Add an Azure Government Tenant on Prisma Cloud

Learn how to onboard your Azure Government tenant with and without management groups on Prisma Cloud to monitor and secure your Azure government resources.
Connecting Prisma ™ Cloud to your Azure government tenant enables you to ingest your cloud resources and configurati-on metadata so that Prisma Cloud can monitor your Azure government resources for security violations. There are two workflows for onboarding Azure government: with management groups which enables you to organize your Azure resources into a logical hierarchy for more granular monitoring, and without management groups.

Add an Azure Government Tenant With Management Groups

This workflow onboards your Azure government resources with management groups to Prisma Cloud so that you can organize your Azure government resources into a logical hierarchy for more granular monitoring and alerting.
  1. Select Azure as the cloud type to onboard.
    1. Select
      Settings
      Cloud Accounts
      Add Cloud Account
      Azure
      .
  2. Configure the initial onboarding options.
    • Cloud Account Name
      —Enter a descriptive name to represent the cloud account that you will onboard to Prisma Cloud.
    • Onboard
      —Select
      Azure Tenant
      .
    • Azure Cloud Type
      —Select
      Government
      to onboard your Microsoft Azure (Government) account.
    • Onboard Azure Management Groups and Subscriptions
      —Keep this option selected to include onboarding management groups.
  3. Register an app on Azure Government.
    To register an app on Azure Government, ensure that you have access to the following prerequisites:
    • A Prisma Cloud tenant with permissions to onboard a cloud account.
    • Access to Azure Government with the permissions to:
      • Create an app registration (service principal).
      • Create a custom role.
      • Assign IAM roles at the tenant root level.
      • Assign GraphAPI permissions at the tenant level.
      • Grant admin consent for Azure AD Graph APIs.
  4. Register a new app.
    1. Log in to Azure Government.
    2. Select
      Azure Active Directory
      App registrations
      + New registration
      .
    3. Enter the application name.
    4. Select the supported account types.
      You have the options of choosing from single tenant, multitenant, multitenant and personal Microsoft accounts, or personal Microsoft accounts only.
    5. Optional
      —Enter the Redirect URI.
      The authentication response of the app will be returned to this URI.
    6. Click
      Register
      .
    7. Copy
      Application (client) ID
      and
      Directory (tenant) ID
      to a secure location on your computer. You will later enter these details into the Prisma Cloud UI.
  5. Create the client secret.
    The client secret is a secret string that the application uses to prove its identity when requesting a token.
    1. Select
      Certificates & secrets
      + New client secret
      .
    2. Enter a client
      Description
      , select
      Expires
      to configure how long the client secret lasts, and
      Add
      .
    3. Copy
      Value
      to a secure location.
    Make sure that you copy
    Value
    and not
    Secret ID
    .
  6. Get the Object ID.
    1. Select
      Azure active directory
      Enterprise applications
      , and search for the app you previously created in the search box.
    2. Copy
      Object ID
      to a secure location on your computer.
      Make sure that you get the
      Object ID
      for the Prisma Cloud application from
      Enterprise Applications
      All applications
      on the Azure portal—not from
      App Registrations
      .
  7. Add the Microsoft Graph APIs.
    1. Navigate to the app you previously registered.
      Select
      Azure Active Directory
      App registrations
      , and select your app.
    2. Navigate to Microsoft Graph.
      Select
      API permissions
      + Add a permission
      Microsoft Graph
      Application permissions
      .
    3. Add the permissions.
      Enter the permission name in
      Select permissions
      , and select the name from
      Permission
      .
      Add the following permissions:
      • User.Read.All
      • Policy.Read.All
      • Group.Read.All
      • GroupMember.Read.All
      • Reports.Read.All
      • Directory.Read.All
      • Domain.Read.All
      • Application.Read.All
  8. Grant admin consent for Default Directory.
    1. Select
      Grant admin consent for Default Directory
      Yes
      .
    2. Verify that the permissions are granted.
      You should see green check marks under the
      Status
      column.
  9. Configure account.
    Enter the
    Directory (Tenant) ID
    ,
    Application (Client) ID
    ,
    Application Client Secret,
    and
    Enterprise Application Object ID
    into the Prisma Cloud UI.
    • (
      Optional
      )
      Enable Network Security Flow Logs
      —If you want to view NSG flow logs on Prisma Cloud, ensure that
      Ingest and Monitor Network Security Group Flow Logs
      is selected.
    If
    Ingest and Monitor Network Security Group Flow Logs
    is selected on Prisma Cloud, authenticate into Azure portal and complete the following steps:
    • Your Azure storage account stores the flow logs that are required for Prisma Cloud to monitor and analyze network traffic. When Prisma Cloud ingests the data in these logs, you can interact with the information in Prisma Cloud. For example, you can run queries against the data, visualize network topology, and investigate traffic flows between two instances. You can also apply network policies to this traffic.
      If you do not have regulatory guidelines that specify a log retention period to which you must adhere, we recommend you set retention to at least 15 days.
  10. Add account groups.
    Navigate to the Prisma Cloud UI and select the
    Account Groups
    you want to add and click
    Next
    .You must assign each cloud account to an account group, and to associate the account group with it to generate alerts when a policy violation occurs.
  11. Verify the
    Status
    and
    Done
    to save your changes.
    If Prisma Cloud is able to validate the credentials by making an authentication call using the credentials provided in the previous step, it displays a green check mark.

Add an Azure Government Tenant Without Management Groups

This workflow onboards your Azure government accounts without management groups to onboard your Azure government resources to Prisma Cloud.
  1. Select Azure as the cloud type to onboard.
    1. Select
      Settings
      Cloud Accounts
      Add Cloud Account
      Azure
      .
  2. Configure the initial onboarding options.
    • Cloud Account Name
      —Enter a descriptive name to represent the cloud account that you will onboard to Prisma Cloud.
    • Onboard
      —Select
      Azure Tenant
      to onboard your Azure AD tenant.
    • Azure Cloud Type
      —Select
      Government
      to onboard your Microsoft Azure (Government) account.
    • Onboard Azure Management Groups and Subscriptions
      —Deselect this option to exclude onboarding management groups and click
      Next
      .
  3. Register an app on Azure Government.
    To register an app on Azure Government, ensure that you have access to the following prerequisites:
    • A Prisma Cloud tenant with permissions to onboard a cloud account.
    • Access to Azure Government with the permissions to:
      • Create an app registration (service principal).
      • Create a custom role.
      • Assign IAM roles at the tenant root level.
      • Assign GraphAPI permissions at the tenant level.
      • Grant admin consent for Azure AD Graph APIs.
  4. Register a new app.
    1. Log in to Azure Government.
    2. Select
      Azure Active Directory
      App registrations
      + New registration
      .
    3. Enter the application name.
    4. Select the supported account types.
      You have the options of choosing from single tenant, multitenant, multitenant and personal Microsoft accounts, or personal Microsoft accounts only.
    5. Optional
      —Enter the Redirect URI.
      The authentication response of the app will be returned to this URI.
    6. Click
      Register
      .
    7. Copy
      Application (client) ID
      and
      Directory (tenant) ID
      to a secure location on your computer. You will later enter these details into the Prisma Cloud UI.
  5. Create the client secret.
    The client secret is a secret string that the application uses to prove its identity when requesting a token.
    1. Select
      Certificates & secrets
      + New client secret
      .
    2. Enter a client
      Description
      , select
      Expires
      to configure how long the client secret lasts, and
      Add
      .
    3. Copy
      Value
      to a secure location.
    Make sure that you copy
    Value
    and not
    Secret ID
    .
  6. Get the Object ID.
    1. Select
      Azure active directory
      Enterprise applications
      , and search for the app you previously created in the search box.
    2. Copy
      Object ID
      to a secure location on your computer.
      Make sure that you get the
      Object ID
      for the Prisma Cloud application from
      Enterprise Applications
      All applications
      on the Azure portal—not from
      App Registrations
      .
  7. Add roles to the root group.
    The following roles should be added to the root group:
    • Reader
    • Reader and Data Access
    • Network Contributor
    • Storage Account Contributor
    • Optional
    1. To add these roles, click
      Home
      under header to get back to azure portal.
    2. Add role assignment.
      • Select
        Management groups
        Tenant Root Group
        (your azure subscription)
        Access control (IAM)
        Role assignments
        + Add
        Add role assignment
        .
      • Search by role
        —Enter the name of the role you want to search for in the search box—for example—
        reader
        . Click on the role name in the results, and then
        Next
        .
      • Select members
        —Modify
        Assign access to
        to assign the role to a
        User, group, or service principal
        —or—
        Managed identity
        . Click
        +Select members
        and then type in the name of the app you previously created in the search box to assign the role to your app. Click
        Select
        and then
        Next
        .
      • Click
        Review + assign
        .
      • Repeat these steps to add the
        Reader and Data Access
        ,
        Network Contributor
        , and
        Storage Account Contributor
        roles.
  8. Verify that all the roles have been added.
    1. Select
      Role assignments
      .
    2. Enter the name of your app in the search form and view the roles that have been added.
  9. Add the Microsoft Graph APIs.
    1. Navigate to the app you previously registered.
      Select
      Azure Active Directory
      App registrations
      , and select your app.
    2. Navigate to Microsoft Graph.
      Select
      API permissions
      + Add a permission
      Microsoft Graph
      Application permissions
      .
    3. Add the permissions.
      Enter the permission name in
      Select permissions
      , and select the name from
      Permission
      .
      Add the following permissions:
      • User.Read.All
      • Policy.Read.All
      • Group.Read.All
      • GroupMember.Read.All
      • Reports.Read.All
      • Directory.Read.All
      • Domain.Read.All
      • Application.Read.All
  10. Grant admin consent for Default Directory.
    1. Select
      Grant admin consent for Default Directory
      Yes
      .
    2. Verify that the permissions are granted.
      You should see green check marks under the
      Status
      column.
  11. Configure account.
    Enter the
    Directory (Tenant) ID
    ,
    Application (Client) ID
    ,
    Application Client Secret,
    and
    Enterprise Application Object ID
    into the Prisma Cloud UI.
    • (
      Optional
      )
      Enable Network Security Flow Logs
      —If you want to view NSG flow logs on Prisma Cloud, ensure that
      Ingest and Monitor Network Security Group Flow Logs
      is selected.
    If
    Ingest and Monitor Network Security Group Flow Logs
    is selected on Prisma Cloud, authenticate into Azure portal and complete the following steps:
    • Your Azure storage account stores the flow logs that are required for Prisma Cloud to monitor and analyze network traffic. When Prisma Cloud ingests the data in these logs, you can interact with the information in Prisma Cloud. For example, you can run queries against the data, visualize network topology, and investigate traffic flows between two instances. You can also apply network policies to this traffic.
      If you do not have regulatory guidelines that specify a log retention period to which you must adhere, we recommend you set retention to at least 15 days.
  12. Add account groups.
    Navigate to the Prisma Cloud UI and select the
    Account Groups
    you want to add and click
    Next
    .You must assign each cloud account to an account group, and to associate the account group with it to generate alerts when a policy violation occurs.
  13. Verify the
    Status
    and
    Done
    to save your changes.
    If Prisma Cloud is able to validate the credentials by making an authentication call using the credentials provided in the previous step, it displays a green check mark.

Recommended For You