Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Security advisories pane in Azure Service Health is a specialized dashboard designed to notify you about urgent security-related events that might affect your subscriptions.
The Security advisories pane is used to communicate critical security events such as:
- Platform vulnerabilities
- Security incidents
- Privacy breaches
These advisories are distinct from general health or service issues, because they often involve sensitive information and require elevated access roles to view all the details.
Each advisory typically includes four key sections:
- Summary - An overview of the security event, including its nature and severity.
- Impacted Services - Lists of the Azure services affected by the incident.
- Issue Updates - A timeline of ongoing updates and the remediation steps.
- Impacted Resources - Specific resources in your environment that are affected.
Select the Advisory name link to open the tabs with the information you need.
Note
Security advisories are displayed in the pane for up to 28 days if they are still active and if the impact time is in the future. After that they are moved to the health history panel where they are displayed for 90 days.
For more information about Security advisories using ARG queries, see Azure Resource Graph sample queries for Service health. This resource provides guidance on how to utilize the available queries.
Who can view Security advisories?
Access to Security Advisories depends on what information is included in the advisory and the assigned Role‑Based Access Control (RBAC) permissions.
Security Advisory data falls into two categories: non‑sensitive fields and sensitive fields. Access is enforced consistently across tabs and scopes.
Non‑sensitive (informational) fields
What's included
- Advisory title
- High‑level issue summary
- General guidance that is publicly available
- Status updates and description that don’t expose customer‑specific security posture
Who can access
- Users with standard Azure Service Health RBAC permissions.
- Users with the Reader or Monitoring Reader roles.
Where are they accessible
- Summary tab
- Issue Updates tab
- Subscription-level view
These fields are available for Informational Security Advisories and for the non‑sensitive portions of advisories that contain sensitive data.
Sensitive fields
Security Advisories are classified as sensitive when they include information that could:
- Reveal customer security posture
- Enable targeted exploitation
- Disclose mitigation, remediation, or recovery status
- Identify impacted resources or configurations
Sensitive fields include
- Impacted resources
- Resource-level or configuration-specific details
- Tenant-level exposure information
- Mitigation or remediation progress tied to customer assets
Access to sensitive fields
To view sensitive Security Advisory fields, users must have:
- Owner or Contributor role
- A custom role that includes the required Security Advisory permissions
Users assigned only Reader or Monitoring Reader roles:
- Can't view sensitive fields
- See an access-required message in place of any restricted data
Access fields by type and scope
Summary and Issue Updates tabs
- Non-sensitive fields are accessible with Standard Service Health RBAC permissions.
- Sensitive fields require elevated permissions
Impacted Resources tab
- Always treated as sensitive
- Requires elevated permissions for all advisories regardless of classification
- Enforced at Resource, Subscription, and Tenant Scope
Tenant-level access
- Users assigned Tenant Administrator roles can view tenant‑level sensitive Security Advisory details in the Summary and Issue Updates tabs when advisories contain sensitive information.
| Field Type | Examples | Required Roles |
|---|---|---|
| Non-sensitive | Summary text, general guidance | Reader, Monitoring Reader |
| Sensitive | Impacted resources, configs | Owner, Contributor, or custom role |
| Impacted Resources | Resource‑level details | Elevated roles only |
| Tenant‑level sensitive data | Tenant exposure views | Tenant administrator roles |
More information For more information about role requirements to view impacted resources and sensitive details, see Viewing impacted resource and sensitive details from Azure security incidents.
For guidance on configuring subscription‑ or tenant‑level access to Security Advisories, see Configure subscriptions for Security Advisories.
For information on how to access Security advisories through API endpoint, see Access Security advisories through API endpoint.