Skip to content

Commit 839d841

Browse files
authored
Merge pull request #100582 from kapetanios55/patch-2
Removed the Unique ID part
2 parents 3b6fca0 + 6faba30 commit 839d841

File tree

1 file changed

+1
-17
lines changed

1 file changed

+1
-17
lines changed

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 1 addition & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -92,22 +92,6 @@ Follow the steps below to create your GCP cloud connector.
9292
|--|--|
9393
| CSPM service account reader role <br> Microsoft Defender for Cloud identity federation <br> CSPM identity pool <br>*Microsoft Defender for Servers* service account (when the servers plan is enabled) <br>*Azure-Arc for servers onboarding* service account (when the Arc for servers auto-provisioning is enabled) | Microsoft Defender Containers’ service account role <br> Microsoft Defender Data Collector service account role <br> Microsoft Defender for cloud identity pool |
9494

95-
(**Servers/SQL only**) When Arc auto-provisioning is enabled, copy the unique numeric ID presented at the end of the Cloud Shell script.
96-
97-
:::image type="content" source="media/quickstart-onboard-gcp/powershell-unique-id.png" alt-text="Screenshot showing the unique numeric ID to be copied." lightbox="media/quickstart-onboard-gcp/powershell-unique-id-expanded.png":::
98-
99-
To locate the unique numeric ID in the GCP portal, navigate to **IAM & Admin** > **Service Accounts**, locate `Azure-Arc for servers onboarding` in the Name column, and copy the unique numeric ID number (OAuth 2 Client ID).
100-
101-
1. Navigate back to the Microsoft Defender for Cloud portal.
102-
103-
1. (Optional) If you changed any of the names of any of the resources, update the names in the appropriate fields.
104-
105-
1. Select the **Next: Review and generate >**.
106-
107-
1. Ensure the information presented is correct.
108-
109-
1. Select the **Create**.
110-
11195
After creating a connector, a scan will start on your GCP environment. New recommendations will appear in Defender for Cloud after up to 6 hours. If you enabled auto-provisioning, Azure Arc and any enabled extensions will install automatically for each new resource detected.
11296

11397
## (Optional) Configure selected plans
@@ -382,4 +366,4 @@ Connecting your GCP project is part of the multicloud experience available in Mi
382366

383367
- [Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
384368
- [Google Cloud resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy) - Learn about the Google Cloud resource hierarchy in Google's online docs
385-
- [Troubleshoot your multicloud connectors](troubleshooting-guide.md#troubleshooting-the-native-multicloud-connector)
369+
- [Troubleshoot your multicloud connectors](troubleshooting-guide.md#troubleshooting-the-native-multicloud-connector)

0 commit comments

Comments
 (0)