Skip to content

Commit 44a91a5

Browse files
Merge pull request #223478 from ElazarK/classic-connector-note
added note
2 parents d917942 + fe4cdae commit 44a91a5

File tree

2 files changed

+26
-16
lines changed

2 files changed

+26
-16
lines changed

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Connect your AWS account to Microsoft Defender for Cloud
33
description: Defend your AWS resources with Microsoft Defender for Cloud
44
ms.topic: quickstart
5-
ms.date: 11/07/2022
5+
ms.date: 01/10/2023
66
author: bmansheim
77
ms.author: benmansheim
88
zone_pivot_groups: connect-aws-accounts
@@ -21,7 +21,12 @@ To protect your AWS-based resources, you can connect an AWS account with either:
2121
- [**Microsoft Defender for Containers**](defender-for-containers-introduction.md) brings threat detection and advanced defenses to [supported Amazon EKS clusters](supported-machines-endpoint-solutions-clouds-containers.md).
2222
- [**Microsoft Defender for SQL**](defender-for-sql-introduction.md) brings threat detection and advanced defenses to your SQL Servers running on AWS EC2, AWS RDS Custom for SQL Server.
2323

24-
- **Classic cloud connector** - Requires configuration in your AWS account to create a user that Defender for Cloud can use to connect to your AWS environment. If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors), and use the native connector to reconnect to the account. Using both the classic and native connectors can produce duplicate recommendations.
24+
- **Classic cloud connector** - Requires configuration in your AWS account to create a user that Defender for Cloud can use to connect to your AWS environment.
25+
26+
> [!NOTE]
27+
> The option to select the classic connector is only available if you previously onboarded an AWS account using the classic connector.
28+
>
29+
> If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors), and use the native connector to reconnect to the account. Using both the classic and native connectors can produce duplicate recommendations.
2530
2631
For a reference list of all the recommendations Defender for Cloud can provide for AWS resources, see [Security recommendations for AWS resources - a reference guide](recommendations-reference-aws.md).
2732

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 19 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Connect your GCP project to Microsoft Defender for Cloud
33
description: Monitoring your GCP resources from Microsoft Defender for Cloud
44
ms.topic: quickstart
5-
ms.date: 09/20/2022
5+
ms.date: 01/10/2023
66
author: bmansheim
77
ms.author: benmansheim
88
zone_pivot_groups: connect-gcp-accounts
@@ -24,6 +24,11 @@ To protect your GCP-based resources, you can connect a GCP project with either:
2424

2525
- **Classic cloud connector** - Requires configuration in your GCP project to create a user that Defender for Cloud can use to connect to your GCP environment. If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors) and use the native connector to reconnect to the project. Using both the classic and native connectors can produce duplicate recommendations.
2626

27+
> [!NOTE]
28+
> The option to select the classic connector is only available if you previously onboarded a GCP project using the classic connector.
29+
>
30+
> If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors), and use the native connector to reconnect to the account. Using both the classic and native connectors can produce duplicate recommendations.
31+
2732
:::image type="content" source="./media/quickstart-onboard-gcp/gcp-account-in-overview.png" alt-text="Screenshot of GCP projects shown in Microsoft Defender for Cloud's overview dashboard." lightbox="media/quickstart-onboard-gcp/gcp-account-in-overview.png":::
2833

2934
::: zone pivot="env-settings"
@@ -32,7 +37,7 @@ To protect your GCP-based resources, you can connect a GCP project with either:
3237

3338
|Aspect|Details|
3439
|----|:----|
35-
| Release state: | Preview <br> The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to the Azure features that are in beta, preview, or otherwise not yet released into general availability. |
40+
| Release state: | Preview <br> The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to the Azure features that are in beta, preview, or otherwise not yet released into general availability. |
3641
|Pricing:|The **[Defender for SQL](defender-for-sql-introduction.md)** plan is billed at the same price as Azure resources.<br> The **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If a GCP VM instance doesn't have the Azure Arc agent deployed, you won't be charged for that machine. <br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for GCP at the same price as for Azure resources.|
3742
|Required roles and permissions:| **Contributor** on the relevant Azure Subscription <br> **Owner** on the GCP organization or project|
3843
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet, Other Gov)|
@@ -69,7 +74,7 @@ Follow the steps below to create your GCP cloud connector.
6974

7075
1. Toggle the plans you want to connect to **On**. By default all necessary prerequisites and components will be provisioned. (Optional) Learn how to [configure each plan](#optional-configure-selected-plans).
7176

72-
1. (**Containers only**) Ensure you have fulfilled the [network requirements](defender-for-containers-enable.md?tabs=defender-for-container-gcp#network-requirements) for the Defender for Containers plan.
77+
1. (**Containers only**) Ensure you've fulfilled the [network requirements](defender-for-containers-enable.md?tabs=defender-for-container-gcp#network-requirements) for the Defender for Containers plan.
7378

7479
1. Select the **Next: Configure access**.
7580

@@ -117,16 +122,16 @@ To have full visibility to Microsoft Defender for Servers security content, ensu
117122
> <br><br> Microsoft Defender for Servers does not install the OS config agent to a VM that does not have it installed. However, Microsoft Defender for Servers will enable communication between the OS config agent and the OS config service if the agent is already installed but not communicating with the service.
118123
> <br><br> This can change the OS config agent from `inactive` to `active` and will lead to additional costs.
119124
120-
- **Manual installation** - You can manually connect your VM instances to Azure Arc for servers. Instances in projects with Defender for Servers plan enabled that are not connected to Arc will be surfaced by the recommendation “GCP VM instances should be connected to Azure Arc”. Use the “Fix” option offered in this recommendation to install Azure Arc on the selected machines.
125+
- **Manual installation** - You can manually connect your VM instances to Azure Arc for servers. Instances in projects with Defender for Servers plan enabled that aren't connected to Arc will be surfaced by the recommendation “GCP VM instances should be connected to Azure Arc”. Use the “Fix” option offered in this recommendation to install Azure Arc on the selected machines.
121126

122127
- Ensure you've fulfilled the [network requirements for Azure Arc](../azure-arc/servers/network-requirements.md?tabs=azure-cloud).
123128

124-
- Additional extensions should be enabled on the Arc-connected machines.
129+
- Other extensions should be enabled on the Arc-connected machines.
125130
- Microsoft Defender for Endpoint
126131
- VA solution (TVM/ Qualys)
127132
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA). Ensure the selected workspace has security solution installed.
128133

129-
The LA agent and AMA are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings with regard to the LA agent and AMA.
134+
The LA agent and AMA are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings regarding the LA agent and AMA.
130135

131136
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
132137

@@ -140,7 +145,7 @@ To have full visibility to Microsoft Defender for Servers security content, ensu
140145

141146
1. On the Select plans screen select **View configuration**.
142147

143-
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to click to configure the Servers plan.":::
148+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to select to configure the Servers plan.":::
144149

145150
1. On the Auto provisioning screen, toggle the switches on or off depending on your need.
146151

@@ -169,11 +174,11 @@ To have full visibility to Microsoft Defender for SQL security content, ensure y
169174
> The Arc auto-provisioning process leverages the VM manager on your Google Cloud Platform, to enforce policies on the your VMs through the OS config agent. A VM with an [Active OS agent](https://cloud.google.com/compute/docs/manage-os#agent-state) will incur a cost according to GCP. Refer to [GCP's technical documentation](https://cloud.google.com/compute/docs/vm-manager#pricing) to see how this may affect your account.
170175
> <br><br> Microsoft Defender for Servers does not install the OS config agent to a VM that does not have it installed. However, Microsoft Defender for Servers will enable communication between the OS config agent and the OS config service if the agent is already installed but not communicating with the service.
171176
> <br><br> This can change the OS config agent from `inactive` to `active` and will lead to additional costs.
172-
- Additional extensions should be enabled on the Arc-connected machines.
177+
- Other extensions should be enabled on the Arc-connected machines.
173178
- SQL servers on machines. Ensure the plan is enabled on your subscription.
174179
- Log Analytics (LA) agent on Arc machines. Ensure the selected workspace has security solution installed.
175180

176-
The LA agent and SQL servers on machines plan are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings and may result in additional charges.
181+
The LA agent and SQL servers on machines plan are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings and may result in extra charges.
177182

178183
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
179184

@@ -188,7 +193,7 @@ To have full visibility to Microsoft Defender for SQL security content, ensure y
188193

189194
1. On the Select plans screen select **Configure**.
190195

191-
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to click to configure the Databases plan.":::
196+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to select to configure the Databases plan.":::
192197

193198
1. On the Auto provisioning screen, toggle the switches on or off depending on your need.
194199

@@ -206,7 +211,7 @@ To have full visibility to Microsoft Defender for SQL security content, ensure y
206211
Microsoft Defender for Containers brings threat detection and advanced defenses to your GCP GKE Standard clusters. To get the full security value out of Defender for Containers and to fully protect GCP clusters, ensure you have the following requirements configured:
207212

208213
- **Kubernetes audit logs to Defender for Cloud** - Enabled by default. This configuration is available at a GCP project level only. This provides agentless collection of the audit log data through [GCP Cloud Logging](https://cloud.google.com/logging/) to the Microsoft Defender for Cloud backend for further analysis.
209-
- **Azure Arc-enabled Kubernetes, the Defender extension, and the Azure Policy extension** - Enabled by default. You can install Azure Arc-enabled Kubernetes and its extensions on your GKE clusters in 3 different ways:
214+
- **Azure Arc-enabled Kubernetes, the Defender extension, and the Azure Policy extension** - Enabled by default. You can install Azure Arc-enabled Kubernetes and its extensions on your GKE clusters in three different ways:
210215
- **(Recommended)** Enable the Defender for Container auto-provisioning at the project level as explained in the instructions below.
211216
- Defender for Cloud recommendations, for per cluster installation, which will appear on the Microsoft Defender for Cloud's Recommendations page. Learn how to [deploy the solution to specific clusters](defender-for-containers-enable.md?tabs=defender-for-container-gke#deploy-the-solution-to-specific-clusters).
212217
- Manual installation for [Arc-enabled Kubernetes](../azure-arc/kubernetes/quickstart-connect-cluster.md) and [extensions](../azure-arc/kubernetes/extensions.md).
@@ -220,7 +225,7 @@ Microsoft Defender for Containers brings threat detection and advanced defenses
220225

221226
1. On the Select plans screen select **Configure**.
222227

223-
:::image type="content" source="media/quickstart-onboard-gcp/containers-configure.png" alt-text="Screenshot showing where to click to configure the Containers plan.":::
228+
:::image type="content" source="media/quickstart-onboard-gcp/containers-configure.png" alt-text="Screenshot showing where to select to configure the Containers plan.":::
224229

225230
1. On the Auto provisioning screen, toggle the switches **On**.
226231

@@ -277,9 +282,9 @@ For all the GCP projects in your organization, you must also:
277282

278283
1. Set up **GCP Security Command Center** using [these instructions from the GCP documentation](https://cloud.google.com/security-command-center/docs/quickstart-scc-setup).
279284
1. Enable **Security Health Analytics** using [these instructions from the GCP documentation](https://cloud.google.com/security-command-center/docs/how-to-use-security-health-analytics).
280-
1. Verify that there is data flowing to the Security Command Center.
285+
1. Verify that there's data flowing to the Security Command Center.
281286

282-
The instructions for connecting your GCP environment for security configuration follow Google's recommendations for consuming security configuration recommendations. The integration leverages Google Security Command Center and will consume additional resources that might impact your billing.
287+
The instructions for connecting your GCP environment for security configuration follow Google's recommendations for consuming security configuration recommendations. The integration applies Google Security Command Center and will consume other resources that might impact your billing.
283288

284289
When you first enable Security Health Analytics, it might take several hours for data to be available.
285290

0 commit comments

Comments
 (0)