|
| 1 | +--- |
| 2 | +title: Manage tenants in other Microsoft cloud environments |
| 3 | +description: Overview of cross-cloud management for other Microsoft clouds in multitenant management in Microsoft Defender XDR. |
| 4 | +ms.service: defender-xdr |
| 5 | +ms.author: diannegali |
| 6 | +author: diannegali |
| 7 | +ms.localizationpriority: medium |
| 8 | +manager: deniseb |
| 9 | +audience: ITPro |
| 10 | +ms.collection: |
| 11 | +- m365-security |
| 12 | +- highpri |
| 13 | +- tier1 |
| 14 | +ms.topic: how-to |
| 15 | +ms.date: 04/02/2025 |
| 16 | +appliesto: |
| 17 | + - Microsoft Defender XDR |
| 18 | + - Microsoft Sentinel in the Microsoft Defender portal |
| 19 | +#customer intent: As a security administrator, I want to learn how to manage tenants in other Microsoft cloud environments. |
| 20 | +--- |
| 21 | + |
| 22 | +# Manage tenants in other Microsoft cloud environments |
| 23 | + |
| 24 | +[!INCLUDE[Prerelease information](../includes/prerelease.md)] |
| 25 | + |
| 26 | +Multitenant management in Microsoft Defender supports government cloud environments to view their tenants in other cloud environments through cross-cloud visibility. Security operations teams operating in government cloud environments can now manage their entire security operations, including tenants in other cloud environments, in a single pane of glass. |
| 27 | + |
| 28 | +Cross-cloud visibility allows GCC High and DoD multitenant customers to view and manage tenants in Microsoft GCC and Commercial cloud environments. |
| 29 | + |
| 30 | +## Prerequisites |
| 31 | + |
| 32 | +Cross-cloud visibility is available to government customers who have the applicable [licensing requirements](/defender-xdr/usgov#licensing-requirements). |
| 33 | + |
| 34 | +In addition, ensure that the trust multi-factor authentication (MFA) from Microsoft Entra tenants is properly configured to successfully access tenants in Microsoft Commercial cloud environments. To configure MFA, see [Change inbound trust settings for MFA and device claims](/entra/external-id/cross-tenant-access-settings-b2b-collaboration#to-change-inbound-trust-settings-for-mfa-and-device-claims). |
| 35 | + |
| 36 | +### B2B collaboration settings |
| 37 | + |
| 38 | +Follow these steps to configure B2B collaboration settings. |
| 39 | + |
| 40 | +#### Home tenant settings |
| 41 | + |
| 42 | +1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). |
| 43 | +2. Navigate to **Identity > External identities > Cross-tenant access settings**, then select **Cross-tenant access settings**. |
| 44 | +3. Select **Add organization**. Enter the tenant ID of the organization you want to add, then select **Add**. |
| 45 | + |
| 46 | +> [!NOTE] |
| 47 | +> By default, a B2B inherits the default settings of your tenant. |
| 48 | +
|
| 49 | +Configure your tenant settings to the following: |
| 50 | + |
| 51 | +1. For the organization you added, select **Inbound access**. |
| 52 | +2. Set B2B collaboration to **Block** for Access and Users. |
| 53 | +3. On the Application tab, set access to **Block** and Applies to **All applications**, then select **Save**. |
| 54 | +4. Select **B2B direct connect**, set access status to **Block** and Applies to **all users**. |
| 55 | +5. On the Application tab, set access to **Block** and Applies to **All applications**, then select **Save**. |
| 56 | + |
| 57 | +No other MFA Trust settings are required for the home tenant. |
| 58 | + |
| 59 | +You then need to configure outbound access settings for the home tenant by following these steps: |
| 60 | + |
| 61 | +1. In the **Cross-tenant access settings** pane, select **Outbound access**. |
| 62 | +2. Configure B2B collaboration by setting access status to **Allow**. |
| 63 | +3. In the Applies to, select any depending on your requirements. |
| 64 | +4. Select **External applications** and set access status to **Allow**. |
| 65 | +5. Set the Applies to to **All external applications**. Select **Save**. |
| 66 | +6. Select **B2B direct connect** and set access status to **Block**. |
| 67 | +7. In the Applies to, select **All users**. |
| 68 | +8. Select **External applications** and set access status to **Block**. |
| 69 | +9. Set the Applies to to **All external applications**. Select **Save**. |
| 70 | + |
| 71 | +#### Target tenant settings |
| 72 | + |
| 73 | +1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). |
| 74 | +2. Navigate to **Identity > External identities > Cross-tenant access settings**, then select **Cross-tenant access settings**. |
| 75 | +3. Select **Add organization**. Enter the tenant ID of the organization you want to add, then select **Add**. |
| 76 | + |
| 77 | +Configure the target tenant settings to the following: |
| 78 | + |
| 79 | +1. For the organization you added, select **Inbound access**. |
| 80 | +2. Set B2B collaboration to **Allow** for Access and Users. |
| 81 | +3. On the Application tab, set access to **Allow** and Applies to **All applications**, then select **Save**. |
| 82 | +4. Select **B2B direct connect**, set access status to **Block** and Applies to **All users**. |
| 83 | +5. On the Application tab, set access to **Block** and Applies to **All applications**, then select **Save**. |
| 84 | +6. Select **Trust settings**, then select **Trust multi-factor authentication from Microsoft Entra tenants**. |
| 85 | + |
| 86 | +You then need to configure outbound access settings from the home tenant by following these steps: |
| 87 | + |
| 88 | +1. In the **Cross-tenant access settings** pane, select **Outbound access**. |
| 89 | +2. Configure B2B collaboration by setting access status to **Block**. |
| 90 | +3. In the Applies to, select **All users**. |
| 91 | +4. Select **External applications** and set access status to **Block**. |
| 92 | +5. Set the Applies to to **All external applications**. Select **Save**. |
| 93 | +6. Select **B2B direct connect** and set access status to **Block**. |
| 94 | +7. In the Applies to, select **All users**. |
| 95 | +8. Select **External applications** and set access status to **Block**. |
| 96 | +9. Set the Applies to to **All external applications**. Select **Save**. |
| 97 | + |
| 98 | +## Cross-cloud tenant management |
| 99 | + |
| 100 | +To manage tenants from other Microsoft cloud environments: |
| 101 | + |
| 102 | +1. Go to the [Settings page](https://mto.security.microsoft.com/settings) in Microsoft Defender multitenant management. |
| 103 | +2. Select the dropdown beside **Add tenants**, then select **add from another cloud**. |
| 104 | + |
| 105 | + :::image type="content" source="/unified-secops-platform/media/mto-cross-cloud/mto-add-from-cloud-small.png" alt-text="Screenshot of the Settings page with the Add tenant option highlighted." lightbox="/unified-secops-platform/media/mto-cross-cloud/mto-add-from-cloud.png"::: |
| 106 | + |
| 107 | +3. In the next pane, type the tenant ID or domain where the tenant is to add a tenant, then select **Verify tenant**. The verification process looks at the added tenant’s information and permissions. |
| 108 | + |
| 109 | + :::image type="content" source="/unified-secops-platform/media/mto-cross-cloud/mto-verify-tenant-small.png" alt-text="Screenshot of the add tenants pane with the verification highlighted." lightbox="/unified-secops-platform/media/mto-cross-cloud/mto-verify-tenant.png"::: |
| 110 | + |
| 111 | +4. Once verified, select **Add tenant** to complete the process. |
| 112 | + |
| 113 | +The tenants list now includes the tenants from the other cloud environment. You can now manage these tenants as you would any other tenant in Microsoft Defender. |
| 114 | + |
| 115 | +If you get an error during the verification process, you can: |
| 116 | + |
| 117 | +- Check the tenant ID or domain you entered. |
| 118 | +- Ensure you have the correct permissions to access the tenant. |
| 119 | + |
| 120 | +To remove tenants from the list, select the tenant, then select **Remove tenants**. |
| 121 | + |
| 122 | +After successfully adding tenants from other clouds, you can view these tenants in other multitenant pages like the incidents and device inventory pages. |
| 123 | + |
| 124 | +## Next steps |
| 125 | + |
| 126 | +- [View and manage incidents and alerts in multitenant management](mto-incidents-alerts.md) |
| 127 | +- [Device inventory in multitenant management](mto-tenant-devices.md#device-inventory) |
0 commit comments