You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/external-attack-surface-management/data-connections.md
+20-19Lines changed: 20 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ To accurately present the infrastructure that matters most to your organization,
39
39
<br>Attack Surface Insights provide an actionable set of results based on the key insights delivered through dashboards in Defender EASM. This option provides less granular metadata on each asset; instead, it categorizes assets based on the corresponding insight(s) and provides the high-level context required to investigate further. This option is ideal for those who want to integrate these pre-determined insights into custom reporting workflows in conjunction with data from other tools.
40
40
41
41
42
-
## **Configuring data connections**
42
+
## **Configuration overviews**
43
43
44
44
45
45
**Accessing data connections**
@@ -51,21 +51,25 @@ To accurately present the infrastructure that matters most to your organization,
51
51
**Connection prerequisites**
52
52
<br>To successfully create a data connection, users must first ensure that they have completed the required steps to grant Defender EASM permission to the tool of their choice. This process enables the application to ingest our exported data and provides the authentication credentials needed to configure the connection.
53
53
54
-
**Configuring Log Analytics permissions via UI**
54
+
## Configuring Log Analytics permissions
55
55
56
56
1. Open the Log Analytics workspace that will ingest your Defender EASM data, or [create a new workspace](/azure/azure-monitor/logs/quick-create-workspace?tabs=azure-portal).
57
-
1. Select **Access control (IAM)** from the left-hand navigation pane. For more information on access control, see [identity documentation](/azure/cloud-adoption-framework/decision-guides/identity/).
57
+
2. Select **Access control (IAM)** from the left-hand navigation pane. For more information on access control, see [identity documentation](/azure/cloud-adoption-framework/decision-guides/identity/).
58
58

59
59
60
-
1. On this page, select **+Add** to create a new role assignment.
61
-
1. From the **Role** tab, select **Contributor**. Click **Next**.
62
-
1. Open the **Members** tab. Click **+ Select members** to open a configuration pane. Search for **“EASM API”** and click on the value in the members list. Once done, click **Select**, then **Review + assign.**
63
-
1. Once the role assignment has been created, select **Agents** from the **Settings** section of the left-hand navigation menu.
60
+
3. On this page, select **+Add** to create a new role assignment.
61
+
4. From the **Role** tab, select **Contributor**. Click **Next**.
62
+
5. Open the **Members** tab. Click **+ Select members** to open a configuration pane. Search for **“EASM API”** and click on the value in the members list. Once done, click **Select**, then **Review + assign.**
63
+
6. Once the role assignment has been created, select **Agents** from the **Settings** section of the left-hand navigation menu.
64
64

65
65
66
-
1. Expand the **Log Analytics agent instructions** section to view your Workspace ID and Primary key. These values will be used to set up your data connection. Save the values in the following format: *WorkspaceId=XXX;ApiKey=YYY*
66
+
7. Expand the **Log Analytics agent instructions** section to view your Workspace ID and Primary key. These values will be used to set up your data connection. Save the values in the following format: *WorkspaceId=XXX;ApiKey=YYY*
67
+
68
+
Please note that use of this data connection is subject to the pricing structure of Log Analytics. See [Azure monitor pricing](https://azure.microsoft.com/pricing/details/monitor/) for more information.
67
69
68
-
**Configuring Data Explorer permissions**
70
+
71
+
72
+
## Configuring Data Explorer permissions
69
73
70
74
1. Open the Data Explorer cluster that will ingest your Defender EASM data or [create a new cluster](/azure/data-explorer/create-cluster-database-portal).
71
75
1. Select **Databases** in the Data section of the left-hand navigation menu.
@@ -86,7 +90,7 @@ To accurately present the infrastructure that matters most to your organization,
86
90
87
91
88
92
89
-
**Add a data connection**
93
+
## Add a data connection
90
94
<br>Users can connect their Defender EASM data to either Log Analytics or Azure Data Explorer. To do so, simply select **“Add connection”** for the appropriate tool from the Data Connections page.
91
95
A configuration pane will open on the right-hand side of the Data Connections screen. The following four fields are required:
92
96
@@ -101,7 +105,7 @@ A configuration pane will open on the right-hand side of the Data Connections sc
101
105
102
106
Once all four fields are configured, select **Add** to create the data connection. At this point, the Data Connections page will display a banner that indicates the resource has been successfully created and data will begin populating within 30 minutes. Once connections are created, they will be listed under the applicable tool on the main Data Connections page.
103
107
104
-
**Edit or delete a data connection**
108
+
## Edit or delete a data connection
105
109
<br>Users can edit or delete a data connection. For example, you may notice that a connection is listed as “Disconnected” and would therefore need to re-enter the configuration details to fix the issue.
106
110
To edit or delete a data connection:
107
111
@@ -114,15 +118,12 @@ To edit or delete a data connection:
114
118
• **Updated**: the date and time that the data connection was last updated.
115
119

116
120
117
-
1. From this page, users can elect to reconnect, edit or delete their data connection.<br>
118
-
• **Reconnect**: this option attempts to validate the data connection without any changes to the configuration. This option is best for those who have validated the authentication credentials used for the data connection.<br>
119
-
• **Edit**: this option allows users to change the configuration for the data connection.<br>
120
-
• **Delete**: this option deletes the data connection.
121
-
122
-
123
-
124
-
121
+
1. From this page, users can elect to reconnect, edit or delete their data connection.
125
122
123
+
-**Reconnect**: this option attempts to validate the data connection without any changes to the configuration. This option is best for those who have validated the authentication credentials used for the data connection.
124
+
-**Edit**: this option allows users to change the configuration for the data connection.
125
+
-**Delete**: this option deletes the data connection.
0 commit comments