Edit

Share via


Roles and permissions in the Microsoft Sentinel platform

This article explains how Microsoft Sentinel assigns permissions to user roles for both Microsoft Sentinel SIEM and Microsoft Sentinel data lake, identifying the allowed actions for each role.

Microsoft Sentinel uses Azure role-based access control (Azure RBAC) to provide built-in and custom roles for Microsoft Sentinel SIEM, and Microsoft Entra ID role-based access control (Microsoft Entra ID RBAC) to provide built-in and custom roles for Microsoft Sentinel data lake. Roles can be assigned to users, groups, and services in either Azure or Microsoft Entra ID, respectively.

Important

Microsoft Sentinel is generally available in the Microsoft Defender portal, including for customers without Microsoft Defender XDR or an E5 license.

Starting in July 2026, all customers using Microsoft Sentinel in the Azure portal will be redirected to the Defender portal and will use Microsoft Sentinel in the Defender portal only. Starting in July 2025, many new customers are automatically onboarded and redirected to the Defender portal.

If you're still using Microsoft Sentinel in the Azure portal, we recommend that you start planning your transition to the Defender portal to ensure a smooth transition and take full advantage of the unified security operations experience offered by Microsoft Defender. For more information, see It’s Time to Move: Retiring Microsoft Sentinel’s Azure portal for greater security.

Important

Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

Built-in Azure roles for Microsoft Sentinel

The following built-in Azure roles are used for Microsoft Sentinel SIEM and grant read access to the workspace data, including support for the Microsoft Sentinel data lake. Assign these roles at the resource group level for best results.

Role SIEM support Data lake support
Microsoft Sentinel Reader View data, incidents, workbooks, and other resources Access advanced analytics and run interactive queries on workspaces only.
Microsoft Sentinel Responder All Reader permissions, plus manage incidents N/A
Microsoft Sentinel Contributor All Responder permissions, plus install/update solutions, create/edit resources Access advanced analytics and run interactive queries on workspaces only.
Microsoft Sentinel Playbook Operator List, view, and manually run playbooks N/A
Microsoft Sentinel Automation Contributor Allows Microsoft Sentinel to add playbooks to automation rules. Not used for user accounts. N/A

For example, the following table shows examples of tasks that each role can perform in Microsoft Sentinel:

Role Run playbooks Create/edit playbooks Create/edit analytics rules, workbooks, etc. Manage incidents View data, incidents, workbooks Manage content hub
Microsoft Sentinel Reader -- -- --* -- --
Microsoft Sentinel Responder -- -- --* --
Microsoft Sentinel Contributor -- --
Microsoft Sentinel Playbook Operator -- -- -- -- --
Logic App Contributor -- -- -- --

*With Workbook Contributor role.

We recommend that you assign roles to the resource group that contains the Microsoft Sentinel workspace. This ensures that all related resources, such as Logic Apps and playbooks, are covered by the same role assignments.

As another option, assign the roles directly to the Microsoft Sentinel workspace itself. If you do that, you must assign the same roles to the SecurityInsights solution resource in that workspace. You might also need to assign them to other resources, and continually manage role assignments to the resources.

Additional roles for specific tasks

Users with particular job requirements might need to be assigned other roles or specific permissions in order to accomplish their tasks. For example:

Task Required roles/permissions
Connect data sources Write permission on the workspace. Check connector docs for extra permissions required per connector.
Manage content from Content hub Microsoft Sentinel Contributor at the resource group level
Automate responses with playbooks Microsoft Sentinel Playbook Operator, to run playbooks, and Logic App Contributor to create/edit playbooks.

Microsoft Sentinel uses playbooks for automated threat response. Playbooks are built on Azure Logic Apps, and are a separate Azure resource. For specific members of your security operations team, you might want to assign the ability to use Logic Apps for Security Orchestration, Automation, and Response (SOAR) operations.
Allow Microsoft Sentinel to run playbooks via automation Service account needs explicit permissions to playbook resource group; your account needs Owner permissions to assign these.

Microsoft Sentinel uses a special service account to run incident-trigger playbooks manually or to call them from automation rules. The use of this account (as opposed to your user account) increases the security level of the service.

For an automation rule to run a playbook, this account must be granted explicit permissions to the resource group where the playbook resides. At that point, any automation rule can run any playbook in that resource group.
Guest users assign incidents Directory Reader AND Microsoft Sentinel Responder

The Directory Reader role isn't an Azure role but a Microsoft Entra ID role, and regular (nonguest) users have this role assigned by default.
Create/delete workbooks Microsoft Sentinel Contributor or a lesser Microsoft Sentinel role AND Workbook Contributor

Other Azure and Log Analytics roles

When you assign Microsoft Sentinel-specific Azure roles, you might come across other Azure and Log Analytics roles that might be assigned to users for other purposes. These roles grant a wider set of permissions that include access to your Microsoft Sentinel workspace and other resources:

Important

Role assignments are cumulative. A user with both Microsoft Sentinel Reader and Contributor roles may have more permissions than intended.

User type Role Resource group Description
Security analysts Microsoft Sentinel Responder Microsoft Sentinel resource group View/manage incidents, data, workbooks
Microsoft Sentinel Playbook Operator Microsoft Sentinel/playbook resource group Attach/run playbooks
Security engineers Microsoft Sentinel Contributor Microsoft Sentinel resource group Manage incidents, content, resources
Logic App Contributor Microsoft Sentinel/playbook resource group Run/modify playbooks
Service Principal Microsoft Sentinel Contributor Microsoft Sentinel resource group Automated management tasks

Roles and permissions for the Microsoft Sentinel data lake (preview)

To use the Microsoft Sentinel data lake, your workspace must be onboarded to the Defender portal and the Microsoft Sentinel data lake.

Microsoft Sentinel data lake read permissions

Microsoft Entra ID roles provide broad access across all workspaces in the data lake. Use the following roles to provide read access to all workspaces within the Microsoft Sentinel data lake, such as for running queries.

Permission type Supported roles
Read access across all workspaces Use any of the following Microsoft Entra ID roles:

- Global reader
- Security reader
- Security operator
- Security administrator
- Global administrator

Alternatively, you might want to assign the ability to read tables from within a specific workspace. In such cases, use one of the following:

Tasks Permissions
Read permissions on the default workspace Use a custom Microsoft Defender XDR unified RBAC role with data (read) permissions over the Microsoft Sentinel data collection.
Read permissions on any other workspace enabled for Microsoft Sentinel in the data lake Use one of the following built-in roles in Azure RBAC for permissions on that workspace:
- Log Analytics Reader
- Log Analytics Contributor
- Microsoft Sentinel Contributor
- Microsoft Sentinel Reader
- Reader
- Contributor
- Owner

Microsoft Sentinel data lake write permissions

Microsoft Entra ID roles provides broad access across all workspaces in the data lake. Use the following roles to provide write access to the Microsoft Sentinel data lake tables:

Permission type Supported roles
Write to tables in the analytics tier using KQL jobs or notebooks Use one of the following Microsoft Entra ID roles:

- Security operator
- Security administrator
- Global administrator
Write to tables in the Microsoft Sentinel data lake Use one of the following Microsoft Entra ID roles:
- Security operator
- Security administrator
- Global administrator

Alternatively, you might want to assign the ability to write output to a specific workspace. This can include the ability to configure connectors to that workspace, modifying retention settings for tables in the workspace, or creating, updating, and deleting custom tables in that workspace. In such cases, use one of the following:

Tasks Permissions
For edit permissions on the default workspace Use a custom Microsoft Defender XDR unified RBAC role with data (manage) permissions over the Microsoft Sentinel data collection.
For any other Microsoft Sentinel workspace in the data lake Use any built-in or custom role that includes the following Azure RBAC Microsoft operational insights permissions on that workspace:
- microsoft.operationalinsights/workspaces/write
- microsoft.operationalinsights/workspaces/tables/write
- microsoft.operationalinsights/workspaces/tables/delete

For example, built-in roles that include these permissions Log Analytics Contributor, Owner, and Contributor.

Manage jobs in the Microsoft Sentinel data lake

To create scheduled jobs or to manage jobs in the Microsoft Sentinel data lake, you must have one of the following Microsoft Entra ID roles:

Custom roles and advanced RBAC

To restrict access to specific data, but not the whole workspace, use resource-context RBAC or Table-level RBAC. This is useful for teams needing access to only certain data types or tables.

Otherwise, use one of the following options for advanced RBAC:

For more information, see Manage log data and workspaces in Azure Monitor