You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/external-attack-surface-management/data-connections.md
+30-1Lines changed: 30 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,33 @@ To successfully create a data connection, you must first ensure that you've comp
68
68
69
69
1. Expand the **Log Analytics agent instructions** section to view your workspace ID and primary key. These values are used to set up your data connection.
70
70
71
+
> [!NOTE]
72
+
> The Http Data Collector, currently used by the Defender EASM Log Analytics Data Connector, is being deprecated on September 14, 2026. It will be replaced with the Logs Ingestion API and will require additional permission configurations below.
73
+
74
+
### Configure Resource Group Role Assignments
75
+
76
+
1. On the leftmost pane, select **Overview** and navigate to the **Resource group** under **Essentials** on the main pane.
77
+
1. Open the Resource group that contains the Log Analytics workspace.
78
+
1. On the leftmost pane, select **Access control (IAM)**.
79
+
1. Search and select the **Reader** role.
80
+
1. Search and select the **EASM API** as the member for the role assignment.
81
+

82
+
1. Be sure the Assignment type is **Permanent** and then click **Review + assign**.
83
+
1. Repeat this and add the **Monitoring Contributor**, **Log Analytics Contributor**, and the **Monitoring Metrics Publisher** roles for the **EASM API** app.
84
+
85
+
> [!NOTE]
86
+
> The role assignments for the **EASM API** may take a few minutes to be assigned after. After configuring the assignments, please wait for a few minutes to create a new data connection.
87
+
88
+
### Configure Subscription Resource Providers
89
+
90
+
1. Open the Subscription that contains the Resource Group and Log Analytics workspace.
91
+
1. On the leftmost pane, under **Settings** select **Resource Providers**.
92
+
1. Search for **microsoft.insights** and register the provider.
93
+

94
+
95
+
> [!NOTE]
96
+
> Using the new Log Analytics API, the Defender EASM resource and Log Analytics workspace that will ingest your Defender EASM data **must be in the same tenant**.
97
+
71
98
Use of this data connection is subject to the pricing structure of Log Analytics. For more information, see [Azure Monitor pricing](https://azure.microsoft.com/pricing/details/monitor/).
72
99
73
100
## Configure Azure Data Explorer permissions
@@ -104,12 +131,14 @@ A configuration pane opens on the right side of the **Data Connections** page. T
104
131
105
132
-**Name**: Enter a name for this data connection.
106
133
-**Workspace ID**: Enter the workspace ID for the Log Analytics instance where you want to export Defender EASM data.
107
-
-**API key**: Enter the API key for the Log Analytics instance.
108
134
-**Content**: Select to integrate asset data, attack surface insights, or both datasets.
109
135
-**Frequency**: Select the frequency that the Defender EASM connection uses to send updated data to the tool of your choice. Available options are daily, weekly, and monthly.
110
136
111
137

112
138
139
+
> [!NOTE]
140
+
> All new data connections will use the Log Analytics API and **will not** use an API key.
0 commit comments