCustom_RBAC.json%22%0A%0A%0AName%20%20%20%20%20%20%20%20%20%20%20%20%20%3A%20Perf%20Monitor%20Team%0AId%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3A%20ab403341-d1f6-4cea-ae97-aea203b895a1%0AIsCustom%20%20%20%20%20%20%20%20%20%3A%20True%0ADescription%20%20%20%20%20%20%3A%20Enable%20users%20to%20monitor%20Linux%20server%20performance%20logs%0AActions%20%20%20%20%20%20%20%20%20%20%3A%20%7BMicrosoft.OperationalInsights%2Fworkspaces%2Fread%2C%20Microsoft.OperationalInsights%2Fworkspaces%2Fquery%2Fread%2C%20Microsoft.OperationalInsights%2Fworkspaces%2Fquery%2FPerf%2Fread%7D%0ANotActions%20%20%20%20%20%20%20%3A%20%7B%7D%0ADataActions%20%20%20%20%20%20%3A%20%7B%7D%0ANotDataActions%20%20%20%3A%20%7B%7D%0AAssignableScopes%20%3A%20%7B%2Fsubscriptions%2F8f153238-e602-427e-a7c0-xxxxxxx50918%7D%20%0A%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E3.%20Add%20user%20that%20part%20of%20the%20OPs%20team%20to%20the%20new%20custom%20role%20a%20at%20the%20subscription%20level%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22IAM.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F192340i6AA921D5A35CCA26%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22IAM.png%22%20alt%3D%22IAM.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E4.%26nbsp%3BWhen%20Ops%20user%20opens%20Log%20Analytics%20logs%20tab%20and%20queries%20the%26nbsp%3B%3CSTRONG%3Epref%20table%3C%2FSTRONG%3E%20he%20can%20retrieve%20the%20results%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22perf_take50.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F192341iC2D4E9C1088B7B56%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22perf_take50.png%22%20alt%3D%22perf_take50.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20the%20same%20user%20tries%20to%20query%20the%20SecurityEvent%20table%20or%20any%20other%20tables%20in%20Azure%20Sentinel%20workspace%2C%20no%20results%20found.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22SecurityEvent.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F192343iAC2D9E6B97F5D313%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22SecurityEvent.png%22%20alt%3D%22SecurityEvent.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20blog%20post%2C%20we%20reviewed%20the%20benefit%20of%20RBAC%20table%20permission%20and%20how%20to%20configure%20it%20in%20a%20real-Life%20scenario.%3C%2FP%3E%0A%3CP%3EThis%20feature%20can%20leverage%20Azure%20users%20to%20send%20their%20collected%20data%20to%20a%20centralize%20workspace%20and%20enjoy%20The%20advance%20analytic%2C%20hunting%20and%20ML%20and%20keep%20their%20data%20segregation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-965043%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fplatform%2Fmanage-access%23table-level-rbac%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3ETable%20level%20RBAC%3C%2FSTRONG%3E%26nbsp%3B%3C%2FA%3Eallows%20you%20to%20define%20more%20granular%20control%20to%20data%20in%20a%20Log%20Analytics%20workspace%20in%20addition%20to%20the%20other%20permissions%20%3CSTRONG%3Eis%20now%20available%20for%20Log%20analytics%20and%20for%20Azure%20sentinel%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22preview_pic.jpg%22%20style%3D%22width%3A%20927px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F151939i3DDAF2B4D04FB545%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22preview_pic.jpg%22%20alt%3D%22preview_pic.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1438330%22%20slang%3D%22en-US%22%3ERe%3A%20Table%20Level%20RBAC%20In%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1438330%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F185177%22%20target%3D%22_blank%22%3E%40Yaniv%20Shasha%3C%2FA%3E%2C%20thank%20you%20for%20your%20article.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI'd%20like%20to%20ask%20you%20if%20you%20faced%20any%20issues%20when%20configuring%20RBAC%20to%20tables.%3C%2FP%3E%3CP%3EI%20have%20faced%20several%20issues%20when%20I%20have%20applied%20permissions%20to%20a%20custom%20role%2C%20where%20the%20users%20inside%20of%20this%20role%20are%20only%20allowed%20query-specific%20tables.%3C%2FP%3E%3CP%3EThe%20defined%20users%20inside%20of%20this%20custom%20role%20don't%20have%20access%20to%20the%20sentinel%20subscription%2C%20only%20to%20the%20log-analytics%20workspace%2C%20until%20here%20everything%20is%20working%20as%20expected.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20they%20try%20to%20access%20the%20data%20inside%20of%20log-analytics%20workspace%2C%20they%20started%20to%20receiving%20issues%20with%20the%20permissions%20even%20with%20the%20correct%20permissions%2C%20now%20this%20is%20fixed%20but%20I'm%20having%20another%20issue%20and%20is%20related%20to%20access%20to%20the%20Azure%20Diagnostics%20data.%3C%2FP%3E%3CP%3EThe%20users%20have%20permissions%20to%20access%203%20tables%20one%20of%20these%20tables%20is%20the%26nbsp%3BAzure%20Diagnostics%20when%20they%20try%20to%20query%20it%20no%20data%20is%20displayed%20but%20for%20the%20remaining%20tables%20they%20are%20able%20to%20see%20the%20data.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAny%20thoughts%20on%20why%20this%20is%20happening%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you.%3C%2FP%3E%3CP%3ED.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Table level RBAC allows you to define more granular control to data in a Log Analytics workspace in addition to the other permissions is now available for Log analytics and for Azure sentinel.

 

Earlier this year, my colleague @Tiander Turpijn published a great post on Best practices for designing an Azure Sentinel or Azure Security Center Log Analytics workspace 

His post shares in great detail the architecture and confederation for centralizing log analytics workspace vs multi workspaces in Sentinel and Azure security center.

On this blog post, we will review how the Table level RBAC lets you ingest your collected data into a centralize workspace and still keep your data segregate for a specific user or group.

 

Example use case

Contoso installed several Windows servers and wants to send their performance logs into a centralized workspace that combines Security logs and operational logs.
The Contoso OPS team that manage the performance monitor workload in the organization need access only to the performance log table and not to Other sensitive data like the security events logs that store on the same workspace.

 

Configure RBAC table Level Access

To configure the RBAC table level access we need to:

 

  1. Define a RBAC custom role by creating custom JSON file that looks like this:

 

 

{
    "Name": "Contoso Performance Monitor Team",
    "Id": null,
    "IsCustom": true,
    "Description": "Enable users to monitor Linux servers performance logs",
    "Actions": [
        "Microsoft.OperationalInsights/workspaces/read",
        "Microsoft.OperationalInsights/workspaces/query/read",
        "Microsoft.OperationalInsights/workspaces/query/Perf/read"
    ],
    "NotActions": [
    ],
    "AssignableScopes": [
       "/subscriptions/8f153238-e602-xxxx-xxxx-3043fbe50918"
    ]
  }

 

 

 

2. Add the custom role to our subscription, run the above PS command New-AzRoleDefinition and Point to the custom role JSON file from the preview step.

 

To run AZ PowerShell commands first install the AZ PS module

 

 

New-AzRoleDefinition -InputFile "C:\Users\yanivsh\OneDrive\Demos\Custom_RBAC.json"


Name             : Perf Monitor Team
Id               : ab403341-d1f6-4cea-ae97-aea203b895a1
IsCustom         : True
Description      : Enable users to monitor Linux server performance logs
Actions          : {Microsoft.OperationalInsights/workspaces/read, Microsoft.OperationalInsights/workspaces/query/read, Microsoft.OperationalInsights/workspaces/query/Perf/read}
NotActions       : {}
DataActions      : {}
NotDataActions   : {}
AssignableScopes : {/subscriptions/8f153238-e602-427e-a7c0-xxxxxxx50918} 

 

 

 

3. Add user that part of the OPs team to the new custom role a at the subscription level:

 

IAM.png

4. When Ops user opens Log Analytics logs tab and queries the pref table he can retrieve the results:

 

perf_take50.png

 

When the same user tries to query the SecurityEvent table or any other tables in Azure Sentinel workspace, no results found.

 

SecurityEvent.png

 

In this blog post, we reviewed the benefit of RBAC table permission and how to configure it in a real-Life scenario.

This feature can leverage Azure users to send their collected data to a centralize workspace and enjoy The advance analytic, hunting and ML and keep their data segregation.

 

5 Comments
Occasional Contributor

@Yaniv ShashaGood article and explanation is crystal clear. 

Microsoft

Hi @Yaniv Shasha 

Please could you explain why we grant the sentinel reader permission at the sub level and not at the RG?

Thanks alot,

Guy

Microsoft

@Guy_P your comment is relevant and current for must of the cases.

If the need is only to retrieve the logs so RG level RBAC is ok.

but if your playbook or workbook ii on other RG's so you need wider permission than the subscription.

Occasional Contributor

Very interesting and useful use case !!! 

Senior Member

Hi @Yaniv Shasha, thank you for your article.

 

I'd like to ask you if you faced any issues when configuring RBAC to tables.

I have faced several issues when I have applied permissions to a custom role, where the users inside of this role are only allowed query-specific tables.

The defined users inside of this custom role don't have access to the sentinel subscription, only to the log-analytics workspace, until here everything is working as expected.

 

When they try to access the data inside of log-analytics workspace, they started to receiving issues with the permissions even with the correct permissions, now this is fixed but I'm having another issue and is related to access to the Azure Diagnostics data.

The users have permissions to access 3 tables one of these tables is the Azure Diagnostics when they try to query it no data is displayed but for the remaining tables they are able to see the data.

 

Any thoughts on why this is happening?

 

Thank you.

D.