Skip to content

Commit a5e7ccb

Browse files
Added Part 3
1 parent f1ad7e0 commit a5e7ccb

File tree

2 files changed

+20
-20
lines changed

2 files changed

+20
-20
lines changed

articles/defender-for-cloud/management-groups-roles.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Organize subscriptions into management groups and assign roles to users
3-
description: Learn how to organize your Azure subscriptions into management groups in Microsoft Defender for Cloud and assign roles to users in your organization
3+
description: Learn how to organize your Azure subscriptions into management groups in Microsoft Defender for Cloud and assign roles to users in your organization.
44
ms.topic: how-to
5-
ms.date: 01/24/2023
5+
ms.date: 03/12/2024
66
ms.custom: subject-rbac-steps
77
---
88

@@ -22,7 +22,7 @@ Each Microsoft Entra tenant is given a single top-level management group called
2222

2323
The root management group is created automatically when you do any of the following actions:
2424

25-
- In the [Azure portal](https://portal.azure.com), select **Management Groups** .
25+
- In the [Azure portal](https://portal.azure.com), select **Management Groups**.
2626
- Create a management group with an API call.
2727
- Create a management group with PowerShell. For PowerShell instructions, see [Create management groups for resource and organization management](../governance/management-groups/create-management-group-portal.md).
2828

@@ -38,7 +38,7 @@ For a detailed overview of management groups, see the [Organize your resources w
3838

3939
1. To create a management group, select **Create**, enter the relevant details, and select **Submit**.
4040

41-
:::image type="content" source="media/management-groups-roles/add-management-group.png" alt-text="Adding a management group to Azure.":::
41+
:::image type="content" source="media/management-groups-roles/add-management-group.png" alt-text="Adding a management group to Azure." lightbox="media/management-groups-roles/add-management-group.png":::
4242

4343
- The **Management Group ID** is the directory unique identifier that is used to submit commands on this management group. This identifier isn't editable after creation as it is used throughout the Azure system to identify this group.
4444

@@ -58,10 +58,10 @@ You can add subscriptions to the management group that you created.
5858

5959
1. From the subscriptions page, select **Add**, then select your subscriptions and select **Save**. Repeat until you've added all the subscriptions in the scope.
6060

61-
:::image type="content" source="./media/management-groups-roles/management-group-add-subscriptions.png" alt-text="Adding a subscription to a management group.":::
61+
:::image type="content" source="./media/management-groups-roles/management-group-add-subscriptions.png" alt-text="Adding a subscription to a management group." lightbox="media/management-groups-roles/management-group-add-subscriptions.png":::
6262

6363
> [!IMPORTANT]
64-
> Management groups can contain both subscriptions and child management groups. When you assign a user an Azure role to the parent management group, the access is inherited by the child management group's subscriptions. Policies set at the parent management group are also inherited by the children.
64+
> Management groups can contain both subscriptions and child management groups. When you assign a user an Azure role to the parent management group, the access is inherited by the child management group's subscriptions. Policies set at the parent management group are also inherited by the children.
6565
6666
## Assign Azure roles to other users
6767

@@ -75,11 +75,11 @@ You can add subscriptions to the management group that you created.
7575

7676
1. Select **Access control (IAM)**, open the **Role assignments** tab and select **Add** > **Add role assignment**.
7777

78-
:::image type="content" source="./media/management-groups-roles/add-user.png" alt-text="Adding a user to a management group.":::
78+
:::image type="content" source="./media/management-groups-roles/add-user.png" alt-text="Adding a user to a management group." lightbox="media/management-groups-roles/add-user.png":::
7979

8080
1. From the **Add role assignment** page, select the relevant role.
8181

82-
:::image type="content" source="./media/management-groups-roles/add-role-assignment-page.png" alt-text="Add role assignment page.":::
82+
:::image type="content" source="./media/management-groups-roles/add-role-assignment-page.png" alt-text="Add role assignment page." lightbox="media/management-groups-roles/add-role-assignment-page.png":::
8383

8484
1. From the **Members** tab, select **+ Select members** and assign the role to the relevant members.
8585

@@ -115,7 +115,7 @@ You can add subscriptions to the management group that you created.
115115
116116
## Remove elevated access
117117
118-
Once the Azure roles have been assigned to the users, the tenant administrator should remove itself from the user access administrator role.
118+
Once the Azure roles are assigned to the users, the tenant administrator should remove itself from the user access administrator role.
119119
120120
1. Sign in to the [Azure portal](https://portal.azure.com).
121121

articles/defender-for-cloud/quickstart-onboard-devops.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
22
title: Connect your Azure DevOps organizations
33
description: Learn how to connect your Azure DevOps environment to Defender for Cloud.
4-
ms.date: 01/24/2023
4+
ms.date: 03/12/2024
55
ms.topic: quickstart
66
ms.custom: ignite-2023
77
---
88

99
# Quickstart: Connect your Azure DevOps Environment to Microsoft Defender for Cloud
1010

11-
In this quickstart, you will connect your Azure DevOps organizations on the **Environment settings** page in Microsoft Defender for Cloud. This page provides a simple onboarding experience to autodiscover your Azure DevOps repositories.
11+
This quickstart shows you how to connect your Azure DevOps organizations on the **Environment settings** page in Microsoft Defender for Cloud. This page provides a simple onboarding experience to autodiscover your Azure DevOps repositories.
1212

1313
By connecting your Azure DevOps organizations to Defender for Cloud, you extend the security capabilities of Defender for Cloud to your Azure DevOps resources. These features include:
1414

1515
- **Foundational Cloud Security Posture Management (CSPM) features**: You can assess your Azure DevOps security posture through Azure DevOps-specific security recommendations. You can also learn about all the [recommendations for DevOps](recommendations-reference.md) resources.
1616

17-
- **Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your Azure DevOps repositories allows you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md)
17+
- **Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your Azure DevOps repositories allows you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md).
1818

1919
API calls that Defender for Cloud performs count against the [Azure DevOps global consumption limit](/azure/devops/integrate/concepts/rate-limits). For more information, see the [common questions about DevOps security in Defender for Cloud](faq-defender-for-devops.yml).
2020

@@ -30,7 +30,7 @@ To complete this quickstart, you need:
3030
|--|--|
3131
| Release state: | General Availability. |
3232
| Pricing: | For pricing, see the Defender for Cloud [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h#pricing). |
33-
| Required permissions: | **Account Administrator** with permissions to sign in to the Azure portal. <br> **Contributor** to create a connector on the Azure subscription. <br> **Project Collection Administrator** on the Azure DevOps Organization. <br> **Basic or Basic + Test Plans Access Level** on the Azure DevOps Organization. <br> _Please ensure you have BOTH Project Collection Administrator permissions and Basic Access Level for all Azure DevOps organizations you wish to onboard. Stakeholder Access Level is not sufficient._ <br> **Third-party application access via OAuth**, which must be set to `On` on the Azure DevOps Organization. [Learn more about OAuth and how to enable it in your organizations](/azure/devops/organizations/accounts/change-application-access-policies).|
33+
| Required permissions: | **Account Administrator** with permissions to sign in to the Azure portal. <br> **Contributor** to create a connector on the Azure subscription. <br> **Project Collection Administrator** on the Azure DevOps Organization. <br> **Basic or Basic + Test Plans Access Level** on the Azure DevOps Organization. <br> _Make sure you have BOTH Project Collection Administrator permissions and Basic Access Level for all Azure DevOps organizations you wish to onboard. Stakeholder Access Level is not sufficient._ <br> **Third-party application access via OAuth**, which must be set to `On` on the Azure DevOps Organization. [Learn more about OAuth and how to enable it in your organizations](/azure/devops/organizations/accounts/change-application-access-policies).|
3434
| Regions and availability: | Refer to the [support and prerequisites](devops-support.md) section for region support and feature availability. |
3535
| Clouds: | :::image type="icon" source="media/quickstart-onboard-github/check-yes.png" border="false"::: Commercial <br> :::image type="icon" source="media/quickstart-onboard-github/x-no.png" border="false"::: National (Azure Government, Microsoft Azure operated by 21Vianet) |
3636

@@ -40,7 +40,7 @@ To complete this quickstart, you need:
4040
## Connect your Azure DevOps organization
4141

4242
> [!NOTE]
43-
> After connecting Azure DevOps to Defender for Cloud, the Microsoft Defender for DevOps Container Mapping extension will be automatically shared and installed on all connected Azure DevOps organizations. This extension allows Defender for Cloud to extract metadata from pipelines, such as a container's digest ID and name. This metadata is used to connect DevOps entities with their related cloud resources. [Learn more about container mapping.](container-image-mapping.md)
43+
> After connecting Azure DevOps to Defender for Cloud, the Microsoft Defender for DevOps Container Mapping extension will be automatically shared and installed on all connected Azure DevOps organizations. This extension allows Defender for Cloud to extract metadata from pipelines, such as a container's digest ID and name. This metadata is used to connect DevOps entities with their related cloud resources. [Learn more about container mapping](container-image-mapping.md).
4444
4545
To connect your Azure DevOps organization to Defender for Cloud by using a native connector:
4646

@@ -64,28 +64,28 @@ To connect your Azure DevOps organization to Defender for Cloud by using a nativ
6464

6565
1. Select **Next: Configure access**.
6666

67-
1. Select **Authorize**. Ensure you are authorizing the correct Azure Tenant using the drop-down menu in [Azure DevOps](https://aex.dev.azure.com/me?mkt) and by verifying you are in the correct Azure Tenant in Defender for Cloud.
67+
1. Select **Authorize**. Ensure you're authorizing the correct Azure Tenant using the drop-down menu in [Azure DevOps](https://aex.dev.azure.com/me?mkt) and by verifying you're in the correct Azure Tenant in Defender for Cloud.
6868

6969
1. In the popup dialog, read the list of permission requests, and then select **Accept**.
7070

71-
:::image type="content" source="media/quickstart-onboard-ado/accept.png" alt-text="Screenshot that shows the button for accepting permissions.":::
71+
:::image type="content" source="media/quickstart-onboard-ado/accept.png" alt-text="Screenshot that shows the button for accepting permissions." lightbox="media/quickstart-onboard-ado/accept.png":::
7272

7373
1. For Organizations, select one of the following options:
7474

75-
- Select **all existing organizations** to auto-discover all projects and repositories in organizations you are currently a Project Collection Administrator in.
76-
- Select **all existing and future organizations** to auto-discover all projects and repositories in all current and future organizations you are a Project Collection Administrator in.
75+
- Select **all existing organizations** to auto-discover all projects and repositories in organizations you're currently a Project Collection Administrator in.
76+
- Select **all existing and future organizations** to auto-discover all projects and repositories in all current and future organizations you're a Project Collection Administrator in.
7777

7878
> [!NOTE]
7979
> **Third-party application access via OAuth** must be set to `On` on for each Azure DevOps Organization. [Learn more about OAuth and how to enable it in your organizations](/azure/devops/organizations/accounts/change-application-access-policies).
8080
81-
Since Azure DevOps repositories are onboarded at no additional cost, autodiscover is applied across the organization to ensure Defender for Cloud can comprehensively assess the security posture and respond to security threats across your entire DevOps ecosystem. Organizations can later be manually added and removed through **Microsoft Defender for Cloud** > **Environment settings**.
81+
Since Azure DevOps repositories are onboarded at no extra cost, autodiscover is applied across the organization to ensure Defender for Cloud can comprehensively assess the security posture and respond to security threats across your entire DevOps ecosystem. Organizations can later be manually added and removed through **Microsoft Defender for Cloud** > **Environment settings**.
8282

8383
1. Select **Next: Review and generate**.
8484

8585
1. Review the information, and then select **Create**.
8686

8787
> [!NOTE]
88-
> To ensure proper functionality of advanced DevOps posture capabilities in Defender for Cloud, only one instance of an Azure DevOps organization can be onboarded to the Azure Tenant you are creating a connector in.
88+
> To ensure proper functionality of advanced DevOps posture capabilities in Defender for Cloud, only one instance of an Azure DevOps organization can be onboarded to the Azure Tenant you're creating a connector in.
8989
9090
The **DevOps security** blade shows your onboarded repositories grouped by Organization. The **Recommendations** blade shows all security assessments related to Azure DevOps repositories.
9191

0 commit comments

Comments
 (0)