|
| 1 | +--- |
| 2 | +title: Configure GCP plans |
| 3 | +description: Learn how to configure Microsoft Defender for Cloud plans for your Google Cloud Platform (GCP) projects. |
| 4 | +ms.topic: install-set-up-deploy |
| 5 | +ms.author: Elkrieger |
| 6 | +author: Elazark |
| 7 | +ms.date: 01/14/2026 |
| 8 | +ms.custom: sfi-image-nochange |
| 9 | +--- |
| 10 | + |
| 11 | +# Configure GCP plans |
| 12 | + |
| 13 | +When you onboard your Google Cloud Platform (GCP) projects to Microsoft Defender for Cloud, select the plans to enable for your projects. Each plan provides different security features and capabilities. By default, all plans are **On**, but turn off unnecessary plans. |
| 14 | + |
| 15 | +### [Defender CSPM](#tab/defender-cspm) |
| 16 | + |
| 17 | +Foundational CSPM is included for free with Defender for Cloud. It provides security posture management and threat protection for your GCP resources. However, to get the full value of Defender CSPM, you need to enable the Defender CSPM plan, which comes with additional costs. For more information about costs, see the [Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?msockid=37d5586afa3461fd27164e8bfbe16006). |
| 18 | + |
| 19 | +Learn more about [CSPM and the differences between the plans](concept-cloud-security-posture-management.md). |
| 20 | + |
| 21 | +#### Prerequisites |
| 22 | + |
| 23 | +- The **Subscription Owner** must enable the plan. |
| 24 | +- To enable Cloud Infrastructure Entitlement Management (CIEM) capabilities, the Entra ID account used for the onboarding process must have either the **Application Administrator** or **Cloud Application Administrator** directory role for your tenant (or equivalent administrator rights to create app registrations). This requirement is only necessary during the onboarding process. |
| 25 | + |
| 26 | +#### Configuration |
| 27 | + |
| 28 | +To configure the Defender CSPM plan: |
| 29 | + |
| 30 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 31 | + |
| 32 | +1. Search for and select **Microsoft Defender for Cloud**. |
| 33 | + |
| 34 | +1. Go to **Environment settings**. |
| 35 | + |
| 36 | +1. Select the relevant GCP connector. |
| 37 | + |
| 38 | +1. Locate the Defender CSPM row and select **Settings**. |
| 39 | + |
| 40 | + :::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for configuring the Defender CSPM plan." lightbox="media/quickstart-onboard-gcp/view-configuration.png"::: |
| 41 | + |
| 42 | +1. Toggle the switches to **On** or **Off**, depending on your need. To get the full value of Defender CSPM, turn all toggles to **On**. |
| 43 | + |
| 44 | + :::image type="content" source="media/quickstart-onboard-gcp/cspm-configuration.png" alt-text="Screenshot that shows toggles for Defender CSPM." lightbox="media/quickstart-onboard-gcp/cspm-configuration.png"::: |
| 45 | + |
| 46 | +1. Select **Save**. |
| 47 | + |
| 48 | +1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions. |
| 49 | + |
| 50 | +### [Defender for Servers](#tab/defender-for-servers) |
| 51 | + |
| 52 | +[Defender for Servers](defender-for-servers-overview.md) brings threat detection and advanced defenses to your GCP virtual machine (VM) instances. To have full visibility into Defender for Servers security content, connect your GCP VM instances to Azure Arc. |
| 53 | + |
| 54 | +#### Prerequisites |
| 55 | + |
| 56 | +- Azure Arc for servers installed on your VM instances. |
| 57 | + |
| 58 | +Use the autoprovisioning process to install Azure Arc on your VM instances. Autoprovisioning is enabled by default in the onboarding process and requires **Owner** permissions on the subscription. The Azure Arc autoprovisioning process uses the [OS Config agent on the GCP machines](https://cloud.google.com/compute/docs/images/os-details#vm-manager). |
| 59 | + |
| 60 | +The Azure Arc autoprovisioning process uses the VM manager on GCP to enforce policies on your VMs through the OS Config agent. A VM that has an [active OS Config agent](https://cloud.google.com/compute/docs/manage-os#agent-state) incurs a cost according to GCP. To see how this cost might affect your account, refer to the [GCP technical documentation](https://cloud.google.com/compute/docs/vm-manager#pricing). |
| 61 | + |
| 62 | +Defender for Servers doesn't install the OS Config agent to a VM that doesn't have it installed. However, Defender for Servers enables communication between the OS Config agent and the OS Config service if the agent is already installed but not communicating with the service. This communication can change the OS Config agent from `inactive` to `active` and lead to more costs. |
| 63 | + |
| 64 | +Alternatively, you can manually connect your VM instances to Azure Arc for servers. Instances in projects with the Defender for Servers plan enabled that aren't connected to Azure Arc are surfaced by the recommendation **GCP VM instances should be connected to Azure Arc**. Select the **Fix** option in the recommendation to install Azure Arc on the selected machines. |
| 65 | + |
| 66 | +The respective Azure Arc servers for GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of [Disconnected or Expired](/azure/azure-arc/servers/overview)) are removed after seven days. This process removes irrelevant Azure Arc entities to ensure that only Azure Arc servers related to existing instances are displayed. |
| 67 | + |
| 68 | +Ensure that you fulfill the [network requirements for Azure Arc](/azure/azure-arc/servers/network-requirements?tabs=azure-cloud). |
| 69 | + |
| 70 | +Enable these other extensions on the Azure Arc-connected machines: |
| 71 | + |
| 72 | +- Defender for Endpoint |
| 73 | +- A vulnerability assessment solution (Microsoft Defender Vulnerability Management or Qualys) |
| 74 | + |
| 75 | +Defender for Servers assigns tags to your Azure Arc GCP resources to manage the autoprovisioning process. You must have these tags properly assigned to your resources so that Defender for Servers can manage your resources: `Cloud`, `InstanceName`, `MDFCSecurityConnector`, `MachineId`, `ProjectId`, and `ProjectNumber`. |
| 76 | + |
| 77 | +#### Configuration |
| 78 | + |
| 79 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 80 | + |
| 81 | +1. Search for and select **Microsoft Defender for Cloud**. |
| 82 | + |
| 83 | +1. Go to **Environment settings**. |
| 84 | + |
| 85 | +1. Select the relevant GCP connector. |
| 86 | + |
| 87 | +1. Locate the Defender for Servers row and select **Settings**. |
| 88 | + |
| 89 | + :::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for the settings are located." lightbox="media/quickstart-onboard-gcp/view-configuration.png"::: |
| 90 | + |
| 91 | +1. Toggle the switches to **On** or **Off**, depending on your need. |
| 92 | + |
| 93 | + :::image type="content" source="media/quickstart-onboard-gcp/auto-provision-screen.png" alt-text="Screenshot that shows the toggles for the Defender for Servers plan." lightbox="media/quickstart-onboard-gcp/auto-provision-screen.png"::: |
| 94 | + |
| 95 | + If **Azure Arc agent** is **Off**, you need to follow the manual installation process mentioned earlier. |
| 96 | + |
| 97 | +1. Select **Save**. |
| 98 | + |
| 99 | +1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions. |
| 100 | + |
| 101 | +### [Defender for Databases](#tab/defender-for-databases) |
| 102 | + |
| 103 | +[Defender for Databases](defender-for-databases-overview.md) brings advanced threat protection to your GCP Cloud SQL instances. Defender for Databases provides vulnerability assessments and advanced threat detection capabilities for your GCP VM instances that are connected to Azure Arc. |
| 104 | + |
| 105 | +#### Configuration |
| 106 | + |
| 107 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 108 | + |
| 109 | +1. Search for and select **Microsoft Defender for Cloud**. |
| 110 | + |
| 111 | +1. Go to **Environment settings**. |
| 112 | + |
| 113 | +1. Select the relevant GCP connector. |
| 114 | + |
| 115 | +1. Locate the Defender for Databases row and select **Settings**. |
| 116 | + |
| 117 | + :::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for the settings are located." lightbox="media/quickstart-onboard-gcp/view-configuration.png"::: |
| 118 | + |
| 119 | +1. Toggle the switches to **On** or **Off**, depending on your need. |
| 120 | + |
| 121 | + :::image type="content" source="media/quickstart-onboard-gcp/auto-provision-databases-screen.png" alt-text="Screenshot that shows the toggles for the Defender for Databases plan." lightbox="media/quickstart-onboard-gcp/auto-provision-databases-screen-big.png"::: |
| 122 | + |
| 123 | + If the toggle for Azure Arc is **Off**, you need to follow the manual installation process mentioned earlier. |
| 124 | + |
| 125 | +1. Select **Save**. |
| 126 | + |
| 127 | +1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions. |
| 128 | + |
| 129 | +### [Defender for Containers](#tab/defender-for-containers) |
| 130 | + |
| 131 | +[Defender for Containers](defender-for-containers-introduction.md) brings threat detection and advanced defenses to your GCP Google Kubernetes Engine (GKE) Standard clusters. To get the full security value out of Defender for Containers and to fully protect GCP clusters, ensure that you meet the following requirements. |
| 132 | + |
| 133 | +> [!NOTE] |
| 134 | +> |
| 135 | +> - If you choose to disable the available configuration options, the deployment process doesn't deploy any agents or components to your clusters. [Learn more about feature availability](support-matrix-defender-for-containers.md). |
| 136 | +> - When you deploy Defender for Containers on GCP, it might incur external costs such as [logging costs](https://cloud.google.com/stackdriver/pricing), [pub/sub costs](https://cloud.google.com/pubsub/pricing), and [egress costs](https://cloud.google.com/vpc/network-pricing#:~:text=Platform%20SKUs%20apply.-%2cInternet%20egress%20rates%2c-Premium%20Tier%20pricing). |
| 137 | +
|
| 138 | +- **Kubernetes audit logs to Defender for Cloud**: Enabled by default. This configuration is available at the GCP project level only. It provides agentless collection of the audit log data through [GCP Cloud Logging](https://cloud.google.com/logging/) to the Defender for Cloud back end for further analysis. Defender for Containers requires control plane audit logs to provide [runtime threat protection](defender-for-containers-introduction.md#run-time-protection-for-kubernetes-nodes-and-clusters). To send Kubernetes audit logs to Defender, toggle the setting to **On**. |
| 139 | + |
| 140 | + > [!NOTE] |
| 141 | + > If you disable this configuration, the `Threat detection (control plane)` feature is disabled. Learn more about [features availability](support-matrix-defender-for-containers.md). |
| 142 | +
|
| 143 | +- **Auto provision Defender's sensor for Azure Arc** and **Auto provision Azure Policy extension for Azure Arc**: Enabled by default. You can install Azure Arc-enabled Kubernetes and its extensions on your GKE clusters in three ways: |
| 144 | + - Enable Defender for Containers autoprovisioning at the project level, as explained in the instructions in this section. Use this method. |
| 145 | + - Use Defender for Cloud recommendations for per-cluster installation. They appear on the Defender for Cloud recommendations page. [Learn how to deploy the solution to specific clusters](defender-for-containers-enable.md?tabs=defender-for-container-gke#deploy-the-solution-to-specific-clusters). |
| 146 | + - Manually install [Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/quickstart-connect-cluster) and [extensions](/azure/azure-arc/kubernetes/extensions). |
| 147 | + |
| 148 | +- The [K8S API access](defender-for-containers-architecture.md#how-does-agentless-discovery-for-kubernetes-in-gcp-work) feature provides API-based discovery of your Kubernetes clusters. To enable, set the **K8S API access** toggle to **On**. |
| 149 | +- The [Registry access](agentless-vulnerability-assessment-gcp.md) feature provides vulnerability management for images stored in Google Container Registry (GCR) and Google Artifact Registry (GAR) and running images on your GKE clusters. To enable, set the **Registry access** toggle to **On**. |
| 150 | + |
| 151 | +#### Configuration |
| 152 | + |
| 153 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 154 | + |
| 155 | +1. Search for and select **Microsoft Defender for Cloud**. |
| 156 | + |
| 157 | +1. Go to **Environment settings**. |
| 158 | + |
| 159 | +1. Select the relevant GCP connector. |
| 160 | + |
| 161 | +1. Locate the Defender for Containers row and select **Settings**. |
| 162 | + |
| 163 | + :::image type="content" source="media/quickstart-onboard-gcp/view-configuration.png" alt-text="Screenshot that shows the link for the settings are located." lightbox="media/quickstart-onboard-gcp/view-configuration.png"::: |
| 164 | + |
| 165 | +1. Toggle the switches to **On** or **Off**, depending on your need. |
| 166 | + |
| 167 | + :::image type="content" source="media/tutorial-enable-containers-gcp/containers-settings-gcp.png" alt-text="Screenshot of Defender for Cloud's environment settings page showing the settings for the Containers plan." lightbox="media/tutorial-enable-containers-gcp/containers-settings-gcp.png"::: |
| 168 | + |
| 169 | +1. Select **Save**. |
| 170 | + |
| 171 | +1. Continue from step 8 of the [Connect your GCP project](quickstart-onboard-gcp.md#connect-your-gcp-project) instructions. |
| 172 | + |
| 173 | +--- |
| 174 | + |
| 175 | +## Next step |
| 176 | + |
| 177 | +> [!div class="nextstep"] |
| 178 | +> [Ingest GCP cloud logging with Pub/Sub (Preview)](logging-ingestion.md) |
0 commit comments