Azure-Sentinel/Playbooks/Update-AzureDefenderDataCon...
swiftsolves-msft 6f86fdcf6d Update readme.md
included asc policy links and fixed deploy to azure button
2021-07-21 10:16:24 -04:00
..
azuredeploy.json Update-AzureDefenderDataConnector 2021-07-13 18:14:38 -04:00
readme.md Update readme.md 2021-07-21 10:16:24 -04:00

readme.md

Update-AzureDefenderDataConnector

authors: Sean Stark, Nathan Swift

This Logic App will act as a 15min synchronizer between new Azure subscriptions created and your Azure Sentinel Azure Defender Data Connector being enabled for the new Azure subscriptions to generate Azure Defender alerts into Azure Sentinel.

Deploy to Azure

Deploy to Azure Deploy to Azure Gov

Additional Post Install Notes:

The Logic App creates and uses a Managed System Identity (MSI) to authenticate and authorize against management.azure.com to find Azure Subscriptions, Find Azure Subscriptions enabled on Azure Sentinel - Azure Defender Data Connector and updates the Azure Sentinel - Azure Defender Data Connector to enable any new subscriptions found not enabled.

Assign RBAC 'Security Reader' and 'Azure Sentinel Contributor' role to the Logic App at the Root Management Group or targeted Management Group level.

New Azure subscriptions most likely will not have microsoft.security resource provider enabled. To enable programatically you can use the custom Azure Policies found in Azure Security Center GitHub Here: or leverage the Built In Azure Policy 'Enable Azure Security Center on your subscription' link to Azure Portal Policy redirect here. Be sure to assign the Azure policy at the Root Management Group or targeted Management Group level. If resource provider microsoft.security is not enabled Logic App will fail on last action 'PUT DataConnector' with a 401 Unauthorized - Access Denied.