Skip to content

Commit fed614c

Browse files
Merge pull request #282172 from liorarviv/liorarv-docs
Update CIEM requirement
2 parents a7908a5 + f0f590d commit fed614c

File tree

2 files changed

+2
-4
lines changed

2 files changed

+2
-4
lines changed

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,8 +54,6 @@ To complete the procedures in this article, you need:
5454

5555
- Contributor level permission for the relevant Azure subscription.
5656

57-
- An Entra ID account that has an Application Administrator or Cloud Application Administrator directory role for your tenant (or equivalent administrator rights to create app registrations).
58-
5957
> [!NOTE]
6058
> The AWS connector is not available on the national government clouds (Azure Government, Microsoft Azure operated by 21Vianet).
6159
@@ -153,6 +151,7 @@ If you choose the Microsoft Defender CSPM plan, you need:
153151
- You must [enable Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) on your Azure subscription.
154152
- Connect your [non-Azure machines](quickstart-onboard-machines.md), [AWS accounts](quickstart-onboard-aws.md).
155153
- In order to gain access to all of the features available from the CSPM plan, the plan must be enabled by the **Subscription Owner**.
154+
- To enable CIEM (Cloud Infrastructure Entitlement Management) capabilities, the Entra ID account used for the onboarding process must have either the Application Administrator or Cloud Application Administrator directory role for your tenant (or equivalent administrator rights to create app registrations). This requirement is only necessary during the onboarding process.
156155

157156
Learn more about how to [enable Defender CSPM](tutorial-enable-cspm-plan.md).
158157

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,6 @@ To complete the procedures in this article, you need:
4747

4848
- Contributor level permission for the relevant Azure subscription.
4949

50-
- An Entra ID account that has an Application Administrator or Cloud Application Administrator directory role for your tenant (or equivalent administrator rights to create app registrations).
51-
5250
You can learn more about Defender for Cloud pricing on [the pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
5351

5452
When you're connecting GCP projects to specific Azure subscriptions, consider the [Google Cloud resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy#resource-hierarchy-detail) and these guidelines:
@@ -303,6 +301,7 @@ If you choose the Microsoft Defender CSPM plan, you need:
303301
- A Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
304302
- You must [enable Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) on your Azure subscription.
305303
- In order to gain access to all of the features available from the CSPM plan, the plan must be enabled by the **Subscription Owner**.
304+
- To enable CIEM (Cloud Infrastructure Entitlement Management) capabilities, the Entra ID account used for the onboarding process must have either the Application Administrator or Cloud Application Administrator directory role for your tenant (or equivalent administrator rights to create app registrations). This requirement is only necessary during the onboarding process.
306305

307306
Learn more about how to [enable Defender CSPM](tutorial-enable-cspm-plan.md).
308307

0 commit comments

Comments
 (0)