You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-aws.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Connect your AWS account to Microsoft Defender for Cloud
3
3
description: Defend your AWS resources with Microsoft Defender for Cloud
4
4
ms.topic: quickstart
5
-
ms.date: 11/07/2022
5
+
ms.date: 01/10/2023
6
6
author: bmansheim
7
7
ms.author: benmansheim
8
8
zone_pivot_groups: connect-aws-accounts
@@ -21,7 +21,12 @@ To protect your AWS-based resources, you can connect an AWS account with either:
21
21
-[**Microsoft Defender for Containers**](defender-for-containers-introduction.md) brings threat detection and advanced defenses to [supported Amazon EKS clusters](supported-machines-endpoint-solutions-clouds-containers.md).
22
22
-[**Microsoft Defender for SQL**](defender-for-sql-introduction.md) brings threat detection and advanced defenses to your SQL Servers running on AWS EC2, AWS RDS Custom for SQL Server.
23
23
24
-
-**Classic cloud connector** - Requires configuration in your AWS account to create a user that Defender for Cloud can use to connect to your AWS environment. If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors), and use the native connector to reconnect to the account. Using both the classic and native connectors can produce duplicate recommendations.
24
+
-**Classic cloud connector** - Requires configuration in your AWS account to create a user that Defender for Cloud can use to connect to your AWS environment.
25
+
26
+
> [!NOTE]
27
+
> The option to select the classic connector is only available if you previously onboarded an AWS account using the classic connector.
28
+
>
29
+
> If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors), and use the native connector to reconnect to the account. Using both the classic and native connectors can produce duplicate recommendations.
25
30
26
31
For a reference list of all the recommendations Defender for Cloud can provide for AWS resources, see [Security recommendations for AWS resources - a reference guide](recommendations-reference-aws.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-gcp.md
+19-14Lines changed: 19 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Connect your GCP project to Microsoft Defender for Cloud
3
3
description: Monitoring your GCP resources from Microsoft Defender for Cloud
4
4
ms.topic: quickstart
5
-
ms.date: 09/20/2022
5
+
ms.date: 01/10/2023
6
6
author: bmansheim
7
7
ms.author: benmansheim
8
8
zone_pivot_groups: connect-gcp-accounts
@@ -24,6 +24,11 @@ To protect your GCP-based resources, you can connect a GCP project with either:
24
24
25
25
-**Classic cloud connector** - Requires configuration in your GCP project to create a user that Defender for Cloud can use to connect to your GCP environment. If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors) and use the native connector to reconnect to the project. Using both the classic and native connectors can produce duplicate recommendations.
26
26
27
+
> [!NOTE]
28
+
> The option to select the classic connector is only available if you previously onboarded a GCP project using the classic connector.
29
+
>
30
+
> If you have classic cloud connectors, we recommend that you [delete these connectors](#remove-classic-connectors), and use the native connector to reconnect to the account. Using both the classic and native connectors can produce duplicate recommendations.
31
+
27
32
:::image type="content" source="./media/quickstart-onboard-gcp/gcp-account-in-overview.png" alt-text="Screenshot of GCP projects shown in Microsoft Defender for Cloud's overview dashboard." lightbox="media/quickstart-onboard-gcp/gcp-account-in-overview.png":::
28
33
29
34
::: zone pivot="env-settings"
@@ -32,7 +37,7 @@ To protect your GCP-based resources, you can connect a GCP project with either:
32
37
33
38
|Aspect|Details|
34
39
|----|:----|
35
-
| Release state: | Preview <br> The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to the Azure features that are in beta, preview, or otherwise not yet released into general availability. |
40
+
| Release state: | Preview <br> The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to the Azure features that are in beta, preview, or otherwise not yet released into general availability. |
36
41
|Pricing:|The **[Defender for SQL](defender-for-sql-introduction.md)** plan is billed at the same price as Azure resources.<br> The **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If a GCP VM instance doesn't have the Azure Arc agent deployed, you won't be charged for that machine. <br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for GCP at the same price as for Azure resources.|
37
42
|Required roles and permissions:|**Contributor** on the relevant Azure Subscription <br> **Owner** on the GCP organization or project|
38
43
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet, Other Gov)|
@@ -69,7 +74,7 @@ Follow the steps below to create your GCP cloud connector.
69
74
70
75
1. Toggle the plans you want to connect to **On**. By default all necessary prerequisites and components will be provisioned. (Optional) Learn how to [configure each plan](#optional-configure-selected-plans).
71
76
72
-
1. (**Containers only**) Ensure you have fulfilled the [network requirements](defender-for-containers-enable.md?tabs=defender-for-container-gcp#network-requirements) for the Defender for Containers plan.
77
+
1. (**Containers only**) Ensure you've fulfilled the [network requirements](defender-for-containers-enable.md?tabs=defender-for-container-gcp#network-requirements) for the Defender for Containers plan.
73
78
74
79
1. Select the **Next: Configure access**.
75
80
@@ -117,16 +122,16 @@ To have full visibility to Microsoft Defender for Servers security content, ensu
117
122
> <br><br> Microsoft Defender for Servers does not install the OS config agent to a VM that does not have it installed. However, Microsoft Defender for Servers will enable communication between the OS config agent and the OS config service if the agent is already installed but not communicating with the service.
118
123
> <br><br> This can change the OS config agent from `inactive` to `active` and will lead to additional costs.
119
124
120
-
-**Manual installation** - You can manually connect your VM instances to Azure Arc for servers. Instances in projects with Defender for Servers plan enabled that are not connected to Arc will be surfaced by the recommendation “GCP VM instances should be connected to Azure Arc”. Use the “Fix” option offered in this recommendation to install Azure Arc on the selected machines.
125
+
-**Manual installation** - You can manually connect your VM instances to Azure Arc for servers. Instances in projects with Defender for Servers plan enabled that aren't connected to Arc will be surfaced by the recommendation “GCP VM instances should be connected to Azure Arc”. Use the “Fix” option offered in this recommendation to install Azure Arc on the selected machines.
121
126
122
127
- Ensure you've fulfilled the [network requirements for Azure Arc](../azure-arc/servers/network-requirements.md?tabs=azure-cloud).
123
128
124
-
-Additional extensions should be enabled on the Arc-connected machines.
129
+
-Other extensions should be enabled on the Arc-connected machines.
125
130
- Microsoft Defender for Endpoint
126
131
- VA solution (TVM/ Qualys)
127
132
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA). Ensure the selected workspace has security solution installed.
128
133
129
-
The LA agent and AMA are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings with regard to the LA agent and AMA.
134
+
The LA agent and AMA are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings regarding the LA agent and AMA.
130
135
131
136
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
132
137
@@ -140,7 +145,7 @@ To have full visibility to Microsoft Defender for Servers security content, ensu
140
145
141
146
1. On the Select plans screen select **View configuration**.
142
147
143
-
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to click to configure the Servers plan.":::
148
+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to select to configure the Servers plan.":::
144
149
145
150
1. On the Auto provisioning screen, toggle the switches on or off depending on your need.
146
151
@@ -169,11 +174,11 @@ To have full visibility to Microsoft Defender for SQL security content, ensure y
169
174
> The Arc auto-provisioning process leverages the VM manager on your Google Cloud Platform, to enforce policies on the your VMs through the OS config agent. A VM with an [Active OS agent](https://cloud.google.com/compute/docs/manage-os#agent-state) will incur a cost according to GCP. Refer to [GCP's technical documentation](https://cloud.google.com/compute/docs/vm-manager#pricing) to see how this may affect your account.
170
175
> <br><br> Microsoft Defender for Servers does not install the OS config agent to a VM that does not have it installed. However, Microsoft Defender for Servers will enable communication between the OS config agent and the OS config service if the agent is already installed but not communicating with the service.
171
176
> <br><br> This can change the OS config agent from `inactive` to `active` and will lead to additional costs.
172
-
-Additional extensions should be enabled on the Arc-connected machines.
177
+
-Other extensions should be enabled on the Arc-connected machines.
173
178
- SQL servers on machines. Ensure the plan is enabled on your subscription.
174
179
- Log Analytics (LA) agent on Arc machines. Ensure the selected workspace has security solution installed.
175
180
176
-
The LA agent and SQL servers on machines plan are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings and may result in additional charges.
181
+
The LA agent and SQL servers on machines plan are currently configured in the subscription level, such that all the multicloud accounts and projects (from both AWS and GCP) under the same subscription will inherit the subscription settings and may result in extra charges.
177
182
178
183
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
179
184
@@ -188,7 +193,7 @@ To have full visibility to Microsoft Defender for SQL security content, ensure y
188
193
189
194
1. On the Select plans screen select **Configure**.
190
195
191
-
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to click to configure the Databases plan.":::
196
+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot showing where to select to configure the Databases plan.":::
192
197
193
198
1. On the Auto provisioning screen, toggle the switches on or off depending on your need.
194
199
@@ -206,7 +211,7 @@ To have full visibility to Microsoft Defender for SQL security content, ensure y
206
211
Microsoft Defender for Containers brings threat detection and advanced defenses to your GCP GKE Standard clusters. To get the full security value out of Defender for Containers and to fully protect GCP clusters, ensure you have the following requirements configured:
207
212
208
213
-**Kubernetes audit logs to Defender for Cloud** - Enabled by default. This configuration is available at a GCP project level only. This provides agentless collection of the audit log data through [GCP Cloud Logging](https://cloud.google.com/logging/) to the Microsoft Defender for Cloud backend for further analysis.
209
-
-**Azure Arc-enabled Kubernetes, the Defender extension, and the Azure Policy extension** - Enabled by default. You can install Azure Arc-enabled Kubernetes and its extensions on your GKE clusters in 3 different ways:
214
+
-**Azure Arc-enabled Kubernetes, the Defender extension, and the Azure Policy extension** - Enabled by default. You can install Azure Arc-enabled Kubernetes and its extensions on your GKE clusters in three different ways:
210
215
-**(Recommended)** Enable the Defender for Container auto-provisioning at the project level as explained in the instructions below.
211
216
- Defender for Cloud recommendations, for per cluster installation, which will appear on the Microsoft Defender for Cloud's Recommendations page. Learn how to [deploy the solution to specific clusters](defender-for-containers-enable.md?tabs=defender-for-container-gke#deploy-the-solution-to-specific-clusters).
212
217
- Manual installation for [Arc-enabled Kubernetes](../azure-arc/kubernetes/quickstart-connect-cluster.md) and [extensions](../azure-arc/kubernetes/extensions.md).
@@ -220,7 +225,7 @@ Microsoft Defender for Containers brings threat detection and advanced defenses
220
225
221
226
1. On the Select plans screen select **Configure**.
222
227
223
-
:::image type="content" source="media/quickstart-onboard-gcp/containers-configure.png" alt-text="Screenshot showing where to click to configure the Containers plan.":::
228
+
:::image type="content" source="media/quickstart-onboard-gcp/containers-configure.png" alt-text="Screenshot showing where to select to configure the Containers plan.":::
224
229
225
230
1. On the Auto provisioning screen, toggle the switches **On**.
226
231
@@ -277,9 +282,9 @@ For all the GCP projects in your organization, you must also:
277
282
278
283
1. Set up **GCP Security Command Center** using [these instructions from the GCP documentation](https://cloud.google.com/security-command-center/docs/quickstart-scc-setup).
279
284
1. Enable **Security Health Analytics** using [these instructions from the GCP documentation](https://cloud.google.com/security-command-center/docs/how-to-use-security-health-analytics).
280
-
1. Verify that there is data flowing to the Security Command Center.
285
+
1. Verify that there's data flowing to the Security Command Center.
281
286
282
-
The instructions for connecting your GCP environment for security configuration follow Google's recommendations for consuming security configuration recommendations. The integration leverages Google Security Command Center and will consume additional resources that might impact your billing.
287
+
The instructions for connecting your GCP environment for security configuration follow Google's recommendations for consuming security configuration recommendations. The integration applies Google Security Command Center and will consume other resources that might impact your billing.
283
288
284
289
When you first enable Security Health Analytics, it might take several hours for data to be available.
0 commit comments