You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-set-up-defender-for-cloud-security.md
+86-1Lines changed: 86 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ To aid your understanding of Defender for Cloud and its many security features,
22
22
To successfully complete the actions in this guide:
23
23
- You must have an Azure Operator Nexus subscription.
24
24
- You must have a deployed Azure Arc-connected Operator Nexus instance running in your on-premises environment.
25
-
- You must use an Azure portal user account in your subscription with Owner, Contributor or Reader role.
25
+
- You must use an Azure portal user account in your subscription with Owner, Contributor, or Reader role.
26
26
27
27
## Enable Defender for Cloud
28
28
@@ -56,6 +56,91 @@ To set up a Defender for Servers plan:
56
56
:::image type="content" source="media/security/nexus-defender-for-servers-plan-settings.png" alt-text="Screenshot of Defender for Servers plan settings for Operator Nexus." lightbox="media/security/nexus-defender-for-servers-plan-settings.png":::
57
57
* Click Continue to save any changed settings.
58
58
59
+
### Grant MDE Onboarding Permissions
60
+
61
+
To enable the Microsoft Defender for Endpoint (MDE) agent on bare metal machines within your Nexus Cluster, you must grant the nc-platform-extension identity of the cluster permission to onboard the MDE agent on your behalf.
62
+
63
+
The nc-platform-extension identity does not exist prior to deploying the Operator Nexus cluster. The following example must be performed after the Cluster is deployed.
64
+
65
+
The required permission is ```Microsoft.Security/mdeOnboardings/read```. Assign this permission to the nc-platform-extension identity using the built-in role ```Security Reader``` or a custom role with the same permission.
66
+
67
+
> [!IMPORTANT]
68
+
> The user or identity creating the role assignment must have the ```Microsoft.Authorization/roleAssignments/write``` permission at the subscription level.
69
+
> Executing the commands to show the principal ID object ID requires the Microsoft Entra role assignment of Directory Reader or equivalent.
70
+
71
+
Below is an example bash script using the Azure CLI for granting the nc-platform-extension identity permission to onboard the MDE agent on your behalf.
# 8. Create a Security Reader role assignment at subscription level
126
+
echo"Creating Security Reader role assignment at subscription level"
127
+
az role assignment create \
128
+
--role "Security Reader" \
129
+
--subscription "$SUBSCRIPTION_ID" \
130
+
--assignee-object-id "$OBJECT_ID" \
131
+
--assignee-principal-type ServicePrincipal \
132
+
--scope "/subscriptions/$SUBSCRIPTION_ID"
133
+
134
+
echo"Done. Security Reader role assignment created"
135
+
```
136
+
137
+
While the required permissions are not assigned, the MDE onboarding reconciliation logic will continue to attempt to onboard the MDE agent until the permissions are granted. After permission assignment is complete, the MDE onboarding reconciliation will complete successfully with no additional action required.
138
+
139
+
Reconciliation of the MDE onboarding status is an exponential backoff process. The first retry attempt will be made after 10 minutes, the second after 20 minutes, and the third after 40 minutes. If three failures occur, the reconciliation will wait 10 minutes before attempting to onboard the MDE agent again (which will restart the exponential backoff process).
140
+
141
+
> [!IMPORTANT]
142
+
> MDE Agent reconciliation runs independently on each of the bare metal machines in the cluster. As such the exact time it takes to onboard the MDE agent on all bare metal machines in the cluster will vary depending on the number of bare metal machines in the cluster and the initial time of the first onboarding attempt.
143
+
59
144
### Operator Nexus-specific requirement for enabling Defender for Endpoint
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-use-mde-runtime-protection.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,7 @@ This document provides the steps to execute those tasks.
22
22
## Before you begin
23
23
24
24
- Install the latest version of the [appropriate CLI extensions](./howto-install-cli-extensions.md).
25
+
- Onboarding permissions granted to the nc-platform-extension identity of the cluster. See [Grant MDE Onboarding Permissions](./howto-set-up-defender-for-cloud-security.md).
0 commit comments