Skip to content

Commit 3d22c94

Browse files
authored
Merge pull request #268075 from ElazarK/ms-servicenow
servicenow added
2 parents 02ca9c5 + 972df0c commit 3d22c94

29 files changed

+249
-150
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -213,13 +213,22 @@
213213
href: permissions-management.md
214214
- name: Agentless machine scanning
215215
href: concept-agentless-data-collection.md
216-
- name: Supported resource types for multicloud in Foundational CSPM
217-
href: multicloud-resource-types-support-foundational-cspm.md
218216
- name: Integrations
219217
items:
220-
- name: ServiceNow integration
221-
displayName: CSPM, cloud security, posture, management, ServiceNow
222-
href: integration-servicenow.md
218+
- name: ServiceNow
219+
items:
220+
- name: ServiceNow integration with Defender for Cloud
221+
displayName: CSPM, cloud security, posture, management, ServiceNow
222+
href: integration-servicenow.md
223+
- name: Connect ServiceNow to Defender for Cloud
224+
displayName: CSPM, cloud security, posture, management, ServiceNow
225+
href: connect-servicenow.md
226+
- name: Create a ticket in Defender for Cloud
227+
displayName: CSPM, cloud security, posture, management, ServiceNow
228+
href: create-ticket-servicenow.md
229+
- name: Create automatic tickets with governance rules
230+
displayName: CSPM, cloud security, posture, management, ServiceNow
231+
href: create-governance-rule-servicenow.md
223232
- name: Common questions
224233
displayName: questions, common, CSPM, agentless scanning, faq, frequently asked questions
225234
href: faq-cspm.yml
@@ -638,6 +647,9 @@
638647
- name: Kubernetes data plane hardening
639648
displayName: k8s, containers, aks
640649
href: kubernetes-workload-protections.md
650+
- name: Vulnerability assessment for Azure powered by Qualys (Deprecated)
651+
displayName: ACR, registry, images, qualys
652+
href: defender-for-containers-vulnerability-assessment-azure.md
641653
- name: Defender for Kubernetes (deprecated)
642654
displayName: clusters, k8s, aks
643655
href: defender-for-kubernetes-introduction.md
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: Connect ServiceNow to Defender for Cloud
3+
description: Learn how to connect ServiceNow with Microsoft Defender for Cloud to protect Azure, hybrid, and multicloud machines.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.topic: how-to
7+
ms.date: 03/11/2024
8+
ai-usage: ai-assisted
9+
#customer intent: As a user, I want to learn how to connect my ServiceNow account with Microsoft Defender for Cloud so that I can protect my Azure, hybrid, and multicloud machines.
10+
---
11+
12+
# Connect ServiceNow to Defender for Cloud
13+
14+
Microsoft Defender for Cloud's integration with ServiceNow allows customers to connect their Defender for Cloud accounts to ServiceNow. ServiceNow is a powerful workflow automation and enterprise solution that helps organizations streamline and automate routine tasks, improving operational efficiencies and increasing productivity. By integrating ServiceNow with Defender for Cloud, customers can prioritize the remediation of recommendations that affect their business. This integration allows you to create and view ServiceNow tickets linked to recommendations directly from Defender for Cloud, which facilitates efficient incident management.
15+
16+
## Prerequisites
17+
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
19+
20+
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
21+
22+
- The following roles are required:
23+
- To create the integration: Security Admin, Contributor, or Owner.
24+
25+
## Connect ServiceNow to Defender for Cloud
26+
27+
To connect a ServiceNow account to a Defender for Cloud account:
28+
29+
1. Sign in to the [Azure portal](https://portal.azure.com/).
30+
31+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
32+
33+
1. Select **ServiceNow**.
34+
35+
:::image type="content" border="true" source="./media/connect-servicenow/integrations.png" alt-text="Screenshot of environment settings page that shows where to select the ServiceNow option.":::
36+
37+
1. Select **Add integration** > **ServiceNow**.
38+
39+
:::image type="content" border="true" source="./media/connect-servicenow/add-servicenow.png" alt-text="Screenshot that shows where the add integration button is and the ServiceNow option." lightbox="media/connect-servicenow/add-servicenow.png":::
40+
41+
1. Enter a name and select the scope.
42+
43+
1. In the ServiceNow connection details, enter the instance URL, name, password, client ID, and client secret that you [created for the application registry](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html) in the ServiceNow portal.
44+
45+
1. Select **Next**.
46+
47+
1. Select Incident data, Problems data, and Changes table from the drop-down menus.
48+
49+
:::image type="content" border="true" source="./media/connect-servicenow/customize-fields.png" alt-text="Screenshot that shows the custom option selected and the accompanying fields you can enter information into.":::
50+
51+
1. Select **Save**.
52+
53+
A notice appears after successful creation of integration.
54+
55+
## Next step
56+
57+
> [!div class="nextstepaction"]
58+
> [Create a ticket in Defender for Cloud](create-ticket-servicenow.md)
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: Create automatic tickets with governance rules
3+
description: Learn how to create a governance rule in Defender for Cloud that connects recommendations or severity levels to a specific owner.
4+
author: Elazark
5+
ms.author: elkrieger
6+
ms.topic: how-to
7+
ms.date: 03/11/2024
8+
ai-usage: ai-assisted
9+
#customer intent: As a user, I want to learn how to create automatic tickets using governance rules in Defender for Cloud that automatically assigns an owner to specific recommendation or a recommendation with a severity level in Defender for Cloud to my my ServiceNow account.
10+
---
11+
12+
# Create automatic tickets with governance rules
13+
14+
The integration of SeviceNow and Defender for Cloud allow you to create governance rules that automatically open tickets in SeviceNow for specific recommendations or severity levels. ServiceNow tickets can be created, viewed, and linked to recommendations directly from Defender for Cloud, enabling seamless collaboration between the two platforms and facilitating efficient incident management.
15+
16+
## Prerequisites
17+
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
19+
20+
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
21+
22+
- The following roles are required:
23+
- To create an assignment: Admin permissions to ServiceNow.
24+
25+
## Assign an owner with a governance rule
26+
27+
You can create a rule to automatically assign an owner to a recommendation in Defender for Cloud. This rule is based on the recommendation's severity or recommendation.
28+
29+
1. Sign in to the [Azure portal](https://portal.azure.com/).
30+
31+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
32+
33+
1. Select **Governance rules**.
34+
35+
:::image type="content" border="true" source="./media/integration-servicenow/governance-rules.png" alt-text="Screenshot of the environment settings page that shows where the governance rules button is located.":::
36+
37+
1. Select **Create governance rule**.
38+
39+
1. Enter a rule name and select a scope.
40+
41+
1. Select **ServiceNow** In the Type field.
42+
43+
1. Enter a priority.
44+
45+
1. Select and integration instance.
46+
47+
1. Select a ServiceNow ticket type.
48+
49+
1. Select **Next**.
50+
51+
1. Select either:
52+
- **By Severity** and the severity level.
53+
- **By recommendation** and the recommendation.
54+
55+
1. Select an owner.
56+
57+
1. Select a remediation timeframe.
58+
59+
1. (Optional) Toggle the switch to apply a grace period.
60+
61+
1. (Optional) Set email notifications.
62+
63+
1. Select **Create**.
64+
65+
## Next step
66+
67+
> [!div class="nextstepaction"]
68+
> [Common questions about cloud security posture management (CSPM)](faq-cspm.yml).
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
---
2+
title: Create a ticket in Defender for Cloud
3+
description: Learn how to create a ticket in Defender for Cloud that connects and synchronizes with your ServiceNow account.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.topic: how-to
7+
ms.date: 03/11/2024
8+
ai-usage: ai-assisted
9+
#customer intent: As a user, I want to learn how to Create a ticket in Defender for Cloud for my ServiceNow account.
10+
---
11+
12+
# Create a ticket in Defender for Cloud
13+
14+
The integration between Defender for Cloud and ServiceNow allows Defender for Cloud customers to create tickets in Defender for Cloud that connects to a ServiceNow account. ServiceNow tickets are linked to recommendations directly from Defender for Cloud, allowing the two platforms to facilitate efficient incident management.
15+
16+
## Prerequisites
17+
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
19+
20+
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
21+
22+
- The following roles are required:
23+
- To create an assignment: Admin permissions to ServiceNow.
24+
25+
## Create a new ticket based on a recommendation to ServiceNow
26+
27+
Security admins can create and assign tickets directly from the Defender for Cloud portal.
28+
29+
1. Sign in to [the Azure portal](https://aka.ms/integrations).
30+
31+
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
32+
33+
1. Select any recommendation with unhealthy resources that you want to create a ServiceNow ticket for and assign an owner to.
34+
35+
1. Select the resource from the unhealthy resources and select **Assign owner**.
36+
37+
:::image type="content" border="true" source="./media/create-ticket-servicenow/create-assignment.png" alt-text="Screenshot of how to create an assignment." lightbox="media/create-ticket-servicenow/create-assignment.png":::
38+
39+
1. In the Type field, select **ServiceNow**
40+
41+
:::image type="content" source="media/create-ticket-servicenow/type-servicenow.png" alt-text="Screenshot that shows the create assignment window and the type field where you select ServiceNow.":::
42+
43+
1. Select the integration instance.
44+
45+
1. Select the ticket type.
46+
47+
> [!NOTE]
48+
> In ServiceNow, there are several types of tickets that can be used to manage and track different types of incidents, requests, and tasks. Only incident, change request, and problem are supported with this integration.
49+
50+
:::image type="content" border="true" source="./media/create-ticket-servicenow/assignment-type.png" alt-text="Screenshot of how to complete the assignment type.":::
51+
52+
1. Expand the assignment details section.
53+
54+
1. Complete the following fields:
55+
56+
- **Assigned to**: Choose the owner whom you would like to assign the affected recommendation to.
57+
- **Caller**: Represents the user defining the assignment.
58+
- **Description and Short Description**: Enter a description, and short description.
59+
- **Remediation timeframe**: Select the remediation timeframe.
60+
- **Apply Grace Period**: (Optional) apply a grace period.
61+
- **Set Email Notifications**: (Optional) You can send a reminder to the owners or the owner’s direct manager.
62+
63+
:::image type="content" border="true" source="./media/create-ticket-servicenow/assignment-details.png" alt-text="Screenshot of how to complete the assignment details.":::
64+
65+
1. Select **Create**.
66+
67+
After the assignment is created, the Ticket ID assigned to this affected resource will appear next to the resource in the recommendation. The Ticket ID represents the ticket created in the ServiceNow portal. You can select the Ticket ID to navigate to the newly created incident in the ServiceNow portal.
68+
69+
> [!NOTE]
70+
> When the integration is deleted, all of the assignments will be deleted. Deletion can take up to 24 hrs.
71+
72+
## Next step
73+
74+
> [!div class="nextstepaction"]
75+
> [Assign an owner to a recommendation or severity level](create-governance-rule-servicenow.md)

0 commit comments

Comments
 (0)