<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SBAC limitations: Delegation of full control (profiles and exceptions) for a specific group of endpoints. in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sbac-limitations-delegation-of-full-control-profiles-and/m-p/1251356#M9229</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1631501771"&gt;@W.MedinaMarquez&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="442" data-start="0"&gt;To delegate Cortex XDR administration to a specific departmental IT team while maintaining strict segregation, you should utilize Scope-Based Access Control (SBAC) in combination with Custom Roles (RBAC). To ensure departmental admins can manage their own exceptions without impacting the rest of the organization.&lt;/P&gt;
&lt;P data-end="442" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="503" data-start="444" data-section-id="1bzj0g1"&gt;1. SBAC Limitations Regarding Exceptions and Profiles&lt;/H4&gt;
&lt;P data-end="671" data-start="504"&gt;While SBAC is designed to restrict visibility and management to specific perimeters, it has the following known limitations regarding exceptions and policy management:&lt;/P&gt;
&lt;UL data-end="1821" data-start="673"&gt;
&lt;LI data-end="1007" data-start="673" data-section-id="1cn0lgb"&gt;&lt;STRONG data-end="706" data-start="675"&gt;Global vs. Scoped Features:&lt;/STRONG&gt; Some administrative actions are treated as global permissions to protect tenant integrity. In certain configurations, "Modify" access for security configurations—such as exceptions—defaults to read-only for scoped users if they are not assigned a role that explicitly supports SBAC for those areas.&lt;/LI&gt;
&lt;LI data-end="1364" data-start="1009" data-section-id="zcxy6a"&gt;Specific Module Restrictions: Certain exception actions, specifically within Device Control, may require the removal of an administrative scope to function correctly. Support cases indicate that scoped users may be unable to "Add device to permanent exception" unless their scope is broadened, which conflicts with strict segregation requirements.&lt;/LI&gt;
&lt;LI data-end="1618" data-start="1366" data-section-id="7zyzio"&gt;Detection Exceptions (IOC/BIOC): Exception criteria defined for IOC or BIOC rules under the "Detection" menu are often treated as global. Allow lists and blocklists are global and may contain data on endpoints outside of a user's defined scope.&lt;/LI&gt;
&lt;LI data-end="1821" data-start="1620" data-section-id="185jdzx"&gt;Role Capabilities: The predefined "Scoped Endpoint Admin" role has None permissions for "Global Exceptions" by default, which explains why a user with this role cannot create or add exceptions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1871" data-start="1828" data-section-id="1a55qpr"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1871" data-start="1828" data-section-id="1a55qpr"&gt;2. Expected Behavior for Scoped Users:&lt;/H4&gt;
&lt;P data-end="2075" data-start="1872"&gt;It is expected that a scoped user can manage exceptions only if their assigned role has "Edit" permissions for the relevant components and the exceptions are within their assigned scope. SBAC applies to:&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="2226" data-start="2077"&gt;
&lt;LI data-is-last-node="" data-end="2226" data-start="2077" data-section-id="ej0vh"&gt;Policy Management: Creating and editing Prevention policies/profiles and global or device exceptions that fall within the user’s defined scope.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;&lt;STRONG&gt;How to design this permissions architecture&lt;/STRONG&gt; -&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;For further informations,will recommend&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="il"&gt;reaching&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;out to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="il"&gt;your Account Team&lt;/SPAN&gt;&lt;SPAN&gt;, Solution Consultant, or Sales Engineer. They will be able to assist you based on&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="il"&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;specific requirements.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking &lt;STRONG&gt;like&lt;/STRONG&gt; and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
    <pubDate>Wed, 01 Apr 2026 15:04:51 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-04-01T15:04:51Z</dc:date>
    <item>
      <title>SBAC limitations: Delegation of full control (profiles and exceptions) for a specific group of endpoints.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sbac-limitations-delegation-of-full-control-profiles-and/m-p/1251347#M9228</link>
      <description>&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Hello community!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt; I'm looking for the best way to delegate Cortex XDR administration to an IT team within a specific department.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;The goal is to give them full control over a particular group of endpoints, ensuring strict separation: they shouldn't have visibility into or the ability to manage the endpoints in the main network.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt; The problem: I've been testing Scope-Based Access Control (SBAC) to limit permissions on this group of endpoints.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;However, I've noticed that under this configuration, the departmental IT team can't create or add exceptions specific to their own devices.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt; I need this team to be able to manage their own exceptions independently, as these shouldn't apply to the rest of the organization, nor should this team be able to modify or view global exceptions.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt; My questions are: SBAC limitations: What are the exact limitations of SBAC regarding the creation and assignment of exceptions and prevention profiles?&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Is it expected that a user restricted by SBAC cannot manage their own exceptions?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt; Configuration best practices: What combination of Roles (RBAC), Scopes (SBAC), or policy/profile structure should I configure to achieve this level of segregation?&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;I need this team to manage their own profiles and exceptions only for their assigned endpoints, without impacting the global tenant.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt; I appreciate your guidance on how to design this permissions architecture.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 12:05:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sbac-limitations-delegation-of-full-control-profiles-and/m-p/1251347#M9228</guid>
      <dc:creator>W.MedinaMarquez</dc:creator>
      <dc:date>2026-04-01T12:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: SBAC limitations: Delegation of full control (profiles and exceptions) for a specific group of endpoints.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sbac-limitations-delegation-of-full-control-profiles-and/m-p/1251356#M9229</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1631501771"&gt;@W.MedinaMarquez&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="442" data-start="0"&gt;To delegate Cortex XDR administration to a specific departmental IT team while maintaining strict segregation, you should utilize Scope-Based Access Control (SBAC) in combination with Custom Roles (RBAC). To ensure departmental admins can manage their own exceptions without impacting the rest of the organization.&lt;/P&gt;
&lt;P data-end="442" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="503" data-start="444" data-section-id="1bzj0g1"&gt;1. SBAC Limitations Regarding Exceptions and Profiles&lt;/H4&gt;
&lt;P data-end="671" data-start="504"&gt;While SBAC is designed to restrict visibility and management to specific perimeters, it has the following known limitations regarding exceptions and policy management:&lt;/P&gt;
&lt;UL data-end="1821" data-start="673"&gt;
&lt;LI data-end="1007" data-start="673" data-section-id="1cn0lgb"&gt;&lt;STRONG data-end="706" data-start="675"&gt;Global vs. Scoped Features:&lt;/STRONG&gt; Some administrative actions are treated as global permissions to protect tenant integrity. In certain configurations, "Modify" access for security configurations—such as exceptions—defaults to read-only for scoped users if they are not assigned a role that explicitly supports SBAC for those areas.&lt;/LI&gt;
&lt;LI data-end="1364" data-start="1009" data-section-id="zcxy6a"&gt;Specific Module Restrictions: Certain exception actions, specifically within Device Control, may require the removal of an administrative scope to function correctly. Support cases indicate that scoped users may be unable to "Add device to permanent exception" unless their scope is broadened, which conflicts with strict segregation requirements.&lt;/LI&gt;
&lt;LI data-end="1618" data-start="1366" data-section-id="7zyzio"&gt;Detection Exceptions (IOC/BIOC): Exception criteria defined for IOC or BIOC rules under the "Detection" menu are often treated as global. Allow lists and blocklists are global and may contain data on endpoints outside of a user's defined scope.&lt;/LI&gt;
&lt;LI data-end="1821" data-start="1620" data-section-id="185jdzx"&gt;Role Capabilities: The predefined "Scoped Endpoint Admin" role has None permissions for "Global Exceptions" by default, which explains why a user with this role cannot create or add exceptions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1871" data-start="1828" data-section-id="1a55qpr"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1871" data-start="1828" data-section-id="1a55qpr"&gt;2. Expected Behavior for Scoped Users:&lt;/H4&gt;
&lt;P data-end="2075" data-start="1872"&gt;It is expected that a scoped user can manage exceptions only if their assigned role has "Edit" permissions for the relevant components and the exceptions are within their assigned scope. SBAC applies to:&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="2226" data-start="2077"&gt;
&lt;LI data-is-last-node="" data-end="2226" data-start="2077" data-section-id="ej0vh"&gt;Policy Management: Creating and editing Prevention policies/profiles and global or device exceptions that fall within the user’s defined scope.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;&lt;STRONG&gt;How to design this permissions architecture&lt;/STRONG&gt; -&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;For further informations,will recommend&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="il"&gt;reaching&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;out to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="il"&gt;your Account Team&lt;/SPAN&gt;&lt;SPAN&gt;, Solution Consultant, or Sales Engineer. They will be able to assist you based on&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="il"&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;specific requirements.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking &lt;STRONG&gt;like&lt;/STRONG&gt; and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 15:04:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sbac-limitations-delegation-of-full-control-profiles-and/m-p/1251356#M9229</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-04-01T15:04:51Z</dc:date>
    </item>
  </channel>
</rss>

