Skip to content

Commit d630c95

Browse files
authored
Merge pull request #2809 from MicrosoftDocs/diannegali-crosscloudmto
cross-cloud tenant management
2 parents d2176e2 + 49cf71a commit d630c95

File tree

7 files changed

+133
-0
lines changed

7 files changed

+133
-0
lines changed

unified-secops-platform/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,8 @@
102102
href: mto-endpoint-security-policy.md
103103
- name: Manage content distribution with tenant groups
104104
href: mto-tenantgroups.md
105+
- name: Manage tenants in other Microsoft clouds
106+
href: mto-cross-cloud.md
105107
- name: Troubleshoot issues
106108
href: mto-troubleshoot.md
107109
- name: Configure notifications
37.2 KB
Loading
86.1 KB
Loading
88.6 KB
Loading
91.3 KB
Loading
Lines changed: 127 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,127 @@
1+
---
2+
title: Manage tenants in other Microsoft cloud environments
3+
description: Overview of cross-cloud management for other Microsoft clouds in multitenant management in Microsoft Defender XDR.
4+
ms.service: defender-xdr
5+
ms.author: diannegali
6+
author: diannegali
7+
ms.localizationpriority: medium
8+
manager: deniseb
9+
audience: ITPro
10+
ms.collection:
11+
- m365-security
12+
- highpri
13+
- tier1
14+
ms.topic: how-to
15+
ms.date: 04/02/2025
16+
appliesto:
17+
- Microsoft Defender XDR
18+
- Microsoft Sentinel in the Microsoft Defender portal
19+
#customer intent: As a security administrator, I want to learn how to manage tenants in other Microsoft cloud environments.
20+
---
21+
22+
# Manage tenants in other Microsoft cloud environments
23+
24+
[!INCLUDE[Prerelease information](../includes/prerelease.md)]
25+
26+
Multitenant management in Microsoft Defender supports government cloud environments to view their tenants in other cloud environments through cross-cloud visibility. Security operations teams operating in government cloud environments can now manage their entire security operations, including tenants in other cloud environments, in a single pane of glass.
27+
28+
Cross-cloud visibility allows GCC High and DoD multitenant customers to view and manage tenants in Microsoft GCC and Commercial cloud environments.
29+
30+
## Prerequisites
31+
32+
Cross-cloud visibility is available to government customers who have the applicable [licensing requirements](/defender-xdr/usgov#licensing-requirements).
33+
34+
In addition, ensure that the trust multi-factor authentication (MFA) from Microsoft Entra tenants is properly configured to successfully access tenants in Microsoft Commercial cloud environments. To configure MFA, see [Change inbound trust settings for MFA and device claims](/entra/external-id/cross-tenant-access-settings-b2b-collaboration#to-change-inbound-trust-settings-for-mfa-and-device-claims).
35+
36+
### B2B collaboration settings
37+
38+
Follow these steps to configure B2B collaboration settings.
39+
40+
#### Home tenant settings
41+
42+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
43+
2. Navigate to **Identity > External identities > Cross-tenant access settings**, then select **Cross-tenant access settings**.
44+
3. Select **Add organization**. Enter the tenant ID of the organization you want to add, then select **Add**.
45+
46+
> [!NOTE]
47+
> By default, a B2B inherits the default settings of your tenant.
48+
49+
Configure your tenant settings to the following:
50+
51+
1. For the organization you added, select **Inbound access**.
52+
2. Set B2B collaboration to **Block** for Access and Users.
53+
3. On the Application tab, set access to **Block** and Applies to **All applications**, then select **Save**.
54+
4. Select **B2B direct connect**, set access status to **Block** and Applies to **all users**.
55+
5. On the Application tab, set access to **Block** and Applies to **All applications**, then select **Save**.
56+
57+
No other MFA Trust settings are required for the home tenant.
58+
59+
You then need to configure outbound access settings for the home tenant by following these steps:
60+
61+
1. In the **Cross-tenant access settings** pane, select **Outbound access**.
62+
2. Configure B2B collaboration by setting access status to **Allow**.
63+
3. In the Applies to, select any depending on your requirements.
64+
4. Select **External applications** and set access status to **Allow**.
65+
5. Set the Applies to to **All external applications**. Select **Save**.
66+
6. Select **B2B direct connect** and set access status to **Block**.
67+
7. In the Applies to, select **All users**.
68+
8. Select **External applications** and set access status to **Block**.
69+
9. Set the Applies to to **All external applications**. Select **Save**.
70+
71+
#### Target tenant settings
72+
73+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
74+
2. Navigate to **Identity > External identities > Cross-tenant access settings**, then select **Cross-tenant access settings**.
75+
3. Select **Add organization**. Enter the tenant ID of the organization you want to add, then select **Add**.
76+
77+
Configure the target tenant settings to the following:
78+
79+
1. For the organization you added, select **Inbound access**.
80+
2. Set B2B collaboration to **Allow** for Access and Users.
81+
3. On the Application tab, set access to **Allow** and Applies to **All applications**, then select **Save**.
82+
4. Select **B2B direct connect**, set access status to **Block** and Applies to **All users**.
83+
5. On the Application tab, set access to **Block** and Applies to **All applications**, then select **Save**.
84+
6. Select **Trust settings**, then select **Trust multi-factor authentication from Microsoft Entra tenants**.
85+
86+
You then need to configure outbound access settings from the home tenant by following these steps:
87+
88+
1. In the **Cross-tenant access settings** pane, select **Outbound access**.
89+
2. Configure B2B collaboration by setting access status to **Block**.
90+
3. In the Applies to, select **All users**.
91+
4. Select **External applications** and set access status to **Block**.
92+
5. Set the Applies to to **All external applications**. Select **Save**.
93+
6. Select **B2B direct connect** and set access status to **Block**.
94+
7. In the Applies to, select **All users**.
95+
8. Select **External applications** and set access status to **Block**.
96+
9. Set the Applies to to **All external applications**. Select **Save**.
97+
98+
## Cross-cloud tenant management
99+
100+
To manage tenants from other Microsoft cloud environments:
101+
102+
1. Go to the [Settings page](https://mto.security.microsoft.com/settings) in Microsoft Defender multitenant management.
103+
2. Select the dropdown beside **Add tenants**, then select **add from another cloud**.
104+
105+
:::image type="content" source="/unified-secops-platform/media/mto-cross-cloud/mto-add-from-cloud-small.png" alt-text="Screenshot of the Settings page with the Add tenant option highlighted." lightbox="/unified-secops-platform/media/mto-cross-cloud/mto-add-from-cloud.png":::
106+
107+
3. In the next pane, type the tenant ID or domain where the tenant is to add a tenant, then select **Verify tenant**. The verification process looks at the added tenant’s information and permissions.
108+
109+
:::image type="content" source="/unified-secops-platform/media/mto-cross-cloud/mto-verify-tenant-small.png" alt-text="Screenshot of the add tenants pane with the verification highlighted." lightbox="/unified-secops-platform/media/mto-cross-cloud/mto-verify-tenant.png":::
110+
111+
4. Once verified, select **Add tenant** to complete the process.
112+
113+
The tenants list now includes the tenants from the other cloud environment. You can now manage these tenants as you would any other tenant in Microsoft Defender.
114+
115+
If you get an error during the verification process, you can:
116+
117+
- Check the tenant ID or domain you entered.
118+
- Ensure you have the correct permissions to access the tenant.
119+
120+
To remove tenants from the list, select the tenant, then select **Remove tenants**.
121+
122+
After successfully adding tenants from other clouds, you can view these tenants in other multitenant pages like the incidents and device inventory pages.
123+
124+
## Next steps
125+
126+
- [View and manage incidents and alerts in multitenant management](mto-incidents-alerts.md)
127+
- [Device inventory in multitenant management](mto-tenant-devices.md#device-inventory)

unified-secops-platform/whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,10 @@ This article lists recent features added into Microsoft's unified SecOps platfor
2222

2323
## April 2025
2424

25+
### Cross-cloud multitenant management (Preview)
26+
27+
Multitenant management in Microsoft Defender now supports managing tenants in other Microsoft cloud environments. Security operations teams operating in government cloud environments can now manage their entire security operations, including tenants in other Microsoft cloud environments, in a single pane of glass. For more information, see [Manage tenants in other Microsoft cloud environments](mto-cross-cloud.md).
28+
2529
### Case management now generally available
2630

2731
The Microsoft Defender portal's case management feature is now generally available. For more information on this feature, see the preview announcement [Manage SecOps work natively with case management (Preview)](#case-management-preview) in the January 2025 section below.

0 commit comments

Comments
 (0)