Add an Azure China Tenant on Prisma Cloud
Onboard your Azure China resources to Prisma Cloud with
or without management groups.
Connecting Prisma ™ Cloud to your Azure China
tenant enables you to ingest your cloud resources and configuration
metadata so that Prisma Cloud can monitor your Azure China resources
for security violations. There are two workflows for onboarding
your Azure China tenants: with management groups so that you can
organize your Azure resources into logical groups for more granular
monitoring, or without management groups which doesn’t enable you
to organize your resources into a hierarchy.
Add an Azure China Tenant With Management Groups
Onboard your Azure China tenant to Prisma Cloud using
management groups so that you can logically organize your Azure
resources into a hierarchy.
This workflow enables you to onboard your
Azure China tenants with management groups on Prisma Cloud so that
you can organize your cloud resources into a logical hierarchy for
more granular monitoring-and-alerting of security threats.
- Select Azure as the cloud type to onboard.
- Select.SettingsCloud AccountsAdd Cloud AccountAzure
- Configure the initial onboarding options.
- Cloud Account Name—Enter a descriptive name to represent the cloud account that you will onboard to Prisma Cloud.
- Onboard—SelectAzure Tenantto onboard your Azure China tenant.
- Azure Cloud Type—SelectCommercialto onboard your Microsoft Azure (Commercial) account.
- Onboard Azure Management Groups and Subscriptions—Leave this option selected to onboard with management groups and clickNext.
- Register an app on Azure China.To register an app on Azure China, ensure that you have access to the following prerequisites:
- A Prisma Cloud tenant with permissions to onboard a cloud account.
- Access to Azure China with the permissions to:
- Create an app registration (service principal).
- Create a custom role.
- Assign IAM roles at the tenant root level.
- Assign GraphAPI permissions at the tenant level.
- Grant admin consent for Azure AD Graph APIs.
- Register a new app.
- Log in to Azure China.
- Select.Azure Active DirectoryApp registrations+ New registration
- Enter the application name.
- Select the supported account types.You have the options of choosing from single tenant, multitenant, multitenant and personal Microsoft accounts, or personal Microsoft accounts only.
- Optional—Enter the Redirect URI.The authentication response of the app will be returned to this URI.
- ClickRegister.
- CopyApplication (client) IDandDirectory (tenant) IDto a secure location on your computer. You will later enter these details into the Prisma Cloud UI.
- Create the client secret.The client secret is a secret string that the application uses to prove its identity when requesting a token.
- Select.Certificates & secrets+ New client secret
- Enter a clientDescription, selectExpiresto configure how long the client secret lasts, andAdd.
- CopyValueto a secure location.
Make sure that you copyValueand notSecret ID. - Get the Object ID.
- Select, and search for the app you previously created in the search box.Azure active directoryEnterprise applications
- CopyObject IDto a secure location on your computer.Make sure that you get theObject IDfor the Prisma Cloud application fromon the Azure portal—not fromEnterprise ApplicationsAll applicationsApp Registrations.
- Add roles to the root group.The following roles should be added to the root group:
- To add these roles, clickHomeunder header to get back to azure portal.
- Add role assignment.
- Select.Management groupsTenant Root Group(your azure subscription)Access control (IAM)Role assignments+ AddAdd role assignment
- Search by role—Enter the name of the role you want to search for in the search box—for example—reader. Click on the role name in the results, and thenNext.
- Select members—ModifyAssign access toto assign the role to aUser, group, or service principal—or—Managed identity. Click+Select membersand then type in the name of the app you previously created in the search box to assign the role to your app. ClickSelectand thenNext.
- ClickReview + assign.
- Repeat these steps to add theReader and Data Access,Network Contributor, andStorage Account Contributorroles.
- Verify that all the roles have been added.
- SelectRole assignments.
- Enter the name of your app in the search form and view the roles that have been added.
- Add the Microsoft Graph APIs.
- Navigate to the app you previously registered.Select, and select your app.Azure Active DirectoryApp registrations
- Navigate to Microsoft Graph.Select.API permissions+ Add a permissionMicrosoft GraphApplication permissions
- Add the permissions.Enter the permission name inSelect permissions, and select the name fromPermission.Add the following permissions:
- User.Read.All
- Policy.Read.All
- Group.Read.All
- GroupMember.Read.All
- Reports.Read.All
- Directory.Read.All
- Domain.Read.All
- Application.Read.All
- Grant admin consent for Default Directory.
- Select.Grant admin consent for Default DirectoryYes
- Verify that the permissions are granted.You should see green check marks under theStatuscolumn.
- (Optional)—Enable NSG flow logs.If you want to view the NSG flow logs on Prisma Cloud, ensure thatIngest and Monitor Network Security Group Flow Logsis enabled in Prisma Cloud.
- On Azure portal, Enable Network Watcher and register Insights provider.
- On Azure portal, Create a storage account on Azure for NSG flow logs.Your Azure storage account stores the flow logs that are required for Prisma Cloud to monitor and analyze network traffic. When Prisma Cloud ingests the data in these logs, you can interact with the information in Prisma Cloud. For example, you can run queries against the data, visualize network topology, and investigate traffic flows between two instances. You can also apply network policies to this traffic.If you do not have regulatory guidelines that specify a log retention period to which you must adhere, we recommend you set retention to at least 15 days.
- On the Azure portal, Enable NSG flow logs.
- Add account groups.Select theAccount Groupsyou want to add and clickNext.You must assign each cloud account to an account group, and to associate the account group with it to generate alerts when a policy violation occurs.
- Verify theStatusandDoneto save your changes.If Prisma Cloud is able to validate the credentials by making an authentication call using the credentials provided in the previous step, it displays a green check mark.
Add an Azure China Tenant Without Management Groups
Onboard your Azure China tenant without management groups
and monitor your Azure China environments for security vulnerabilities.
Onboard your Azure China tenants to Prisma
Cloud without management groups so that you can monitor your Azure
China environments for security vulnerabilities and enforce compliance.
- Select Azure as the cloud type to onboard.
- Select.SettingsCloud AccountsAdd Cloud AccountAzure
- Configure the initial onboarding options.
- Cloud Account Name—Enter a descriptive name to represent the cloud account that you will onboard to Prisma Cloud.
- Onboard—SelectAzure Tenantto onboard your Azure AD tenant.
- Azure Cloud Type—SelectCommercialto onboard your Microsoft Azure (Commercial) account.
- Onboard Azure Management Groups and Subscriptions—Deselect this option to onboard without management groups and clickNext.
- Register an app on Azure China.To register an app on Azure China, ensure that you have access to the following prerequisites:
- A Prisma Cloud tenant with permissions to onboard a cloud account.
- Access to Azure China with the permissions to:
- Create an app registration (service principal).
- Create a custom role.
- Assign IAM roles at the tenant root level.
- Assign GraphAPI permissions at the tenant level.
- Grant admin consent for Azure AD Graph APIs.
- Register a new app.
- Log in to Azure China.
- Select.Azure Active DirectoryApp registrations+ New registration
- Enter the application name.
- Select the supported account types.You have the options of choosing from single tenant, multitenant, multitenant and personal Microsoft accounts, or personal Microsoft accounts only.
- Optional—Enter the Redirect URI.The authentication response of the app will be returned to this URI.
- ClickRegister.
- CopyApplication (client) IDandDirectory (tenant) IDto a secure location on your computer. You will later enter these details into the Prisma Cloud UI.
- Create the client secret.The client secret is a secret string that the application uses to prove its identity when requesting a token.
- Select.Certificates & secrets+ New client secret
- Enter a clientDescription, selectExpiresto configure how long the client secret lasts, andAdd.
- CopyValueto a secure location.
Make sure that you copyValueand notSecret ID. - Get the Object ID.
- Select, and search for the app you previously created in the search box.Azure active directoryEnterprise applications
- CopyObject IDto a secure location on your computer.Make sure that you get theObject IDfor the Prisma Cloud application fromon the Azure portal—not fromEnterprise ApplicationsAll applicationsApp Registrations.
- Add roles to the root group.The following roles should be added to the root group:
- To add these roles, clickHomeunder header to get back to azure portal.
- Add role assignment.
- Select.Management groupsTenant Root Group(your azure subscription)Access control (IAM)Role assignments+ AddAdd role assignment
- Search by role—Enter the name of the role you want to search for in the search box—for example—reader. Click on the role name in the results, and thenNext.
- Select members—ModifyAssign access toto assign the role to aUser, group, or service principal—or—Managed identity. Click+Select membersand then type in the name of the app you previously created in the search box to assign the role to your app. ClickSelectand thenNext.
- ClickReview + assign.
- Repeat these steps to add theReader and Data Access,Network Contributor, andStorage Account Contributorroles.
- Verify that all the roles have been added.
- SelectRole assignments.
- Enter the name of your app in the search form and view the roles that have been added.
- Add the Microsoft Graph APIs.
- Navigate to the app you previously registered.Select, and select your app.Azure Active DirectoryApp registrations
- Navigate to Microsoft Graph.Select.API permissions+ Add a permissionMicrosoft GraphApplication permissions
- Add the permissions.Enter the permission name inSelect permissions, and select the name fromPermission.Add the following permissions:
- User.Read.All
- Policy.Read.All
- Group.Read.All
- GroupMember.Read.All
- Reports.Read.All
- Directory.Read.All
- Domain.Read.All
- Application.Read.All
- Grant admin consent for Default Directory.
- Select.Grant admin consent for Default DirectoryYes
- Verify that the permissions are granted.You should see green check marks under theStatuscolumn.
- (Optional)—Enable NSG flow logs.If you want to view the NSG flow logs on Prisma Cloud, ensure thatIngest and Monitor Network Security Group Flow Logsis enabled in Prisma Cloud.
- On Azure portal, Enable Network Watcher and register Insights provider.
- On Azure portal, Create a storage account on Azure for NSG flow logs.Your Azure storage account stores the flow logs that are required for Prisma Cloud to monitor and analyze network traffic. When Prisma Cloud ingests the data in these logs, you can interact with the information in Prisma Cloud. For example, you can run queries against the data, visualize network topology, and investigate traffic flows between two instances. You can also apply network policies to this traffic.If you do not have regulatory guidelines that specify a log retention period to which you must adhere, we recommend you set retention to at least 15 days.
- On the Azure portal, Enable NSG flow logs.
- Add account groups.While authenticated in Prisma Cloud, select theAccount Groupsyou want to add and clickNext. You must assign each cloud account to an account group, and to associate the account group with it to generate alerts when a policy violation occurs.
- Verify theStatusandDoneto save your changes.If Prisma Cloud is able to validate the credentials by making an authentication call using the credentials provided in the previous step, it displays a green check mark.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.