: Configure Agentless Scanning for Azure
Focus
Focus

Configure Agentless Scanning for Azure

Table of Contents

Configure Agentless Scanning for Azure

  1. Log in to your Prisma Cloud Compute Console.
  2. Go to
    Manage > Cloud
    Accounts.
  3. Click
    +Add account
    .
  4. Enter the needed information in the
    Account config
    pane.
    1. Select Cloud provider
      : Azure
    2. Name:
      For example: PCC Azure Agentless.
    3. Description:
      Provide an optional string, for example: <Product-name> release.
    4. Authentication method:
      1. Service key
        : Paste the JSON object for the Service Principal you created.
      2. Certificate
        : Use a client certificate for authentication.
      3. Managed Identity
        : Use Managed Identity authentication to access Azure resources without entering any client secrets or certificates.
  5. Click Next.
  6. Complete the configuration in the
    Scan account
    pane:
    1. Enable
      Agentless scanning
      .
    2. Set the
      Console URL
      and
      Port
      to the address of your Prisma Cloud console that can be reached from the internet. To create an address or FQDN reachable from the internet, complete the Subject Alternative Names procedure.
    3. Expand* Advanced settings*.
      1. If you use a proxy for traffic leaving your Azure tenant, enter the
        Proxy
        address and add it’s Certificate Authority certificate.
      2. Under
        Scan scope
        you can choose
        All regions
        to scan for VMs in all Azure regions. If you choose
        Custom regions
        , enter the Azure region in which you want Prisma Cloud to scan for VMs.
      3. Enter tags under
        Exclude VMs by tags
        to further limit the scope of the scan.
      4. Choose whether or not to
        Scan non running hosts
      5. Choose whether or not to enable
        Auto-scale scanning
        . If you disable auto-scale, specify number of scanners Prisma Cloud should employ.
      6. Enter the
        Security group ID
        and
        Subnet ID
        that are created to allow the Prisma Cloud console to communicate back with Azure.
  7. Click
    Next
    .
  8. In the
    Discovery features
    page, leave the
    Cloud discovery
    settings unchanged.
  9. Click
    Add account
    .

Recommended For You