Roles and permissions in the Microsoft Sentinel platform

Important

Attention: All Microsoft Sentinel features will be officially retired in Azure in China regions on August 18, 2026 per the announcement posted by 21Vianet.

This article explains how Microsoft Sentinel assigns permissions to user roles for Microsoft Sentinel SIEM, identifying the allowed actions for each role.

Microsoft Sentinel uses Azure role-based access control (Azure RBAC) to provide built-in and custom roles for Microsoft Sentinel SIEM. Roles can be assigned to users, groups, and services in Azure.

Important

Azure recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

Built-in Azure roles for Microsoft Sentinel

The following built-in Azure roles are used for Microsoft Sentinel SIEM and grant read access to the workspace data. Assign these roles at the resource group level for best results.

Role SIEM support
Microsoft Sentinel Reader View data, incidents, workbooks, and other resources
Microsoft Sentinel Responder All Reader permissions, plus manage incidents
Microsoft Sentinel Contributor All Responder permissions, plus install/update solutions, create/edit resources
Microsoft Sentinel Playbook Operator List, view, and manually run playbooks
Microsoft Sentinel Automation Contributor Allows Microsoft Sentinel to add playbooks to automation rules. Not used for user accounts.

For example, the following table shows examples of tasks that each role can perform in Microsoft Sentinel:

Role Run playbooks Create/edit playbooks Create/edit analytics rules, workbooks, etc. Manage incidents View data, incidents, workbooks Manage content hub
Microsoft Sentinel Reader -- -- --* -- --
Microsoft Sentinel Responder -- -- --* --
Microsoft Sentinel Contributor -- --
Microsoft Sentinel Playbook Operator -- -- -- -- --
Logic App Contributor -- -- -- --

*With Workbook Contributor role.

We recommend that you assign roles to the resource group that contains the Microsoft Sentinel workspace. This ensures that all related resources, such as Logic Apps and playbooks, are covered by the same role assignments.

As another option, assign the roles directly to the Microsoft Sentinel workspace itself. If you do that, you must assign the same roles to the SecurityInsights solution resource in that workspace. You might also need to assign them to other resources, and continually manage role assignments to the resources.

Additional roles for specific tasks

Users with particular job requirements might need to be assigned other roles or specific permissions in order to accomplish their tasks. For example:

Task Required roles/permissions
Connect data sources Write permission on the workspace. Check connector docs for extra permissions required per connector.
Manage content from Content hub Microsoft Sentinel Contributor at the resource group level
Automate responses with playbooks Microsoft Sentinel Playbook Operator, to run playbooks, and Logic App Contributor to create/edit playbooks.

Microsoft Sentinel uses playbooks for automated threat response. Playbooks are built on Azure Logic Apps, and are a separate Azure resource. For specific members of your security operations team, you might want to assign the ability to use Logic Apps for Security Orchestration, Automation, and Response (SOAR) operations.
Allow Microsoft Sentinel to run playbooks via automation Service account needs explicit permissions to playbook resource group; your account needs Owner permissions to assign these.

Microsoft Sentinel uses a special service account to run incident-trigger playbooks manually or to call them from automation rules. The use of this account (as opposed to your user account) increases the security level of the service.

For an automation rule to run a playbook, this account must be granted explicit permissions to the resource group where the playbook resides. At that point, any automation rule can run any playbook in that resource group.
Guest users assign incidents Directory Reader AND Microsoft Sentinel Responder

The Directory Reader role isn't an Azure role but a Microsoft Entra ID role, and regular (nonguest) users have this role assigned by default.
Create/delete workbooks Microsoft Sentinel Contributor or a lesser Microsoft Sentinel role AND Workbook Contributor

Other Azure and Log Analytics roles

When you assign Microsoft Sentinel-specific Azure roles, you might come across other Azure and Log Analytics roles that might be assigned to users for other purposes. These roles grant a wider set of permissions that include access to your Microsoft Sentinel workspace and other resources:

Important

Role assignments are cumulative. A user with both Microsoft Sentinel Reader and Contributor roles may have more permissions than intended.

User type Role Resource group Description
Security analysts Microsoft Sentinel Responder Microsoft Sentinel resource group View/manage incidents, data, workbooks
Microsoft Sentinel Playbook Operator Microsoft Sentinel/playbook resource group Attach/run playbooks
Security engineers Microsoft Sentinel Contributor Microsoft Sentinel resource group Manage incidents, content, resources
Logic App Contributor Microsoft Sentinel/playbook resource group Run/modify playbooks
Service Principal Microsoft Sentinel Contributor Microsoft Sentinel resource group Automated management tasks

Custom roles and advanced RBAC

To restrict access to specific data, but not the whole workspace, use resource-context RBAC or Table-level RBAC. This is useful for teams needing access to only certain data types or tables.

Otherwise, use the following option for advanced RBAC:

For more information, see Manage log data and workspaces in Azure Monitor