Skip to content

Commit fa24ff8

Browse files
Merge pull request #198472 from yehKardos/Additions-to-GCP-and-AWS-onboarding--DevOps-1939263
AWS Quickstart Guide Complete except for 1 screenshot; GCP requires new screenshots
2 parents 8dd037c + 19d15a0 commit fa24ff8

File tree

8 files changed

+15
-9
lines changed

8 files changed

+15
-9
lines changed
4.31 KB
Loading
5.93 KB
Loading
2.61 KB
Loading
30.8 KB
Loading
-8.46 KB
Loading
-64.2 KB
Loading

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Defend your AWS resources with Microsoft Defender for Cloud
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: quickstart
7-
ms.date: 05/03/2022
7+
ms.date: 05/17/2022
88
zone_pivot_groups: connect-aws-accounts
99
ms.custom: mode-other
1010
---
@@ -18,7 +18,7 @@ To protect your AWS-based resources, you can connect an account with one of two
1818

1919
- **Classic cloud connectors experience** - As part of the initial multicloud offering, we introduced these cloud connectors as a way to connect your AWS and GCP projects. If you've already configured an AWS connector through the classic cloud connectors experience, we recommend deleting these connectors (as explained in [Remove classic connectors](#remove-classic-connectors)), and connecting the account again using the newer mechanism. If you don't do this before creating the new connector through the environment settings page, do so afterwards to avoid seeing duplicate recommendations.
2020

21-
- **Environment settings page (in preview)** (recommended) - This preview page provides a greatly improved, simpler, onboarding experience (including auto provisioning). This mechanism also extends Defender for Cloud's enhanced security features to your AWS resources:
21+
- **Environment settings page** (recommended) - This page provides a greatly improved, simpler, onboarding experience (including auto provisioning). This mechanism also extends Defender for Cloud's enhanced security features to your AWS resources:
2222

2323
- **Defender for Cloud's CSPM features** extend to your AWS resources. This agentless plan assesses your AWS resources according to AWS-specific security recommendations and these are included in your secure score. The resources will also be assessed for compliance with built-in standards specific to AWS (AWS CIS, AWS PCI DSS, and AWS Foundational Security Best Practices). Defender for Cloud's [asset inventory page](asset-inventory.md) is a multicloud enabled feature helping you manage your AWS resources alongside your Azure resources.
2424
- **Microsoft Defender for Containers** brings threat detection and advanced defenses to your Amazon EKS clusters. This plan includes Kubernetes threat protection, behavioral analytics, Kubernetes best practices, admission control recommendations and more. You can view the full list of available features in [Defender for Containers feature availability](supported-machines-endpoint-solutions-clouds-containers.md).
@@ -37,9 +37,9 @@ This screenshot shows AWS accounts displayed in Defender for Cloud's [overview d
3737

3838
|Aspect|Details|
3939
|----|:----|
40-
|Release state:|Preview.<br>[!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]|
41-
|Pricing:|The **CSPM plan** is free.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for AWS at the same price as for Azure resources.<br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
42-
|Required roles and permissions:|**Contributor** permission for the relevant Azure subscription.|
40+
|Release state:|General Availability (GA)|
41+
|Pricing:| The **CSPM plan** is free.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan for AWS is billed at the same price as for Azure resources. <br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
42+
|Required roles and permissions:|**Contributor** permission for the relevant Azure subscription. <br> **Administrator** on the AWS account.|
4343
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet)|
4444

4545

@@ -116,6 +116,8 @@ If you have any existing connectors created with the classic cloud connectors ex
116116
1. Enter the details of the AWS account, including the location where you'll store the connector resource.
117117

118118
:::image type="content" source="media/quickstart-onboard-aws/add-aws-account-details.png" alt-text="Step 1 of the add AWS account wizard: Enter the account details.":::
119+
120+
(Optional) Select **Management account** to create a connector to a management account. Connectors will be created for each member account discovered under the provided management account. Auto-provisioning will be enabled for all of the newly onboarded accounts.
119121

120122
1. Select **Next: Select plans**.
121123

@@ -143,7 +145,7 @@ If you have any existing connectors created with the classic cloud connectors ex
143145

144146
1. Download the CloudFormation template.
145147

146-
1. Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen.
148+
1. Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen. If you are onboarding a management account, you'll need to run the CloudFormation template both as Stack and as StackSet. Connectors will be created for the member accounts up to 24 hours after the onboarding.
147149

148150
1. Select **Next: Review and generate**.
149151

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Monitoring your GCP resources from Microsoft Defender for Cloud
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: quickstart
7-
ms.date: 03/27/2022
7+
ms.date: 05/17/2022
88
zone_pivot_groups: connect-gcp-accounts
99
ms.custom: mode-other
1010
---
@@ -35,10 +35,9 @@ To protect your GCP-based resources, you can connect an account in two different
3535
|----|:----|
3636
| Release state: | Preview <br> The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to the Azure features that are in beta, preview, or otherwise not yet released into general availability. |
3737
|Pricing:|The **CSPM plan** is free.<br> The **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If a GCP VM instance doesn't have the Azure Arc agent deployed, you won't be charged for that machine. <br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for GCP at the same price as for Azure resources.|
38-
|Required roles and permissions:| **Contributor** on the relevant Azure Subscription|
38+
|Required roles and permissions:| **Contributor** on the relevant Azure Subscription <br> **Owner** on the GCP organization or project|
3939
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet, Other Gov)|
4040

41-
4241
## Remove 'classic' connectors
4342

4443
If you have any existing connectors created with the classic cloud connectors experience, remove them first:
@@ -79,6 +78,8 @@ Follow the steps below to create your GCP cloud connector.
7978

8079
:::image type="content" source="media/quickstart-onboard-gcp/create-connector.png" alt-text="Screenshot of the Create GCP connector page where you need to enter all relevant information.":::
8180

81+
(Optional) If you select **Organization (Preview)**, a management project and an organization custom role will be created on your GCP project for the onboarding process. Auto-provisioning will be enabled for the onboarding of new projects.
82+
8283
1. Select the **Next: Select Plans**.
8384

8485
1. Toggle the plans you want to connect to **On**. By default all necessary prerequisites and components will be provisioned. (Optional) Learn how to [configure each plan](#optional-configure-selected-plans).
@@ -91,6 +92,9 @@ Follow the steps below to create your GCP cloud connector.
9192

9293
:::image type="content" source="media/quickstart-onboard-gcp/copy-button.png" alt-text="Screenshot showing the location of the copy button.":::
9394

95+
> [!NOTE]
96+
> To discover GCP resources, and for the authentication process, the following APIs must be enabled: iam.googleapis.com, sts.googleapis.com, cloudresourcemanager.googleapis.com, iamcredentials.googleapis.com, compute.googleapis.com. If these APIs are not enabled, we'll enable them during the onboarding process by running the GCloud script.
97+
9498
1. Select the **GCP Cloud Shell >**.
9599

96100
1. The GCP Cloud Shell will open.

0 commit comments

Comments
 (0)