Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Benchmark Compliance Rules in AWS and Azure
      • Implementing Benchmark Compliance Rules in Azure
      • Implementing PCI DSS 3 2 1 Regional in AWS
      • Implementing CIS 3 0 0 in AWS
      • Implementing HIPAA HITRUST Rules
      • Implementing PCI DSS 3 2 1 Global Rules in AWS
      • Implementing NIST 800 53 rev 5 Global Rules in AWS
      • Implementing SecPod Global Rules in AWS
      • Implementing CIS 3 0 0 Regional in AWS
      • Implementing CIS 4 0 0 Regional
      • Implementing SOC 2 in AWS
      • Implementing CIS 4 0 0 in AWS
      • Implementing NIST 800 53 rev 5 Rules in AWS
      • Implementing SecPod Regional Rules in AWS
      • Implementing SecPod Default Rules in AWS
      • Implementing NIST 800 53 rev 5 Regional in AWS
      • Implementing PCI DSS 3 2 1 in AWS
      • Implementing CIS 4 0 0 Global in AWS
      • Implementing CIS 3 0 0 Global Rules in AWS
      • Implementing SOC 2 Global Rules in AWS
      • Implementing SOC 2 Regional Rules in AWS

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to investigate DNS cache on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to collect all software licenses in Windows systems?
      • How to collect environment variables set in all operating systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect all software licenses in Mac systems?
      • How to collect DNS information on Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to delete and quarantine a file?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Windows systems?
      • How to perform system tuning?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to check wireless security in Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to collect all the important missing patches in Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check password policy set in Windows systems?
      • How to collect all security events from Windows Events Log?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Saner Cloud
  • Get Started
  • Roles and Permissions
  • Roles and Permissions for Azure Onboarding, Detection, and Remediation

Roles and Permissions for Azure Onboarding, Detection, and Remediation

Print Friendly, PDF & Email

Onboarding in Azure

Saner CNAPP Login

Soon after logging in, the following roles can perform onboarding activities:

  • Admin
  • Org Admin

[Mandatory] Roles for Detection and Monitoring

RoleDescription
Security ReaderProvides insights into Resource Detection and Monitoring. Grants read-only access to security-related information.
 
This role is restricted from making changes; however, can review resource configurations and detect issues.
Click to read more…
ReaderThis role is restricted from making changes; however, can review resource configurations and detect issues.
Click to read more…

RBAC Permissions for Remediation in Azure

The following list of configured RBAC (Role-Based Access Control) permissions includes all the permissions necessary for remediation.

ActionPermissionDescription
policyAssignments/write
cyAssignments
WriteCreate a policy assignment at the specified scope
 
Click here to read more…
Compute/disks/WriteWrite permissions to critical security and infrastructure components such as: Compute- VMs, Disks
Compute/virtualMachines/writeWriteCreates a new virtual machine or updates an existing virtual machine
Flexible ServersWriteWith this configuration setting, you can customize the database parameters according to your needs
 
Click here to read more…
ServersWriteDefine and customize server settings within your infrastructure
 
Click here to read more…
Activity Log AlertsWriteMonitor management operations and security-related changes across your Azure environment
 
Click here to read more…
Diagnostic SettingsWriteConfigure diagnostic settings for Azure resources and manage monitoring and analysis
 
Click here to read more…
Log profilesWriteConfigure activity log profiles in Azure
 
Click here to read more…
VaultsWriteCreate and manage Azure Key Vaults, which store and control access to secrets, encryption keys, and certificates securely
 
Click here to read more…
Network Security GroupsWriteWith this configuration control inbound and outbound traffic to and from Azure resources
 
Click here to read more…
NetworkWatchers/flowLogsWriteConfigure “NSG Flow Logs”, which capture network traffic passing through a Network Security Group (NSG). These logs help with monitoring, troubleshooting, and security analysis by providing visibility into allowed and denied network traffic
 
Click here to read more…
PricingsWriteWith this configuration in Azure, modify security features for different Azure resources, such as virtual machines, storage accounts, Kubernetes, databases, and more
 
Click here to read more…
Security ContactsWriteConfigure security contact details to receive security alerts, notifications, and threat intelligence reports related to security incidents in your Azure environment
 
Click here to read more…
Servers/administratorsWriteUsing this configuration, manage authentication and access control for your SQL databases using Azure Active Directory (AAD)
 
Click here to read more…
Advanced Threat Protection SettingsWriteConfigure Advanced Threat Protection (ATP) for an Azure SQL Server to detect and respond to potential security threats in your SQL databases
 
Click here to read more…
Auditing SettingsWriteConfigure auditing for an Azure SQL Server to track database activities, detect security threats, and ensure compliance by logging events to Azure Storage, Log Analytics, or Event Hubs
 
Click here to read more…
Security Alert PoliciesWriteConfigure security alert policies for an Azure SQL database to detect and respond to potential security threats by sending alerts for suspicious database activities
 
Click here to read more…
Databases/transparent Data EncryptionWriteEnable or disable Transparent Data Encryption (TDE) for an Azure SQL Database to protect data at rest by automatically encrypting the database, associated backups, and transaction log files
 
Click here to read more…
Encryption ProtectorWriteBy Configuring and updating the encryption protector setting for an Azure SQL Server, you determine if the server uses Microsoft-managed keys or customer-managed keys (CMK) for Transparent Data Encryption (TDE)
 
Click here to read more…
Firewall RulesWriteCreate or update firewall rules for an Azure SQL Server to define which IP addresses or ranges are allowed to connect to databases hosted on the server
 
Click here to read more…
SecurityAlertPoliciesWriteThis configuration helps monitor, detect, and respond to suspicious database activity
 
Click here to read more…
Vulnerability AssessmentsWriteConfigure and update vulnerability assessments for an Azure SQL Server to detect security vulnerabilities, misconfigurations, and compliance issues in your SQL databases
 
Click here to read more…
Vulnerability AssessmentsDeleteRemoves a SQL Server vulnerability assessment, effectively disabling or deleting the vulnerability assessment settings for a specific server
StorageAccounts/blobServicesWriteWith this configuration create or update settings for Blob services in an Azure Storage Account
 
Click here to read more…
StorageAccounts/regenerateKeyActionRegenerate (reset) the access keys for an Azure Storage Account to authenticate and authorize access to the storage services (Blobs, Queues, Tables, and Files).
 
Click here to read more…
StorageAccountsWriteConfiguration related to Azure Storage Accounts and grants the ability to create or update a storage account in Azure
 
Click here to read more…
ConfigWritePermission setting that grants the ability to create or update a storage account in Azure
 
Click here to read more…
SitesWritePermission setting that allows users to create, modify, and update Azure App Services, including Web Apps, API Apps, and Function Apps
 
Click here to read more…
Network WatchersWritePermission setting that allows users to create, modify, and update Azure Network Watchers
 
Click here to read more…
Role AssignmentsDeletePermission to remove role assignments in Azure Role-Based Access Control (RBAC), where a user with this permission can revoke access from other users, groups, or service principals
 
Click here to read more…

Summary of Permissions and Actions for Custom Role

PermissionAction
WriteWrite permissions to critical security and infrastructure components such as:
— Compute: VMs, Disks
— Databases: MySQL, PostgreSQL, SQL Server
— Security & Monitoring: Activity log alerts, Diagnostic settings, Security settings
— Networking: NSGs, Flow Logs, Network Watchers
— Storage: Storage accounts, Key regeneration
— Web Apps: Azure Web Apps (Sites)
ModifyModify Security policies, firewall rules, and role assignments
RegenerateRegenerate Storage Account Keys
Delete— Delete Security Vulnerability Assessments
— Remove role assignments
Not ActionsNo explicit restriction on what the custom role cannot do

Roles and Permissions at Application Level

Application-Specific RolePermission
Cloud Application AdministratorManages application registrations, policy creation and related permission
Subscription-level AdministratorCan create, edit, or attach other roles to the user

Microsoft Graph API Permissions in Azure

Applications are authorized to call APIs when they are granted permissions by users/admins as part of the consent process. The following list of configured permissions ( sp-saner-cnapp-azure-graph-api-perm) includes all the permissions the application needs.

PermissionTypeDescription
Application.Read.AllApplicationRead all applications
Application.ReadWrite.AllApplicationModify all applications
Application.ReadWrite.OwnedByApplicationManage apps that this application creates or owns
AuditLog.Read.AllApplicationRead all audit log data
CustomSecAttributeAssignment.Read.AllApplicationRead custom security attribute assignments
DeviceManagementConfiguration.Read.AllApplicationRead Microsoft Intune device configuration and policies
DeviceManagementConfiguration.ReadWrite.AllApplicationModify Microsoft Intune device configuration and policies
DeviceManagementManagedDevices.
PrivilegedOperations
ApplicationPerform user-impacting remote actions on Microsoft Intune Devices
DeviceManagementManagedDevices.Read.AllApplicationRead Microsoft Intune devices
DeviceManagementManagedDevices.ReadWrite.AllApplicationModify Microsoft Intune devices
Directory.Read.AllApplicationRead directory data
EntitlementManagement.Read.AllApplicationRead all entitlement management resources
EntitlementManagement.ReadWrite.AllApplicationModify all entitlement management resources
Group.CreateApplicationCreate groups
Group.Read.AllApplicationRead all groups
Group.ReadWrite.AllApplicationRead and write all groups
GroupMember.Read.AllApplicationRead all group memberships
IdentityRiskEvent.Read.AllApplicationRead all identity risk event information
Organization.Read.AllApplicationRead organization information
Policy.Read.AllApplicationRead your organization’s policies
Policy.Read.ConditionalAccessApplicationRead your organization’s conditional access policies
Policy.ReadWrite.AuthenticationMethodApplicationModify all authentication method policies
Policy.ReadWrite.AuthorizationApplicationModify your organizations authorization policy
Policy.ReadWrite.ConditionalAccessApplicationModify your organization’s conditional access policies
Policy.ReadWrite.DeviceConfigurationApplicationModify your organization’s device configuration policies
Reports.Read.AllApplicationRead all users’ full profiles
RoleManagement.Read.AllApplicationRead role management data for all RBAC providers
RoleManagementAlert.Read.DirectoryApplicationRead all alert data for your company’s directory
RoleManagementPolicy.Read.DirectoryApplicationRead all policies for privileged role assignments for your company’s directory
SecurityAlert.Read.AllApplicationRead all security alerts
SecurityAlert.ReadWrite.AllApplicationRead and write to all security alerts
SecurityEvents.Read.AllApplicationRead your organization’s security events
SecurityEvents.ReadWrite.AllApplicationModify your organization’s security events
ServicePrincipalEndpoint.Read.AllApplicationRead service principal endpoints
User.Read.AllApplicationRead all users’ full profiles
User.ReadWrite.AllApplicationRead and write all users’ full profiles
UserAuthenticationMethod.Read.AllApplicationRead all users’ authentication methods
UserAuthenticationMethod.ReadWrite.AllApplicationRead and write all users’ authentication methods

Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Table of Contents
  • Onboarding in Azure
    • Saner CNAPP Login
  • [Mandatory] Roles for Detection and Monitoring
  • RBAC Permissions for Remediation in Azure
  • Summary of Permissions and Actions for Custom Role
  • Roles and Permissions at Application Level
  • Microsoft Graph API Permissions in Azure
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x