Skip to content

Commit 5d54235

Browse files
Merge pull request #281066 from ElazarK/WI284660-UUF-aws-and-gcp-onboard-page-fix
updated permissions
2 parents 7affe18 + 7ad3df1 commit 5d54235

File tree

2 files changed

+8
-4
lines changed

2 files changed

+8
-4
lines changed

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Connect your AWS account
33
description: Defend your AWS resources with Microsoft Defender for Cloud, a guide to set up and configure Defender for Cloud to protect your workloads in AWS.
44
ms.topic: install-set-up-deploy
5-
ms.date: 07/01/2024
5+
ms.date: 07/17/2024
66
---
77

88
# Connect AWS accounts to Microsoft Defender for Cloud
@@ -52,7 +52,9 @@ To complete the procedures in this article, you need:
5252

5353
- Access to an AWS account.
5454

55-
- **Subscription owner** permission for the relevant Azure subscription, and **Administrator** permission on the AWS account.
55+
- Contributor level permission for the relevant Azure subscription.
56+
57+
- An Entra ID account that has an Application Administrator or Cloud Application Administrator directory role for your tenant (or equivalent administrator rights to create app registrations).
5658

5759
> [!NOTE]
5860
> The AWS connector is not available on the national government clouds (Azure Government, Microsoft Azure operated by 21Vianet).

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Connect your GCP project
33
description: Defend your GCP resources by using Microsoft Defender for Cloud. Protect your workloads and enhance your cloud security with our comprehensive solution.
44
ms.topic: install-set-up-deploy
5-
ms.date: 07/01/2024
5+
ms.date: 07/17/2024
66
---
77

88
# Connect your GCP project to Microsoft Defender for Cloud
@@ -45,7 +45,9 @@ To complete the procedures in this article, you need:
4545

4646
- Access to a GCP project.
4747

48-
- **Subscription owner** permission on the relevant Azure subscription, and **Owner** permission on the GCP organization or project.
48+
- Contributor level permission for the relevant Azure subscription.
49+
50+
- An Entra ID account that has an Application Administrator or Cloud Application Administrator directory role for your tenant (or equivalent administrator rights to create app registrations).
4951

5052
You can learn more about Defender for Cloud pricing on [the pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
5153

0 commit comments

Comments
 (0)