Skip to content

Commit 02d74e9

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-security-docs-pr into wi540394-Devops-security-SBOM
2 parents 39acd9a + 814b947 commit 02d74e9

35 files changed

Lines changed: 476 additions & 373 deletions

articles/defender-for-cloud/TOC.yml

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,6 @@
5252
displayName: enable, defender for cloud, activate, turn on, Microsoft Defender XDR, alerts, integration, m365, m365d, m365 defender, free, trial, free trial
5353
href: connect-azure-subscription.md
5454
- name: Connect AWS accounts
55-
displayName: hybrid, multicloud, multicloud, amazon, arc, AWS, accounts, Microsoft Defender XDR, alerts, integration, m365, m365d, m365 defender
5655
items:
5756
- name: Connect your AWS account
5857
href: quickstart-onboard-aws.md
@@ -61,8 +60,16 @@
6160
- name: Integrate AWS CloudTrail logs (Preview)
6261
href: integrate-cloud-trail.md
6362
- name: Connect GCP projects
64-
displayName: hybrid, multicloud, multicloud, google, gcp, Microsoft Defender XDR, alerts, integration, m365, m365d, m365 defender
65-
href: quickstart-onboard-gcp.md
63+
items:
64+
- name: Connect your GCP project
65+
displayName: gcp, connect, onboard
66+
href: quickstart-onboard-gcp.md
67+
- name: Configure GCP plans
68+
displayName: GCP, plans, configure
69+
href: configure-google-plans.md
70+
- name: Ingest GCP logging
71+
displayName: GCP, logging, ingest
72+
href: logging-ingestion.md
6673
- name: Connect individual non-Azure machines
6774
items:
6875
- name: Connect machines with Defender for Endpoint
@@ -1500,6 +1507,15 @@
15001507
- name: Integrate CLI with CI/CD pipelines
15011508
DisplayName: Defender for Cloud CLI, CI/CD pipelines
15021509
href: episode-fifty-nine.md
1510+
- name: Code reachability analysis
1511+
DisplayName: Code reachability analysis, reachable vulnerabilities
1512+
href: episode-sixty.md
1513+
- name: Kubernetes lateral movement
1514+
DisplayName: Kubernetes lateral movement, Kubernetes RBAC, attack paths
1515+
href: episode-sixty-one.md
1516+
- name: Kubernetes gated deployment
1517+
DisplayName: Kubernetes gated deployment, gated rules
1518+
href: episode-sixty-two.md
15031519
- name: Agentless code scanning
15041520
DisplayName: Agentless code scanning
15051521
href: episode-sixty-three.md

articles/defender-for-cloud/ai-threat-protection.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,11 @@ author: Elazark
1010

1111
# Overview - AI threat protection
1212

13-
Microsoft Defender for Cloud's threat protection for AI services identifies threats to generative AI applications in real time and helps respond to security issues.
14-
15-
Defender for Cloud's AI threat protection works with [Azure AI Content Safety Prompt Shields](/azure/ai-services/content-safety/concepts/jailbreak-detection) and Microsoft's threat intelligence to provide security alerts for threats like data leakage, data poisoning, jailbreak, and credential theft.
16-
17-
:::image type="content" source="media/ai-threat-protection/threat-protection-ai.png" alt-text="Diagram that shows how enabling, detection, and response works for threat protection." lightbox="media/ai-threat-protection/threat-protection-ai.png":::
13+
Microsoft Defender for Cloud's threat protection for AI services identifies threats to generative AI applications in real time and helps respond to security issues. Defender for Cloud's AI threat protection works with [Azure AI Content Safety Prompt Shields](/azure/ai-services/content-safety/concepts/jailbreak-detection) and Microsoft's threat intelligence to provide security alerts for threats like data leakage, data poisoning, jailbreak, and credential theft.
1814

1915
## Defender XDR integration
2016

21-
Threat protection for AI services integrates with the [Defender XDR](concept-integration-365.md), allowing security teams to centralize AI workload alerts in the Defender XDR portal.
22-
23-
Security teams can correlate AI workload alerts and incidents in the Defender XDR portal to understand the full scope of an attack, including malicious activities related to their generative AI applications.
17+
Threat protection for AI services integrates with the [Defender XDR](concept-integration-365.md), allowing security teams to centralize AI workload alerts in the Defender XDR portal. Security teams can correlate AI workload alerts and incidents in the Defender XDR portal to understand the full scope of an attack, including malicious activities related to their generative AI applications.
2418

2519
## Availability
2620

articles/defender-for-cloud/alerts-ai-workloads.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ This article lists the security alerts you might get for AI services from Micros
1919

2020
> [!NOTE]
2121
> Alerts from different sources might take different amounts of time to appear. For example, alerts that require analysis of network traffic might take longer to appear than alerts related to suspicious processes running on virtual machines.
22+
>
23+
> [!NOTE]
24+
> For alerts that are in preview: [!INCLUDE [Legalese](./includes/defender-for-cloud-preview-legal-text.md)]
2225
2326
## AI services alerts
2427

@@ -192,9 +195,6 @@ This article lists the security alerts you might get for AI services from Micros
192195

193196
**Severity**: Low
194197

195-
> [!NOTE]
196-
> For alerts that are in preview: [!INCLUDE [Legalese](./includes/defender-for-cloud-preview-legal-text.md)]
197-
198198
## Next steps
199199

200200
- [Security alerts in Microsoft Defender for Cloud](alerts-overview.md)

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ For specific regional availability and government cloud support details, see the
4747
| [Agentless discovery for Kubernetes](concept-agentless-containers.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
4848
| [Agentless VM secrets scanning](secrets-scanning-servers.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
4949
| [Agentless VM vulnerability scanning](enable-agentless-scanning-vms.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
50-
| [AI security posture management](ai-security-posture.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
50+
| [AI security posture management](ai-security-posture.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5151
| [API security posture management](api-security-posture-overview.md)| - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure |
5252
| [Attack path analysis](how-to-manage-attack-path.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, Docker Hub, JFrog Artifactory |
5353
| [Azure Kubernetes Service security dashboard (Preview)](cluster-security-dashboard.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure |

articles/defender-for-cloud/concept-private-links.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Microsoft Security Private Link allows workloads in your virtual network to conn
1414
With private endpoints, all security-related traffic from your workloads traverses the Microsoft backbone network without exposure to the public internet. This includes telemetry from Defender agents, sensors, add-ons, and extensions.
1515

1616
> [!NOTE]
17-
> Microsoft Security Private Link isn't supported in sovereign cloud regions, such as Azure Government and Azure operated by 21Vianet (21Vianet).
17+
> Microsoft Security Private Link isn't supported in sovereign cloud regions, such as Azure Government and Azure operated by 21Vianet.
1818
1919
## Supported scenarios
2020

Lines changed: 178 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,178 @@
1+
---
2+
title: Configure GCP plans
3+
description: Learn how to configure Microsoft Defender for Cloud plans for your Google Cloud Platform (GCP) projects.
4+
ms.topic: install-set-up-deploy
5+
ms.author: Elkrieger
6+
author: Elazark
7+
ms.date: 01/14/2026
8+
ms.custom: sfi-image-nochange
9+
---
10+
11+
# Configure GCP plans
12+
13+
When you onboard your Google Cloud Platform (GCP) projects to Microsoft Defender for Cloud, select the plans to enable for your projects. Each plan provides different security features and capabilities. By default, all plans are **On**, but turn off unnecessary plans.
14+
15+
### [Defender CSPM](#tab/defender-cspm)
16+
17+
Foundational CSPM is included for free with Defender for Cloud. It provides security posture management and threat protection for your GCP resources. However, to get the full value of Defender CSPM, you need to enable the Defender CSPM plan, which comes with additional costs. For more information about costs, see the [Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?msockid=37d5586afa3461fd27164e8bfbe16006).
18+
19+
Learn more about [CSPM and the differences between the plans](concept-cloud-security-posture-management.md).
20+
21+
#### Prerequisites
22+
23+
- The **Subscription Owner** must enable the plan.
24+
- To enable Cloud Infrastructure Entitlement Management (CIEM) capabilities, the Entra ID account used for the onboarding process must have either the **Application Administrator** or **Cloud Application Administrator** directory role for your tenant (or equivalent administrator rights to create app registrations). This requirement is only necessary during the onboarding process.
25+
26+
#### Configuration
27+
28+
To configure the Defender CSPM plan:
29+
30+
1. Sign in to the [Azure portal](https://portal.azure.com).
31+
32+
1. Search for and select **Microsoft Defender for Cloud**.
33+
34+
1. Go to **Environment settings**.
35+
36+
1. Select the relevant GCP connector.
37+
38+
1. Locate the Defender CSPM row and select **Settings**.
39+
40+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for configuring the Defender CSPM plan." lightbox="media/quickstart-onboard-gcp/view-configuration.png":::
41+
42+
1. Toggle the switches to **On** or **Off**, depending on your need. To get the full value of Defender CSPM, turn all toggles to **On**.
43+
44+
:::image type="content" source="media/quickstart-onboard-gcp/cspm-configuration.png" alt-text="Screenshot that shows toggles for Defender CSPM." lightbox="media/quickstart-onboard-gcp/cspm-configuration.png":::
45+
46+
1. Select **Save**.
47+
48+
1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions.
49+
50+
### [Defender for Servers](#tab/defender-for-servers)
51+
52+
[Defender for Servers](defender-for-servers-overview.md) brings threat detection and advanced defenses to your GCP virtual machine (VM) instances. To have full visibility into Defender for Servers security content, connect your GCP VM instances to Azure Arc.
53+
54+
#### Prerequisites
55+
56+
- Azure Arc for servers installed on your VM instances.
57+
58+
Use the autoprovisioning process to install Azure Arc on your VM instances. Autoprovisioning is enabled by default in the onboarding process and requires **Owner** permissions on the subscription. The Azure Arc autoprovisioning process uses the [OS Config agent on the GCP machines](https://cloud.google.com/compute/docs/images/os-details#vm-manager).
59+
60+
The Azure Arc autoprovisioning process uses the VM manager on GCP to enforce policies on your VMs through the OS Config agent. A VM that has an [active OS Config agent](https://cloud.google.com/compute/docs/manage-os#agent-state) incurs a cost according to GCP. To see how this cost might affect your account, refer to the [GCP technical documentation](https://cloud.google.com/compute/docs/vm-manager#pricing).
61+
62+
Defender for Servers doesn't install the OS Config agent to a VM that doesn't have it installed. However, Defender for Servers enables communication between the OS Config agent and the OS Config service if the agent is already installed but not communicating with the service. This communication can change the OS Config agent from `inactive` to `active` and lead to more costs.
63+
64+
Alternatively, you can manually connect your VM instances to Azure Arc for servers. Instances in projects with the Defender for Servers plan enabled that aren't connected to Azure Arc are surfaced by the recommendation **GCP VM instances should be connected to Azure Arc**. Select the **Fix** option in the recommendation to install Azure Arc on the selected machines.
65+
66+
The respective Azure Arc servers for GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of [Disconnected or Expired](/azure/azure-arc/servers/overview)) are removed after seven days. This process removes irrelevant Azure Arc entities to ensure that only Azure Arc servers related to existing instances are displayed.
67+
68+
Ensure that you fulfill the [network requirements for Azure Arc](/azure/azure-arc/servers/network-requirements?tabs=azure-cloud).
69+
70+
Enable these other extensions on the Azure Arc-connected machines:
71+
72+
- Defender for Endpoint
73+
- A vulnerability assessment solution (Microsoft Defender Vulnerability Management or Qualys)
74+
75+
Defender for Servers assigns tags to your Azure Arc GCP resources to manage the autoprovisioning process. You must have these tags properly assigned to your resources so that Defender for Servers can manage your resources: `Cloud`, `InstanceName`, `MDFCSecurityConnector`, `MachineId`, `ProjectId`, and `ProjectNumber`.
76+
77+
#### Configuration
78+
79+
1. Sign in to the [Azure portal](https://portal.azure.com).
80+
81+
1. Search for and select **Microsoft Defender for Cloud**.
82+
83+
1. Go to **Environment settings**.
84+
85+
1. Select the relevant GCP connector.
86+
87+
1. Locate the Defender for Servers row and select **Settings**.
88+
89+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for the settings are located." lightbox="media/quickstart-onboard-gcp/view-configuration.png":::
90+
91+
1. Toggle the switches to **On** or **Off**, depending on your need.
92+
93+
:::image type="content" source="media/quickstart-onboard-gcp/auto-provision-screen.png" alt-text="Screenshot that shows the toggles for the Defender for Servers plan." lightbox="media/quickstart-onboard-gcp/auto-provision-screen.png":::
94+
95+
If **Azure Arc agent** is **Off**, you need to follow the manual installation process mentioned earlier.
96+
97+
1. Select **Save**.
98+
99+
1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions.
100+
101+
### [Defender for Databases](#tab/defender-for-databases)
102+
103+
[Defender for Databases](defender-for-databases-overview.md) brings advanced threat protection to your GCP Cloud SQL instances. Defender for Databases provides vulnerability assessments and advanced threat detection capabilities for your GCP VM instances that are connected to Azure Arc.
104+
105+
#### Configuration
106+
107+
1. Sign in to the [Azure portal](https://portal.azure.com).
108+
109+
1. Search for and select **Microsoft Defender for Cloud**.
110+
111+
1. Go to **Environment settings**.
112+
113+
1. Select the relevant GCP connector.
114+
115+
1. Locate the Defender for Databases row and select **Settings**.
116+
117+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for the settings are located." lightbox="media/quickstart-onboard-gcp/view-configuration.png":::
118+
119+
1. Toggle the switches to **On** or **Off**, depending on your need.
120+
121+
:::image type="content" source="media/quickstart-onboard-gcp/auto-provision-databases-screen.png" alt-text="Screenshot that shows the toggles for the Defender for Databases plan." lightbox="media/quickstart-onboard-gcp/auto-provision-databases-screen-big.png":::
122+
123+
If the toggle for Azure Arc is **Off**, you need to follow the manual installation process mentioned earlier.
124+
125+
1. Select **Save**.
126+
127+
1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions.
128+
129+
### [Defender for Containers](#tab/defender-for-containers)
130+
131+
[Defender for Containers](defender-for-containers-introduction.md) brings threat detection and advanced defenses to your GCP Google Kubernetes Engine (GKE) Standard clusters. To get the full security value out of Defender for Containers and to fully protect GCP clusters, ensure that you meet the following requirements.
132+
133+
> [!NOTE]
134+
>
135+
> - If you choose to disable the available configuration options, the deployment process doesn't deploy any agents or components to your clusters. [Learn more about feature availability](support-matrix-defender-for-containers.md).
136+
> - When you deploy Defender for Containers on GCP, it might incur external costs such as [logging costs](https://cloud.google.com/stackdriver/pricing), [pub/sub costs](https://cloud.google.com/pubsub/pricing), and [egress costs](https://cloud.google.com/vpc/network-pricing#:~:text=Platform%20SKUs%20apply.-%2cInternet%20egress%20rates%2c-Premium%20Tier%20pricing).
137+
138+
- **Kubernetes audit logs to Defender for Cloud**: Enabled by default. This configuration is available at the GCP project level only. It provides agentless collection of the audit log data through [GCP Cloud Logging](https://cloud.google.com/logging/) to the Defender for Cloud back end for further analysis. Defender for Containers requires control plane audit logs to provide [runtime threat protection](defender-for-containers-introduction.md#run-time-protection-for-kubernetes-nodes-and-clusters). To send Kubernetes audit logs to Defender, toggle the setting to **On**.
139+
140+
> [!NOTE]
141+
> If you disable this configuration, the `Threat detection (control plane)` feature is disabled. Learn more about [features availability](support-matrix-defender-for-containers.md).
142+
143+
- **Auto provision Defender's sensor for Azure Arc** and **Auto provision Azure Policy extension for Azure Arc**: Enabled by default. You can install Azure Arc-enabled Kubernetes and its extensions on your GKE clusters in three ways:
144+
- Enable Defender for Containers autoprovisioning at the project level, as explained in the instructions in this section. Use this method.
145+
- Use Defender for Cloud recommendations for per-cluster installation. They appear on the Defender for Cloud recommendations page. [Learn how to deploy the solution to specific clusters](defender-for-containers-enable.md?tabs=defender-for-container-gke#deploy-the-solution-to-specific-clusters).
146+
- Manually install [Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/quickstart-connect-cluster) and [extensions](/azure/azure-arc/kubernetes/extensions).
147+
148+
- The [K8S API access](defender-for-containers-architecture.md#how-does-agentless-discovery-for-kubernetes-in-gcp-work) feature provides API-based discovery of your Kubernetes clusters. To enable, set the **K8S API access** toggle to **On**.
149+
- The [Registry access](agentless-vulnerability-assessment-gcp.md) feature provides vulnerability management for images stored in Google Container Registry (GCR) and Google Artifact Registry (GAR) and running images on your GKE clusters. To enable, set the **Registry access** toggle to **On**.
150+
151+
#### Configuration
152+
153+
1. Sign in to the [Azure portal](https://portal.azure.com).
154+
155+
1. Search for and select **Microsoft Defender for Cloud**.
156+
157+
1. Go to **Environment settings**.
158+
159+
1. Select the relevant GCP connector.
160+
161+
1. Locate the Defender for Containers row and select **Settings**.
162+
163+
:::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for the settings are located." lightbox="media/quickstart-onboard-gcp/view-configuration.png":::
164+
165+
1. Toggle the switches to **On** or **Off**, depending on your need.
166+
167+
:::image type="content" source="media/tutorial-enable-containers-gcp/containers-settings-gcp.png" alt-text="Screenshot of Defender for Cloud's environment settings page showing the settings for the Containers plan." lightbox="media/tutorial-enable-containers-gcp/containers-settings-gcp.png":::
168+
169+
1. Select **Save**.
170+
171+
1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions.
172+
173+
---
174+
175+
## Next step
176+
177+
> [!div class="nextstep"]
178+
> [Ingest GCP cloud logging with Pub/Sub (Preview)](logging-ingestion.md)

0 commit comments

Comments
 (0)