You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/management-groups-roles.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
---
2
2
title: Organize subscriptions into management groups and assign roles to users
3
-
description: Learn how to organize your Azure subscriptions into management groups in Microsoft Defender for Cloud and assign roles to users in your organization
3
+
description: Learn how to organize your Azure subscriptions into management groups in Microsoft Defender for Cloud and assign roles to users in your organization.
4
4
ms.topic: how-to
5
-
ms.date: 01/24/2023
5
+
ms.date: 03/12/2024
6
6
ms.custom: subject-rbac-steps
7
7
---
8
8
@@ -22,7 +22,7 @@ Each Microsoft Entra tenant is given a single top-level management group called
22
22
23
23
The root management group is created automatically when you do any of the following actions:
24
24
25
-
- In the [Azure portal](https://portal.azure.com), select **Management Groups**.
25
+
- In the [Azure portal](https://portal.azure.com), select **Management Groups**.
26
26
- Create a management group with an API call.
27
27
- Create a management group with PowerShell. For PowerShell instructions, see [Create management groups for resource and organization management](../governance/management-groups/create-management-group-portal.md).
28
28
@@ -38,7 +38,7 @@ For a detailed overview of management groups, see the [Organize your resources w
38
38
39
39
1. To create a management group, select **Create**, enter the relevant details, and select **Submit**.
40
40
41
-
:::image type="content" source="media/management-groups-roles/add-management-group.png" alt-text="Adding a management group to Azure.":::
41
+
:::image type="content" source="media/management-groups-roles/add-management-group.png" alt-text="Adding a management group to Azure." lightbox="media/management-groups-roles/add-management-group.png":::
42
42
43
43
- The **Management Group ID** is the directory unique identifier that is used to submit commands on this management group. This identifier isn't editable after creation as it is used throughout the Azure system to identify this group.
44
44
@@ -58,10 +58,10 @@ You can add subscriptions to the management group that you created.
58
58
59
59
1. From the subscriptions page, select **Add**, then select your subscriptions and select **Save**. Repeat until you've added all the subscriptions in the scope.
60
60
61
-
:::image type="content" source="./media/management-groups-roles/management-group-add-subscriptions.png" alt-text="Adding a subscription to a management group.":::
61
+
:::image type="content" source="./media/management-groups-roles/management-group-add-subscriptions.png" alt-text="Adding a subscription to a management group." lightbox="media/management-groups-roles/management-group-add-subscriptions.png":::
62
62
63
63
> [!IMPORTANT]
64
-
> Management groups can contain both subscriptions and child management groups. When you assign a user an Azure role to the parent management group, the access is inherited by the child management group's subscriptions. Policies set at the parent management group are also inherited by the children.
64
+
> Management groups can contain both subscriptions and child management groups. When you assign a user an Azure role to the parent management group, the access is inherited by the child management group's subscriptions. Policies set at the parent management group are also inherited by the children.
65
65
66
66
## Assign Azure roles to other users
67
67
@@ -75,11 +75,11 @@ You can add subscriptions to the management group that you created.
75
75
76
76
1. Select **Access control (IAM)**, open the **Role assignments** tab and select **Add** > **Add role assignment**.
77
77
78
-
:::image type="content" source="./media/management-groups-roles/add-user.png" alt-text="Adding a user to a management group.":::
78
+
:::image type="content" source="./media/management-groups-roles/add-user.png" alt-text="Adding a user to a management group." lightbox="media/management-groups-roles/add-user.png":::
79
79
80
80
1. From the **Add role assignment** page, select the relevant role.
81
81
82
-
:::image type="content" source="./media/management-groups-roles/add-role-assignment-page.png" alt-text="Add role assignment page.":::
82
+
:::image type="content" source="./media/management-groups-roles/add-role-assignment-page.png" alt-text="Add role assignment page." lightbox="media/management-groups-roles/add-role-assignment-page.png":::
83
83
84
84
1. From the **Members** tab, select **+ Select members** and assign the role to the relevant members.
85
85
@@ -115,7 +115,7 @@ You can add subscriptions to the management group that you created.
115
115
116
116
## Remove elevated access
117
117
118
-
Once the Azure roles have been assigned to the users, the tenant administrator should remove itself from the user access administrator role.
118
+
Once the Azure roles are assigned to the users, the tenant administrator should remove itself from the user access administrator role.
119
119
120
120
1. Sign in to the [Azure portal](https://portal.azure.com).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-devops.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,20 @@
1
1
---
2
2
title: Connect your Azure DevOps organizations
3
3
description: Learn how to connect your Azure DevOps environment to Defender for Cloud.
4
-
ms.date: 01/24/2023
4
+
ms.date: 03/12/2024
5
5
ms.topic: quickstart
6
6
ms.custom: ignite-2023
7
7
---
8
8
9
9
# Quickstart: Connect your Azure DevOps Environment to Microsoft Defender for Cloud
10
10
11
-
In this quickstart, you will connect your Azure DevOps organizations on the **Environment settings** page in Microsoft Defender for Cloud. This page provides a simple onboarding experience to autodiscover your Azure DevOps repositories.
11
+
This quickstart shows you how to connect your Azure DevOps organizations on the **Environment settings** page in Microsoft Defender for Cloud. This page provides a simple onboarding experience to autodiscover your Azure DevOps repositories.
12
12
13
13
By connecting your Azure DevOps organizations to Defender for Cloud, you extend the security capabilities of Defender for Cloud to your Azure DevOps resources. These features include:
14
14
15
15
-**Foundational Cloud Security Posture Management (CSPM) features**: You can assess your Azure DevOps security posture through Azure DevOps-specific security recommendations. You can also learn about all the [recommendations for DevOps](recommendations-reference.md) resources.
16
16
17
-
-**Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your Azure DevOps repositories allows you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md)
17
+
-**Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your Azure DevOps repositories allows you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md).
18
18
19
19
API calls that Defender for Cloud performs count against the [Azure DevOps global consumption limit](/azure/devops/integrate/concepts/rate-limits). For more information, see the [common questions about DevOps security in Defender for Cloud](faq-defender-for-devops.yml).
20
20
@@ -30,7 +30,7 @@ To complete this quickstart, you need:
30
30
|--|--|
31
31
| Release state: | General Availability. |
32
32
| Pricing: | For pricing, see the Defender for Cloud [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h#pricing). |
33
-
| Required permissions: |**Account Administrator** with permissions to sign in to the Azure portal. <br> **Contributor** to create a connector on the Azure subscription. <br> **Project Collection Administrator** on the Azure DevOps Organization. <br> **Basic or Basic + Test Plans Access Level** on the Azure DevOps Organization. <br> _Please ensure you have BOTH Project Collection Administrator permissions and Basic Access Level for all Azure DevOps organizations you wish to onboard. Stakeholder Access Level is not sufficient._ <br> **Third-party application access via OAuth**, which must be set to `On` on the Azure DevOps Organization. [Learn more about OAuth and how to enable it in your organizations](/azure/devops/organizations/accounts/change-application-access-policies).|
33
+
| Required permissions: |**Account Administrator** with permissions to sign in to the Azure portal. <br> **Contributor** to create a connector on the Azure subscription. <br> **Project Collection Administrator** on the Azure DevOps Organization. <br> **Basic or Basic + Test Plans Access Level** on the Azure DevOps Organization. <br> _Make sure you have BOTH Project Collection Administrator permissions and Basic Access Level for all Azure DevOps organizations you wish to onboard. Stakeholder Access Level is not sufficient._ <br> **Third-party application access via OAuth**, which must be set to `On` on the Azure DevOps Organization. [Learn more about OAuth and how to enable it in your organizations](/azure/devops/organizations/accounts/change-application-access-policies).|
34
34
| Regions and availability: | Refer to the [support and prerequisites](devops-support.md) section for region support and feature availability. |
35
35
| Clouds: | :::image type="icon" source="media/quickstart-onboard-github/check-yes.png" border="false"::: Commercial <br> :::image type="icon" source="media/quickstart-onboard-github/x-no.png" border="false"::: National (Azure Government, Microsoft Azure operated by 21Vianet) |
36
36
@@ -40,7 +40,7 @@ To complete this quickstart, you need:
40
40
## Connect your Azure DevOps organization
41
41
42
42
> [!NOTE]
43
-
> After connecting Azure DevOps to Defender for Cloud, the Microsoft Defender for DevOps Container Mapping extension will be automatically shared and installed on all connected Azure DevOps organizations. This extension allows Defender for Cloud to extract metadata from pipelines, such as a container's digest ID and name. This metadata is used to connect DevOps entities with their related cloud resources. [Learn more about container mapping.](container-image-mapping.md)
43
+
> After connecting Azure DevOps to Defender for Cloud, the Microsoft Defender for DevOps Container Mapping extension will be automatically shared and installed on all connected Azure DevOps organizations. This extension allows Defender for Cloud to extract metadata from pipelines, such as a container's digest ID and name. This metadata is used to connect DevOps entities with their related cloud resources. [Learn more about container mapping](container-image-mapping.md).
44
44
45
45
To connect your Azure DevOps organization to Defender for Cloud by using a native connector:
46
46
@@ -64,28 +64,28 @@ To connect your Azure DevOps organization to Defender for Cloud by using a nativ
64
64
65
65
1. Select **Next: Configure access**.
66
66
67
-
1. Select **Authorize**. Ensure you are authorizing the correct Azure Tenant using the drop-down menu in [Azure DevOps](https://aex.dev.azure.com/me?mkt) and by verifying you are in the correct Azure Tenant in Defender for Cloud.
67
+
1. Select **Authorize**. Ensure you're authorizing the correct Azure Tenant using the drop-down menu in [Azure DevOps](https://aex.dev.azure.com/me?mkt) and by verifying you're in the correct Azure Tenant in Defender for Cloud.
68
68
69
69
1. In the popup dialog, read the list of permission requests, and then select **Accept**.
70
70
71
-
:::image type="content" source="media/quickstart-onboard-ado/accept.png" alt-text="Screenshot that shows the button for accepting permissions.":::
71
+
:::image type="content" source="media/quickstart-onboard-ado/accept.png" alt-text="Screenshot that shows the button for accepting permissions." lightbox="media/quickstart-onboard-ado/accept.png":::
72
72
73
73
1. For Organizations, select one of the following options:
74
74
75
-
- Select **all existing organizations** to auto-discover all projects and repositories in organizations you are currently a Project Collection Administrator in.
76
-
- Select **all existing and future organizations** to auto-discover all projects and repositories in all current and future organizations you are a Project Collection Administrator in.
75
+
- Select **all existing organizations** to auto-discover all projects and repositories in organizations you're currently a Project Collection Administrator in.
76
+
- Select **all existing and future organizations** to auto-discover all projects and repositories in all current and future organizations you're a Project Collection Administrator in.
77
77
78
78
> [!NOTE]
79
79
> **Third-party application access via OAuth** must be set to `On` on for each Azure DevOps Organization. [Learn more about OAuth and how to enable it in your organizations](/azure/devops/organizations/accounts/change-application-access-policies).
80
80
81
-
Since Azure DevOps repositories are onboarded at no additional cost, autodiscover is applied across the organization to ensure Defender for Cloud can comprehensively assess the security posture and respond to security threats across your entire DevOps ecosystem. Organizations can later be manually added and removed through **Microsoft Defender for Cloud** > **Environment settings**.
81
+
Since Azure DevOps repositories are onboarded at no extra cost, autodiscover is applied across the organization to ensure Defender for Cloud can comprehensively assess the security posture and respond to security threats across your entire DevOps ecosystem. Organizations can later be manually added and removed through **Microsoft Defender for Cloud** > **Environment settings**.
82
82
83
83
1. Select **Next: Review and generate**.
84
84
85
85
1. Review the information, and then select **Create**.
86
86
87
87
> [!NOTE]
88
-
> To ensure proper functionality of advanced DevOps posture capabilities in Defender for Cloud, only one instance of an Azure DevOps organization can be onboarded to the Azure Tenant you are creating a connector in.
88
+
> To ensure proper functionality of advanced DevOps posture capabilities in Defender for Cloud, only one instance of an Azure DevOps organization can be onboarded to the Azure Tenant you're creating a connector in.
89
89
90
90
The **DevOps security** blade shows your onboarded repositories grouped by Organization. The **Recommendations** blade shows all security assessments related to Azure DevOps repositories.
0 commit comments