RBAC in Microsoft Security Copilot: How to Set It Up and Why It Matters

RBAC in Microsoft Security Copilot: How to Set It Up and Why It Matters

Intro

If you’re diving into Microsoft Security Copilot, one of the first things you’ll want to get right is who can do what. That’s where Role-Based Access Control (RBAC) comes in.

Whether you’re working in Defender, Intune, Entra, Sentinel, or Purview, understanding and configuring RBAC is essential to ensure secure, scalable, and auditable access to Security Copilot.

Let’s get started.

Why RBAC Matters in Security Copilot

Security Copilot can access sensitive data and perform powerful actions across your Microsoft security stack. Without proper access control:

You risk over-permissioning users
You lose visibility into who’s doing what
You may violate compliance or internal governance policies

No one can live with that, therefore – take control and do your Role-Based Access Control (RBAC)!

Understand how RBAC works with Security Copilot

After setting up Microsoft Security Copilot, you’ll notice that Role-Based Access Control (RBAC) is configured by default. While this out-of-the-box setup might be sufficient for smaller teams or initial testing, it’s often not ideal for larger or more security-conscious organizations. In many of the environments I work with, we need tighter control – especially to prevent unrestricted access to the Security Copilot portal. Customizing RBAC ensures that only the right users have the appropriate level of access, aligned with their roles and responsibilities. Below I created a drawing that will help you understand the default Role-Based Access Control (RBAC).

By default, all users are granted access to the Microsoft Security Copilot portal as Contributors. While this might seem convenient, it can lead to confusion. Just because a user can access the portal doesn’t mean they’ll get meaningful results. Security Copilot relies on connectors to pull data from tools like Intune, Defender, or Sentinel – and those connectors require the user to have the appropriate permissions in those systems. For example, if someone tries to prompt for Intune-related data but doesn’t have access to Intune, they’ll receive empty or incomplete results. In that case, what’s the value of giving them access to the portal at all?

Infographic showing RBAC in Microsoft Security Copilot with roles and configuration steps

How it looks like as an end user

Before diving into how to configure Role-Based Access Control (RBAC) I will give you a tour inside the Microsoft Security Copilot portal from the two different views.

Owner role

Home screen takes you to the prompt page, where you can start prompt away.

If you click the small button “Sources” on the right side of the textbox, you will find which plugins you enabled and from there you would know which sources you can get data from.

Since we are owner we get access to all the modules

Contributor role

Home screen takes you to the prompt page, where you can start prompt away. No difference to see from the owner point of view from this screen. You can even manage the plugins if you like to.

Where it differs is when we click the menu button to see what possibilities we have to manage in the portal itself. The owner section is missing which is just how it should be.

Step-by-Step: Setting Up RBAC for Security Copilot

Before we dive in, it’s important to define a clear scope. Now that we understand how Role-Based Access Control (RBAC) works in Microsoft Security Copilot, what exactly do we want to achieve? For some, the default setup might be perfectly fine – and if that’s the case, you can stick with it and build from there. But if the out-of-the-box configuration doesn’t meet your organization’s needs, keep reading. I’ll walk you through how I would approach this task and implement a more tailored RBAC setup.

Rules

  • Rule 1: A user without an Entra Role should not have access to Microsoft Security Copilot.
    • Reason: If a user doesn’t have the necessary roles, they won’t be able to run any meaningful prompts. So why allow them to consume valuable SCU resources when they can’t actually use the service effectively? It’s better to restrict access to those who can make full use of it.
  • Rule 2: Contributor Role should not be able to choose which custom plugins are added or not.
    • Reason: If you’re planning to make custom plugins available in your organization, make sure they’re properly reviewed first. A good approach is to test them with a few selected users before rolling them out company-wide. This helps catch any issues early and ensures the plugin works as expected.

Allright, let’s get to it. Let’s configure the settings so it matches the rules we’ve defined.

Navigate to the portal as owner and find Role assigment

Remove users from this owner list. No owners should be listed as single persons, but be member of a group or role.

And if you followed me this long, this is how it would look like:

Moving on to the contributor role, as shown in the first default RBAC drawing, we have 2 roles configured and then Everyone. It kind of makes no sense as everyone would also cover Security Operators and Security Reader. Let’s clean up. Remove all 3.

Click on Add recommende roles

Click Add

This will add in all the Microsoft recommended roles into contributor role.

We ended up with no fewer than 62 roles assigned as Contributors. The downside to this approach is that you can’t customize or modify the recommended roles individually – it’s an all-or-nothing setup. On the positive side, assigning someone as a Contributor now requires them to have a specific role that also grants access to the relevant data source, such as Defender, Purview, or Entra. This ensures that users can only interact with Microsoft Security Copilot if they’re actually authorized to access relevant data.

To comply with the second rule we set in the beginning where custom plugin can only be configured by owners we need to find the menu and click Plugin settings

Change Who can add and manage thier own custom plugins and set it to Owners only

How it looks like after Role-Based Access Control (RBAC) has been configured

Test 1

You’ll still be able to access the Security Copilot portal, but if you try to run a prompt, you’ll see a message saying it’s no longer possible. Prompt suggestions won’t appear, and under the “Sources” tab, no plugins will be listed. In other words, this enforces Rule #1: users without the necessary roles shouldn’t be able to use Microsoft Security Copilot in any meaningful way.

Test 2

We are back in and can see what a contributor needs to be able to see. We can start prompt and this user would be able to either use this portal to get Intune related data or go directly into the embedded version.

This is the embedded version

Desired Role-Based Access Control (RBAC)

We’ve been through all the way around, how RBAC works in Microsoft Security Copilot and found out how to configure it and how/who we want to let in and start work with our data.

Summary

This blog post breaks down how to properly configure Role-Based Access Control (RBAC) in Microsoft Security Copilot to ensure secure and efficient access across tools like Defender, Intune, Entra, Sentinel, and Purview.

Why RBAC Matters

  • Prevents over-permissioning
  • Ensures visibility and accountability
  • Aligns with compliance and governance standards

Default vs. Custom RBAC

  • Out-of-the-box setup gives all users Contributor access
  • Contributors can access the portal but may get no results if they lack permissions in connected services
  • Custom RBAC allows tighter control over who can access what

User Experience

  • Owners have full access, including plugin management
  • Contributors see a similar interface but lack admin controls
  • Users without roles can access the portal but cannot prompt or view plugins

RBAC Configuration Steps

  1. Define your scope and goals
  2. Remove individual owners; use Entra groups instead
  3. Clean up default Contributor roles
  4. Add Microsoft’s recommended roles (62 total)
  5. Restrict plugin management to Owners only

RBAC Rules Defined

  • Rule 1: Users without Entra roles should not access Security Copilot
  • Rule 2: Only Owners should manage custom plugins

Testing Access

  • Users with no roles: Can’t prompt or view plugins
  • Users with specific roles (e.g., Intune Admin): Can prompt and access relevant data

🧭 Final Thoughts

RBAC is essential for controlling access and ensuring Security Copilot is used effectively. By aligning roles with data access and limiting unnecessary permissions, you create a secure and scalable environment.

Table of Contents

Share this post
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories
  • Follow on SoMe