Skip to content

Commit 895c153

Browse files
authored
Merge pull request #264426 from dcurwin/remove-classic-connectors-jan28-2024
Remove classic connectors page
2 parents 5ef5ef0 + 6ec0b7d commit 895c153

File tree

6 files changed

+48
-386
lines changed

6 files changed

+48
-386
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -915,6 +915,11 @@
915915
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
916916
"redirect_document_id": true
917917
},
918+
{
919+
"source_path_from_root": "/articles/defender-for-cloud/how-to-use-the-classic-connector.md",
920+
"redirect_url": "/azure/defender-for-cloud/multicloud",
921+
"redirect_document_id": false
922+
},
918923
{
919924
"source_path_from_root": "/articles/defender-for-cloud/how-to-migrate-to-built-in.md",
920925
"redirect_url": "/azure/defender-for-cloud/how-to-transition-to-built-in",

articles/defender-for-cloud/TOC.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -428,10 +428,6 @@
428428
- name: Automate responses to alerts
429429
displayName: workflow
430430
href: workflow-automation.md
431-
- name: Manage the classic connectors
432-
displayName: classic, connector, AWS, GCP
433-
href: how-to-use-the-classic-connector.md
434-
435431

436432
- name: Protect your workloads
437433
items:

articles/defender-for-cloud/concept-aws-connector.md

Lines changed: 43 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -12,37 +12,32 @@ To protect your AWS-based resources, you must [connect your AWS account](quickst
1212
- [**Cloud Security Posture Management (CSPM)**](overview-page.md) assesses your AWS resources according to AWS-specific security recommendations and reflects your security posture in your secure score. The [asset inventory](asset-inventory.md) gives you one place to see all of your protected AWS resources. The [regulatory compliance dashboard](regulatory-compliance-dashboard.md) shows your compliance with built-in standards specific to AWS, including AWS CIS, AWS PCI DSS, and AWS Foundational Security Best Practices.
1313

1414
- [**Microsoft Defender for Servers**](defender-for-servers-introduction.md) brings threat detection and advanced defenses to [supported Windows and Linux EC2 instances](supported-machines-endpoint-solutions-clouds-servers.md?tabs=tab/features-multicloud).
15-
15+
1616
- [**Microsoft Defender for Containers**](defender-for-containers-introduction.md) brings threat detection and advanced defenses to [supported Amazon EKS clusters](supported-machines-endpoint-solutions-clouds-containers.md).
1717

1818
- [**Microsoft Defender for SQL**](defender-for-sql-introduction.md) brings threat detection and advanced defenses to your SQL Servers running on AWS EC2, AWS RDS Custom for SQL Server.
1919

20-
The retired **Classic cloud connector** - Requires you to configure your AWS account to create a user that Defender for Cloud can use to connect to your AWS environment. The classic connector is only available to customers who have previously connected AWS accounts with it.
21-
22-
> [!NOTE]
23-
> If you are connecting an AWS account that was previously connected with the classic connector, you must [remove them](how-to-use-the-classic-connector.md#remove-classic-aws-connectors) first. Using an AWS account that is connected by both the classic and native connectors can produce duplicate recommendations.
24-
2520
## AWS authentication process
2621

2722
Federated authentication is used between Microsoft Defender for Cloud and AWS. All of the resources related to the authentication are created as a part of the CloudFormation template deployment, including:
2823

29-
- An identity provider (OpenID connect)
24+
- An identity provider (OpenID connect)
3025
- Identity and Access Management (IAM) roles with a federated principal (connected to the identity providers).
3126

3227
The architecture of the authentication process across clouds is as follows:
3328

3429
:::image type="content" source="media/quickstart-onboard-aws/architecture-authentication-across-clouds.png" alt-text="Diagram showing architecture of authentication process across clouds." lightbox="media/quickstart-onboard-aws/architecture-authentication-across-clouds.png":::
3530

36-
1. Microsoft Defender for Cloud CSPM service acquires a Microsoft Entra token with a validity life time of 1 hour that is signed by the Microsoft Entra ID using the RS256 algorithm.
31+
1. Microsoft Defender for Cloud CSPM service acquires a Microsoft Entra token with a validity life time of 1 hour that is signed by the Microsoft Entra ID using the RS256 algorithm.
3732

3833
1. The Microsoft Entra token is exchanged with AWS short living credentials and Defender for Cloud's CSPM service assumes the CSPM IAM role (assumed with web identity).
3934

4035
1. Since the principal of the role is a federated identity as defined in a trust relationship policy, the AWS identity provider validates the Microsoft Entra token against the Microsoft Entra ID through a process that includes:
4136
- audience validation
42-
- token digital signature validation
37+
- token digital signature validation
4338
- certificate thumbprint
4439

45-
1. The Microsoft Defender for Cloud CSPM role is assumed only after the validation conditions defined at the trust relationship have been met. The conditions defined for the role level are used for validation within AWS and allows only the Microsoft Defender for Cloud CSPM application (validated audience) access to the specific role (and not any other Microsoft token).
40+
1. The Microsoft Defender for Cloud CSPM role is assumed only after the validation conditions defined at the trust relationship have been met. The conditions defined for the role level are used for validation within AWS and allows only the Microsoft Defender for Cloud CSPM application (validated audience) access to the specific role (and not any other Microsoft token).
4641

4742
1. After the Microsoft Entra token is validated by the AWS identity provider, the AWS STS exchanges the token with AWS short-living credentials which the CSPM service uses to scan the AWS account.
4843

@@ -63,56 +58,56 @@ Each plan has its own requirements for the native connector.
6358
- An active AWS account, with EC2 instances running SQL server or RDS Custom for SQL Server.
6459

6560
- Azure Arc for servers installed on your EC2 instances/RDS Custom for SQL Server.
66-
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
61+
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
62+
63+
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If you already have the SSM agent preinstalled, the AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
6764

68-
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If you already have the SSM agent preinstalled, the AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
69-
70-
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
65+
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
66+
67+
> [!NOTE]
68+
> To enable the Azure Arc auto-provisioning, you'll need **Owner** permission on the relevant Azure subscription.
7169
72-
> [!NOTE]
73-
> To enable the Azure Arc auto-provisioning, you'll need **Owner** permission on the relevant Azure subscription.
74-
7570
- Other extensions should be enabled on the Arc-connected machines:
76-
- Microsoft Defender for Endpoint
77-
- VA solution (TVM/Qualys)
78-
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
71+
- Microsoft Defender for Endpoint
72+
- VA solution (TVM/Qualys)
73+
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
74+
75+
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
7976

80-
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
81-
82-
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
77+
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
8378

8479
### Defender for Servers plan
85-
80+
8681
- Microsoft Defender for Servers enabled on your subscription. Learn how to [enable plans](enable-all-plans.md).
87-
82+
8883
- An active AWS account, with EC2 instances.
89-
90-
- Azure Arc for servers installed on your EC2 instances.
91-
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
92-
93-
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If that is the case, their AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
94-
95-
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
96-
97-
- [Install SSM Agent for a hybrid environment (Linux)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-linux.html)
98-
99-
> [!NOTE]
100-
> To enable the Azure Arc auto-provisioning, you'll need an **Owner** permission on the relevant Azure subscription.
101-
102-
- If you want to manually install Azure Arc on your existing and future EC2 instances, use the [EC2 instances should be connected to Azure Arc](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/231dee23-84db-44d2-bd9d-c32fbcfb42a3) recommendation to identify instances that don't have Azure Arc installed.
103-
84+
85+
- Azure Arc for servers installed on your EC2 instances.
86+
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
87+
88+
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If that is the case, their AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
89+
90+
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
91+
92+
- [Install SSM Agent for a hybrid environment (Linux)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-linux.html)
93+
94+
> [!NOTE]
95+
> To enable the Azure Arc auto-provisioning, you'll need an **Owner** permission on the relevant Azure subscription.
96+
97+
- If you want to manually install Azure Arc on your existing and future EC2 instances, use the [EC2 instances should be connected to Azure Arc](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/231dee23-84db-44d2-bd9d-c32fbcfb42a3) recommendation to identify instances that don't have Azure Arc installed.
98+
10499
- Other extensions should be enabled on the Arc-connected machines:
105-
- Microsoft Defender for Endpoint
106-
- VA solution (TVM/Qualys)
107-
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
100+
- Microsoft Defender for Endpoint
101+
- VA solution (TVM/Qualys)
102+
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
108103

109-
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
104+
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
110105

111-
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
106+
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
112107

113-
> [!NOTE]
114-
> Defender for Servers assigns tags to your AWS resources to manage the auto-provisioning process. You must have these tags properly assigned to your resources so that Defender for Cloud can manage your resources:
115-
**AccountId**, **Cloud**, **InstanceId**, **MDFCSecurityConnector**
108+
> [!NOTE]
109+
> Defender for Servers assigns tags to your AWS resources to manage the auto-provisioning process. You must have these tags properly assigned to your resources so that Defender for Cloud can manage your resources:
110+
**AccountId**, **Cloud**, **InstanceId**, **MDFCSecurityConnector**
116111

117112
## Learn more
118113

@@ -126,4 +121,3 @@ You can check out the following blogs:
126121
Connecting your AWS account is part of the multicloud experience available in Microsoft Defender for Cloud.
127122

128123
- [Protect all of your resources with Defender for Cloud](enable-all-plans.md)
129-

0 commit comments

Comments
 (0)