Add an Azure Subscription on Prisma Cloud

Connect your Azure Commercial, Government, or Azure China subscription on Prisma Cloud to analyze traffic logs and monitor resources for potential security and compliance issues.
Connecting Prisma™ Cloud to your Azure cloud account enables you to analyze and monitor traffic logs, and detect potential malicious network activity or compliance issues. To enable API access between Prisma Cloud and your Microsoft Azure Subscription, you need to gather account information about your subscription and Azure Active Directory so that Prisma Cloud can monitor the resources in your cloud account.
If you are adding an Azure Commercial account, this workflow uses Terraform templates to streamline the set up process. The template automates the process of creating and registering Prisma Cloud as an application on your Active Directory and creating the Service Principal and associating the roles required to enable authentication.
If you do not want to use Terraform, or are adding an Azure Government or Azure China subscription, you must complete some tasks manually on the Azure portal.

Add Azure Commercial Subscription on Prisma Cloud

  1. Access Prisma Cloud and select
    Settings
    Cloud Accounts
    Add New
    .
  2. Select
    Azure
    as the
    Cloud to Secure
    .
  3. Provide the basic details of the Azure account. On the
    Get Started
    page:
    1. Enter a descriptive
      Cloud Account Name
      . Replace the auto-populated Cloud Account Name with one that will uniquely identify your Azure subscription on Prisma Cloud.
    2. Onboard
      an Azure
      Subscription
      or
      Tenant
      .
    3. Select
      Commercial
      for the
      Azure Cloud Type
      .
  4. On the
    Security Capabilities and Permissions
    page, you have the option to enable permissions for the following additional capabilities. Based on your selection, Prisma Cloud dynamically generates a Terraform template that includes the associated permissions for the Prisma Cloud role. Prisma Cloud Role provides permissions for security capabilities required. By default, the role provides permissions for cloud discovery for resources and workloads, misconfiguration detection, and threat detection.
    Agentless Workload Scanning and Serverless Function Scanning are enabled by default. Workload Discovery is also automatically enabled to help you identify all the cloud-native services used on your cloud account. By default, the Prisma Cloud role is granted the appropriate permissions to monitor your cloud account.
    • Enable and add permissions for
      Agentless Workload Scanning
      to scan hosts and containers for vulnerabilities and compliance risks without having to install a Defender. Scans start automatically once an account is onboarded. You can also update the scanning configuration for Agentless scans.
    • Enable and add permissions for
      Serverless Function Scanning
      to scan cloud provider functions like AWS Lambda, Azure and Google functions for vulnerabilities and compliance. Scans are automatically initiated once an account is onboarded. You can also update the scanning configuration for Serverless scans.
    • Add permissions needed for
      Agent-Based Workload Protection
      . The permissions allow for automated deployment of Defenders to provide protection to secure cloud VMs, containers and Kubernetes orchestrators. Registry scanning, Kubernetes audits and other features required by defenders are also enabled.
    • Enable Data Security to scan your resources to prevent data leaks. This is not enabled by default. After you onboard your account, further configuration is required to enable data scans.
    • Enable
      Remediation
      to address policy violations reported for remediable Configuration policies on Prisma Cloud. This is not enabled by default. When enabled, the Prisma Cloud role gets read-write access permissions to your Azure cloud account to successfully execute remediation commands.
      Once your Azure account is onboarded on Prisma Cloud, the account is automatically available in Compute and enabled for Workload Discovery and Serverless function scans. You can also review the permissions required for individual security capabilities.
  5. Enter your Directory (Tenant) ID and Subscription ID.
    Prisma Cloud requires your Azure
    Subscription ID
    so that it can identify your Azure cloud account and retrieve the storage account and key vault information. Your
    Directory (Tenant) ID
    identifying your tenant is also required.
    1. Get the directory tenant id
      —In your Azure portal, click
      Properties
      and copy the
      Tenant ID
      .
    2. Get the subscription id
      —In your Azure portal, select
      All resources
      (Your Azure subscription)
      , and then copy
      Subscription ID
      .
  6. Download the Terraform script to a system that has terraform installed and authenticated to Azure via the Azure CLI.
    Prisma Cloud recommends that you create a directory to store the Terraform template you download. This allows you to manage the templates when you add a different Azure subscription to Prisma Cloud. Give the directory a name that uniquely identifies the subscription for which you’re using it (for example, onboard-<subscription-name>).
    1. Run the command
      terraform init
      .
    2. Next, run the command
      terraform apply
      and click
      Confirm
      .
    3. Populate the accounts fields
      Application Client Secret
      ,
      Application (Client) ID
      , and the
      Enterprise Application Object ID
      with details from the Terraform template output.
    4. Select
      Ingest & Monitor Network Security Group flow logs
      to enable network incident investigations and click
      Next
      .
      Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG. You must first configure Network Security Groups on Azure and assign a storage account to enable Flow log ingestion on Prisma Cloud. Make sure that Azure Flow logs are stored within a storage account in the same region as the NSG. If you want to enable flow log ingestion, you must complete the tasks outlined in Step 9 in Register an App on Azure Active Directory. If you enable this option without setting it up on the Azure portal, Prisma Cloud will not be able to retrieve any Flow logs.
  7. Select the
    Account Groups
    you want to add and click
    Next
    .
    You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
  8. Click
    Save
    .
    If Prisma Cloud is able to successfully connect to your Azure subscription and retrieve information, the status is displayed with a green check mark. If Prisma Cloud is unable to retrieve the logs, the error message indicates what failed. See Troubleshoot Azure Account Onboarding for help.
  9. Verify that you can view the information on your Azure resources on Prisma Cloud.
    Depending on the number of resources in the accounts onboarded the data that was collected about your Azure resources can take up until a hour to display. After Prisma Cloud ingests data, the information is available for compliance checks, configuration review, audit history, and network visualization.
    It takes about four to six hours before you can view flow logs in Prisma Cloud. Prisma Cloud ingests flow logs from the previous seven days from when you onboard the account.
    1. Log in to Prisma Cloud.
    2. Select
      Investigate
      and enter the following RQL query.
      This query allows you to list all network traffic from the Internet or from Suspicious IP addresses with over 0 bytes of data transferred to a network interface on any resource on any cloud environment. Replace
      ‘<cloud account name>’
      with the name of your actual cloud account.
      network from vpc.flow_record where cloud.account = '<cloud account name>' AND source.publicnetwork IN ( 'Internet IPs', 'Suspicious IPs' ) AND bytes > 0

Add Azure Commercial Subscription on Prisma Cloud—Manual

This workflow uses Azure portal to manually create your Azure resources to onboard to Prisma Cloud. After you register an app on Azure Active Directory, you will get the details to enter into Prisma Cloud so that you can continuous monitor your Azure resources for security vulnerabilities and to enforce compliance.
  1. Save the information to a secure location on your computer.
  2. Access Prisma Cloud and select
    Settings
    Cloud Accounts
    Add New
    .
  3. Select
    Azure
    as the
    Cloud to Secure
    .
  4. On the
    Get Started
    page Enter a descriptive
    Cloud Account Name
    . Replace the auto-populated Cloud Account Name with one that will uniquely identify your Azure subscription on Prisma Cloud.
    1. Select an
      Azure Subscription or Tenant
      that you would like to Onboard.
    2. Next, choose an
      Azure Cloud Type
      .
  5. On the
    Security Capabilities and Permissions
    page, you have the option to enable permissions for the following additional capabilities. Based on your selection, Prisma Cloud dynamically generates a Terraform template that includes the associated permissions for the Prisma Cloud role. Prisma Cloud Role provides permissions for security capabilities required. By default, the role provides permissions for cloud discovery for resources and workloads, misconfiguration detection, and threat detection.
    Agentless Workload Scanning and Serverless Function Scanning are enabled by default. Workload Discovery is also automatically enabled to help you identify all the cloud-native services used on your cloud account. By default, the Prisma Cloud role is granted the appropriate permissions to monitor your cloud account.
    • Enable and add permissions for
      Agentless Workload Scanning
      to scan hosts and containers for vulnerabilities and compliance risks without having to install a Defender. Scans start automatically once an account is onboarded. You can also update the scanning configuration for Agentless scans.
    • Enable and add permissions for
      Serverless Function Scanning
      to scan cloud provider functions like AWS Lambda, Azure and Google functions for vulnerabilities and compliance. Scans are automatically initiated once an account is onboarded. You can also update the scanning configuration for Serverless scans.
    • Add permissions needed for
      Agent-Based Workload Protection
      . The permissions allow for automated deployment of Defenders to provide protection to secure cloud VMs, containers and Kubernetes orchestrators. Registry scanning, Kubernetes audits and other features required by defenders are also enabled.
    • Enable Data Security to scan your resources to prevent data leaks. This is not enabled by default. After you onboard your account, further configuration is required to enable data scans.
    • Enable
      Remediation
      to address policy violations reported for remediable Configuration policies on Prisma Cloud. This is not enabled by default. When enabled, the Prisma Cloud role gets read-write access permissions to your Azure cloud account to successfully execute remediation commands.
      Once your Azure account is onboarded on Prisma Cloud, the account is automatically available in Compute and enabled for Workload Discovery and Serverless function scans. You can also review the permissions required for individual security capabilities.
  6. Enter your Directory (Tenant) ID and Subscription ID.
    Prisma Cloud requires your Azure
    Subscription ID
    so that it can identify your Azure cloud account and retrieve the storage account and key vault information. Your
    Directory (Tenant) ID
    identifying your tenant is also required.
    1. Get the directory tenant id
      —In your Azure portal, click
      Properties
      and copy the
      Tenant ID
      .
    2. Get the subscription id
      —In your Azure portal, select
      All resources
      (Your Azure subscription)
      , and then copy
      Subscription ID
      .
  7. Enter your app details into Prisma Cloud.
    Enter the
    Application (Client) ID
    ,
    Application Client Secret
    , and
    Enterprise Application Object ID
    into the Prisma Cloud UI and click
    Next
    . These details are the output after you complete Step 1.
    Keep
    Ingest and Monitor Network Security Group Flow Logs
    enabled to view your NSG flow logs.

Add Azure Government Subscription on Prisma Cloud

Connect your Azure Government subscription on Prisma Cloud to monitor resources for potential security and compliance issues.
  1. Add your Azure subscription on Prisma Cloud.
  2. Access Prisma Cloud and select
    Settings
    Cloud Accounts
    Add New
    .
  3. Select
    Azure
    as the
    Cloud to Secure
    .
  4. Provide the basic details of the Azure account. On the
    Get Started
    page:
    1. Enter a descriptive
      Cloud Account Name
      . Replace the auto-populated Cloud Account Name with one that will uniquely identify your Azure subscription on Prisma Cloud.
    2. Onboard
      an Azure
      Subscription
      or
      Tenant
      .
    3. Select
      Government
      for the
      Azure Cloud Type
      .
  5. On the
    Security Capabilities and Permissions
    page, you have the option to enable permissions for the following additional capabilities. Based on your selection, Prisma Cloud dynamically generates a Terraform template that includes the associated permissions for the Prisma Cloud role. Prisma Cloud Role provides permissions for security capabilities required. By default, the role provides permissions for cloud discovery for resources and workloads, misconfiguration detection, and threat detection.
    Agentless Workload Scanning and Serverless Function Scanning are enabled by default. Workload Discovery is also automatically enabled to help you identify all the cloud-native services used on your cloud account. By default, the Prisma Cloud role is granted the appropriate permissions to monitor your cloud account.
    • Enable and add permissions for
      Agentless Workload Scanning
      to scan hosts and containers for vulnerabilities and compliance risks without having to install a Defender. Scans start automatically once an account is onboarded. You can also update the scanning configuration for Agentless scans.
    • Enable and add permissions for
      Serverless Function Scanning
      to scan cloud provider functions like AWS Lambda, Azure and Google functions for vulnerabilities and compliance. Scans are automatically initiated once an account is onboarded. You can also update the scanning configuration for Serverless scans.
    • Add permissions needed for
      Agent-Based Workload Protection
      . The permissions allow for automated deployment of defenders to provide protection to secure cloud VMs, containers and Kubernetes orchestrators. Registry scanning, Kubernetes audits and other features required by defenders are also enabled.
      Once your Azure account is onboarded on Prisma Cloud, the account is automatically available in Compute and enabled for Workload Discovery and Serverless function scans. You can also review the permissions required for individual security capabilities.
  6. Enter your
    Subscritption ID
    and
    Tenant ID
    . Click the
    Download Terraform Script
    button. From the Terraform script, enter your
    Application Client Secret
    ,
    Application (Client) ID
    , and the
    Enterprise Application Object ID
    .
    Select
    Ingest & Monitor Network Security Group flow logs
    to enable network incident investigations and click
    Next
    .
    Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG. You must first configure Network Security Groups on Azure and assign a storage account to enable Flow log ingestion on Prisma Cloud. Make sure that Azure Flow logs are stored within a storage account in the same region as the NSG. If you want to enable flow log ingestion, you must complete the tasks outlined in Step 9 in Register an App on Azure Active Directory. If you enable this option without setting it up on the Azure portal, Prisma Cloud will not be able to retrieve any Flow logs.
  7. Select the
    Account Groups
    you want to add and click
    Next
    .
    You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
  8. Click
    Save
    .
    If Prisma Cloud was able to successfully make an API request to retrieve the Azure flow logs, the status is displayed with a green check mark. If Prisma Cloud is unable to retrieve the logs, the error message indicates what failed. See Troubleshoot Azure Account Onboarding for help.
  9. Verify that you can view the information on your Azure resources on Prisma Cloud.
    Wait for approximately 10-24 hours after you onboard the Azure subscription to Prisma Cloud, to review the data that was collected about your Azure resources. After Prisma Cloud ingests data, the information is available for compliance checks, configuration review, audit history, and network visualization.
    It takes about four to six hours before you can view flow logs in Prisma Cloud. Prisma Cloud ingests flow logs from the previous seven days from when you onboard the account.
    1. Log in to Prisma Cloud.
    2. Select
      Investigate
      and enter the following RQL query.
      This query allows you to list all network traffic from the Internet or from Suspicious IP addresses with over 0 bytes of data transferred to a network interface on any resource on any cloud environment. Replace
      '<Your Cloud Account Name>'
      with the name of your actual cloud account.
      network from vpc.flow_record where cloud.account = '<Your Cloud Account Name>' AND source.publicnetwork IN ( 'Internet IPs', 'Suspicious IPs') AND bytes > 0

Add an Azure China Subscription on Prisma Cloud

Connect your Azure China subscription on Prisma Cloud to monitor resources for potential security and compliance issues.
You require a Prisma Cloud instance in China to monitor or monitor and protect your deployments in the Microsoft Azure China regions. To get started with monitoring your subscriptions in Azure China, gather the details listed in Register an App on Azure Active Directory from the Azure China portal. When you add the subscription, Prisma Cloud monitors the configuration metadata for your IaaS and PaaS services and identifies potential resource misconfiguration and improper exposure. It also enables you to use data ingested from event logs and network flow logs for better visibility and governance.
When you onboard your Azure China subscription on Prisma Cloud, review the following differences as compared to Azure Commercial:
  • Support for Terraform templates to onboard a cloud account for Azure China is not available.
  • On app.prismacloud.cn, you cannot onboard any accounts that are not deployed on Azure China regions.
  1. Add your Azure subscription on Prisma Cloud.
    1. Log in to Prisma Cloud.
    2. Select
      Settings
      Cloud Accounts
      Add New
    3. Select
      Cloud Type
      Azure and click
      Next
      .
    4. Enter a
      Cloud Account Name
      .
    5. Enter your Azure
      Subscription ID
      ,
      Directory (Tenant) ID
      ,
      Application (Client) ID
      ,
      Application Client Secret
      and
      Enterprise Application Object ID
      .
      These are the details you collected from the Azure portal.
    6. Select
      Ingest & Monitor Network Security Group flow logs
      and click
      Next
      .
      Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG. Make sure that Azure Flow logs are stored within a storage account in the same region as the NSG. See Register an App on Azure Active Directory for the set up details to ensure that Prisma Cloud can successfully ingest NSG flow logs.
    7. Select the
      Account Groups
      you want to add and click
      Next
      .
      You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
    8. Verify the
      Status
      and
      Save
      your changes.
      If Prisma Cloud was able to successfully make an API request to retrieve the configuration metadata, the status is displayed with a green check mark. If Prisma Cloud is unable to retrieve the logs, the error message indicates what failed.
      Review the details for the account you added on
      Settings
      Cloud Accounts
      .
  2. Verify that you can view the information on your Azure resources on Prisma Cloud.
    Wait for approximately 1 hour after you onboard the Azure subscription to Prisma Cloud, to review the data that was collected about your Azure resources. After Prisma Cloud ingests data, the information is available for asset inventory, compliance checks and configuration review.
    1. Log in to Prisma Cloud.
    2. Select
      Inventory
      Assets
      .
      View a snapshot of the current state of all cloud resources or assets that you are monitoring and securing using Prisma Cloud.

Update an Onboarded Azure Account

After onboarding your Azure account you may periodically want to review or update your existing security capabilities and permissions. Follow the steps below to enable or disable additional functionality:
  1. Navigate to
    Settings > Cloud Accounts
    . Use the
    Cloud Type
    filter in the upper-left to select only your Azure onboarded accounts.
  2. Click the edit icon in the
    Actions
    column to edit your Azure account.
  3. In the
    Compute Workload Protection
    section, you have the option to edit individual Compute capabilities.
    Workload Discovery
    is included by default in your plan. This allows you to discover all the Compute workloads in your cloud account.
  4. To edit individual security capabilities follow the steps below:
    1. To enable a function such as
      Agentless Workload Scanning
      , click the
      Enable Agentless Workload Scanning
      button.
    2. On the
      Security Capabilities & Permissions
      page toggle on the
      Agentless Workload Scanning
      function.
    3. On the Configure Account page, review your account settings and click
      Next
      .
    4. Edit the Monitored Subscriptions to include or exclude subsets of accounts within a subscription.
    5. Select or deselect the appropriate account groups to enable security capabilities on the
      Assign Account Groups
      page.
    6. Confirm your selections are checked in green under
      Review Status
      and click
      Save
      .

Recommended For You