Skip to content

Commit 3c3b871

Browse files
committed
fixing for usx
1 parent ba799c8 commit 3c3b871

File tree

1 file changed

+15
-7
lines changed

1 file changed

+15
-7
lines changed

articles/sentinel/connect-defender-for-cloud.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ author: yelevin
55
ms.topic: how-to
66
ms.date: 11/19/2024
77
ms.author: yelevin
8+
appliesto:
9+
- Microsoft Sentinel
810

911

1012
#Customer intent: As a security engineer, I want to integrate and synchronize alerts from cloud security tools into Microsoft Sentinel so that analysts can efficiently monitor, analyze, and respond to security incidents across my organization's hybrid and multicloud environments.
@@ -29,21 +31,27 @@ ms.author: yelevin
2931

3032
## Prerequisites
3133

32-
- You must have read and write permissions on your Microsoft Sentinel workspace.
34+
- You must be using Microsoft Sentinel in the Azure portal. If you're onboarded to Microsoft's unified security operations (SecOps) platform, Defender for Cloud alerts are already ingested into Microsoft Defender XDR. The **Tenant-based Microsoft Defender for Cloud (Preview)** data connector isn't listed in the **Data connectors** page in the Defender portal. For more information, see [Microsoft Sentinel in the Microsoft Defender portal](microsoft-sentinel-defender-portal.md).
3335

34-
- You must have the **Contributor** or **Owner** role on the subscription you want to connect to Microsoft Sentinel.
36+
If you're onboarded to Microsoft's unifed SecOps platform, you'll still want to install the **Microsoft Defender for Cloud** solution to use built-in security content with Microsoft Sentinel.
3537

36-
- You'll need to enable at least one plan within Microsoft Defender for Cloud for each subscription where you want to enable the connector. To enable Microsoft Defender plans on a subscription, you must have the **Security Admin** role for that subscription.
38+
- You must have the following roles and permissions:
3739

38-
- You'll need the `SecurityInsights` resource provider to be registered for each subscription where you want to enable the connector. Review the guidance on the [resource provider registration status](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider) and the ways to register it.
40+
- You must have read and write permissions on your Microsoft Sentinel workspace.
3941

40-
- To enable bi-directional sync, you must have the **Contributor** or **Security Admin** role on the relevant subscription.
42+
- You must have the **Contributor** or **Owner** role on the subscription you want to connect to Microsoft Sentinel.
4143

42-
- Install the solution for **Microsoft Defender for Cloud** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
44+
- To enable bi-directional sync, you must have the **Contributor** or **Security Admin** role on the relevant subscription.
45+
46+
- You'll need to enable at least one plan within Microsoft Defender for Cloud for each subscription where you want to enable the connector. To enable Microsoft Defender plans on a subscription, you must have the **Security Admin** role for that subscription.
47+
48+
- You'll need the `SecurityInsights` resource provider to be registered for each subscription where you want to enable the connector. Review the guidance on the [resource provider registration status](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider) and the ways to register it.
4349

4450
## Connect to Microsoft Defender for Cloud
4551

46-
1. After installing the solution, in Microsoft Sentinel, select **Configuration > Data connectors**.
52+
1. In Microsoft Sentinel, install the solution for **Microsoft Defender for Cloud** from the **Content Hub**. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
53+
54+
1. Select **Configuration > Data connectors**.
4755

4856
1. From the **Data connectors** page, select either the **Subscription-based Microsoft Defender for Cloud (Legacy)** or the **Tenant-based Microsoft Defender for Cloud (Preview)** connector, and then select **Open connector page**.
4957

0 commit comments

Comments
 (0)