אירוע
17 במרץ, 21 - 21 במרץ, 10
הצטרף לסידרה של פגישות כדי לבנות פתרונות מדרגיים של בינה מלאכותית בהתבסס על מקרי שימוש מהעולם האמיתי עם מפתחים ומומחים אחרים.
הירשם עכשיוהדפדפן הזה אינו נתמך עוד.
שדרג ל- Microsoft Edge כדי לנצל את התכונות, עדכוני האבטחה והתמיכה הטכנית העדכניים ביותר.
Table-level access settings let you grant specific users or groups read-only permission to data in a table. Users with table-level read access can read data from the specified table in both the workspace and the resource context.
This article describes two ways to manage table-level read access.
הערה
We recommend using the first method described here, which is currently in preview. During preview, the recommended method described here does not apply to Microsoft Sentinel Detection Rules, which might have access to more tables than intended. Alternatively, you can use the legacy method of setting table-level read access, which has some limitations related to custom log tables. Before using either method, see Table-level access considerations and limitations.
Granting table-level read access involves assigning a user two roles:
To grant a user or group limited permissions to the Log Analytics workspace:
Create a custom role at the workspace level to let users read workspace details and run a query in the workspace, without providing read access to data in any tables:
Navigate to your workspace and select Access control (IAM) > Roles.
Right-click the Reader role and select Clone.
This opens the Create a custom role screen.
On the Basics tab of the screen:
Select the JSON tab > Edit:
In the "actions"
section, add these actions:
"Microsoft.OperationalInsights/workspaces/read",
"Microsoft.OperationalInsights/workspaces/query/read"
In the "not actions"
section, add:
"Microsoft.OperationalInsights/workspaces/sharedKeys/read"
Select Save > Review + Create at the bottom of the screen, and then Create on the next page.
Assign your custom role to the relevant user:
Select Access control (AIM) > Add > Add role assignment.
Select the custom role you created and select Next.
This opens the Members tab of the Add custom role assignment screen.
Click + Select members to open the Select members screen.
Search for and select a user and click Select.
Select Review and assign.
The user can now read workspace details and run a query, but can't read data from any tables.
To grant the user read access to a specific table:
From the Log Analytics workspaces menu, select Tables.
Select the ellipsis ( ... ) to the right of your table and select Access control (IAM).
On the Access control (IAM) screen, select Add > Add role assignment.
Select the Reader role and select Next.
Click + Select members to open the Select members screen.
Search for and select the user and click Select.
Select Review and assign.
The user can now read data from this specific table. Grant the user read access to other tables in the workspace, as needed.
The legacy method of table-level also uses Azure custom roles to let you grant specific users or groups access to specific tables in the workspace. Azure custom roles apply to workspaces with either workspace-context or resource-context access control modes regardless of the user's access mode.
To define access to a particular table, create a custom role:
Microsoft.OperationalInsights/workspaces/query/*
to grant access to all tables.Here are examples of custom role actions to grant and deny access to specific tables.
Grant access to the Heartbeat and AzureActivity tables:
"Actions": [
"Microsoft.OperationalInsights/workspaces/read",
"Microsoft.OperationalInsights/workspaces/query/read",
"Microsoft.OperationalInsights/workspaces/query/Heartbeat/read",
"Microsoft.OperationalInsights/workspaces/query/AzureActivity/read"
],
Grant access to only the SecurityBaseline table:
"Actions": [
"Microsoft.OperationalInsights/workspaces/read",
"Microsoft.OperationalInsights/workspaces/query/read",
"Microsoft.OperationalInsights/workspaces/query/SecurityBaseline/read"
],
Grant access to all tables except the SecurityAlert table:
"Actions": [
"Microsoft.OperationalInsights/workspaces/read",
"Microsoft.OperationalInsights/workspaces/query/read",
"Microsoft.OperationalInsights/workspaces/query/*/read"
],
"notActions": [
"Microsoft.OperationalInsights/workspaces/query/SecurityAlert/read"
],
Custom tables store data you collect from data sources such as text logs and the HTTP Data Collector API. To identify the table type, view table information in Log Analytics.
Using the legacy method of table-level access, you can't grant access to individual custom log tables at the table level, but you can grant access to all custom log tables. To create a role with access to all custom log tables, create a custom role by using the following actions:
"Actions": [
"Microsoft.OperationalInsights/workspaces/read",
"Microsoft.OperationalInsights/workspaces/query/read",
"Microsoft.OperationalInsights/workspaces/query/Tables.Custom/read"
],
אירוע
17 במרץ, 21 - 21 במרץ, 10
הצטרף לסידרה של פגישות כדי לבנות פתרונות מדרגיים של בינה מלאכותית בהתבסס על מקרי שימוש מהעולם האמיתי עם מפתחים ומומחים אחרים.
הירשם עכשיוהדרכה
אישור
Microsoft Certified: Identity and Access Administrator Associate - Certifications
להדגים את התכונות של Microsoft Entra ID כדי לבצע מודרניזציה של פתרונות זהות, ליישם פתרונות היברידיים וליישם פיקוח על זהות.