You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-aws.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Defend your AWS resources with Microsoft Defender for Cloud
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: quickstart
7
-
ms.date: 05/03/2022
7
+
ms.date: 05/17/2022
8
8
zone_pivot_groups: connect-aws-accounts
9
9
ms.custom: mode-other
10
10
---
@@ -18,7 +18,7 @@ To protect your AWS-based resources, you can connect an account with one of two
18
18
19
19
-**Classic cloud connectors experience** - As part of the initial multicloud offering, we introduced these cloud connectors as a way to connect your AWS and GCP projects. If you've already configured an AWS connector through the classic cloud connectors experience, we recommend deleting these connectors (as explained in [Remove classic connectors](#remove-classic-connectors)), and connecting the account again using the newer mechanism. If you don't do this before creating the new connector through the environment settings page, do so afterwards to avoid seeing duplicate recommendations.
20
20
21
-
-**Environment settings page (in preview)** (recommended) - This preview page provides a greatly improved, simpler, onboarding experience (including auto provisioning). This mechanism also extends Defender for Cloud's enhanced security features to your AWS resources:
21
+
-**Environment settings page** (recommended) - This page provides a greatly improved, simpler, onboarding experience (including auto provisioning). This mechanism also extends Defender for Cloud's enhanced security features to your AWS resources:
22
22
23
23
-**Defender for Cloud's CSPM features** extend to your AWS resources. This agentless plan assesses your AWS resources according to AWS-specific security recommendations and these are included in your secure score. The resources will also be assessed for compliance with built-in standards specific to AWS (AWS CIS, AWS PCI DSS, and AWS Foundational Security Best Practices). Defender for Cloud's [asset inventory page](asset-inventory.md) is a multicloud enabled feature helping you manage your AWS resources alongside your Azure resources.
24
24
-**Microsoft Defender for Containers** brings threat detection and advanced defenses to your Amazon EKS clusters. This plan includes Kubernetes threat protection, behavioral analytics, Kubernetes best practices, admission control recommendations and more. You can view the full list of available features in [Defender for Containers feature availability](supported-machines-endpoint-solutions-clouds-containers.md).
@@ -37,9 +37,9 @@ This screenshot shows AWS accounts displayed in Defender for Cloud's [overview d
|Pricing:|The **CSPM plan** is free.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for AWS at the same price as for Azure resources.<br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
42
-
|Required roles and permissions:|**Contributor** permission for the relevant Azure subscription.|
40
+
|Release state:|General Availability (GA)|
41
+
|Pricing:|The **CSPM plan** is free.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan for AWS is billed at the same price as for Azure resources.<br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
42
+
|Required roles and permissions:|**Contributor** permission for the relevant Azure subscription. <br> **Administrator** on the AWS account.|
43
43
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet)|
44
44
45
45
@@ -116,6 +116,8 @@ If you have any existing connectors created with the classic cloud connectors ex
116
116
1. Enter the details of the AWS account, including the location where you'll store the connector resource.
117
117
118
118
:::image type="content" source="media/quickstart-onboard-aws/add-aws-account-details.png" alt-text="Step 1 of the add AWS account wizard: Enter the account details.":::
119
+
120
+
(Optional) Select **Management account** to create a connector to a management account. Connectors will be created for each member account discovered under the provided management account. Auto-provisioning will be enabled for all of the newly onboarded accounts.
119
121
120
122
1. Select **Next: Select plans**.
121
123
@@ -143,7 +145,7 @@ If you have any existing connectors created with the classic cloud connectors ex
143
145
144
146
1. Download the CloudFormation template.
145
147
146
-
1. Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen.
148
+
1. Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen. If you are onboarding a management account, you'll need to run the CloudFormation template both as Stack and as StackSet. Connectors will be created for the member accounts up to 24 hours after the onboarding.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-gcp.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Monitoring your GCP resources from Microsoft Defender for Cloud
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: quickstart
7
-
ms.date: 03/27/2022
7
+
ms.date: 05/17/2022
8
8
zone_pivot_groups: connect-gcp-accounts
9
9
ms.custom: mode-other
10
10
---
@@ -35,10 +35,9 @@ To protect your GCP-based resources, you can connect an account in two different
35
35
|----|:----|
36
36
| Release state: | Preview <br> The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to the Azure features that are in beta, preview, or otherwise not yet released into general availability. |
37
37
|Pricing:|The **CSPM plan** is free.<br> The **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If a GCP VM instance doesn't have the Azure Arc agent deployed, you won't be charged for that machine. <br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for GCP at the same price as for Azure resources.|
38
-
|Required roles and permissions:|**Contributor** on the relevant Azure Subscription|
38
+
|Required roles and permissions:|**Contributor** on the relevant Azure Subscription <br> **Owner** on the GCP organization or project|
39
39
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet, Other Gov)|
40
40
41
-
42
41
## Remove 'classic' connectors
43
42
44
43
If you have any existing connectors created with the classic cloud connectors experience, remove them first:
@@ -79,6 +78,8 @@ Follow the steps below to create your GCP cloud connector.
79
78
80
79
:::image type="content" source="media/quickstart-onboard-gcp/create-connector.png" alt-text="Screenshot of the Create GCP connector page where you need to enter all relevant information.":::
81
80
81
+
(Optional) If you select **Organization (Preview)**, a management project and an organization custom role will be created on your GCP project for the onboarding process. Auto-provisioning will be enabled for the onboarding of new projects.
82
+
82
83
1. Select the **Next: Select Plans**.
83
84
84
85
1. Toggle the plans you want to connect to **On**. By default all necessary prerequisites and components will be provisioned. (Optional) Learn how to [configure each plan](#optional-configure-selected-plans).
@@ -91,6 +92,9 @@ Follow the steps below to create your GCP cloud connector.
91
92
92
93
:::image type="content" source="media/quickstart-onboard-gcp/copy-button.png" alt-text="Screenshot showing the location of the copy button.":::
93
94
95
+
> [!NOTE]
96
+
> To discover GCP resources, and for the authentication process, the following APIs must be enabled: iam.googleapis.com, sts.googleapis.com, cloudresourcemanager.googleapis.com, iamcredentials.googleapis.com, compute.googleapis.com. If these APIs are not enabled, we'll enable them during the onboarding process by running the GCloud script.
0 commit comments