|
| 1 | +--- |
| 2 | +title: Configure private endpoints with Microsoft Security Private Link |
| 3 | +description: Configure private endpoints with Microsoft Security Private Link to securely connect your virtual network to Microsoft Defender for Cloud. |
| 4 | +author: Elazark |
| 5 | +ms.author: elkrieger |
| 6 | +ms.topic: how-to |
| 7 | +ms.date: 01/07/2025 |
| 8 | +#customer intent: As a security administrator, I want to configure a private endpoint for Microsoft Defender for Cloud so that Defender traffic stays within my private network. |
| 9 | + |
| 10 | +--- |
| 11 | + |
| 12 | +# Configure private endpoints with Microsoft Security Private Link (Preview) |
| 13 | + |
| 14 | +Use a [private endpoint](/azure/private-link/private-endpoint-overview) with Microsoft Security Private Link to connect workloads in your private network to Microsoft Defender for Cloud over [Azure Private Link](/azure/private-link/private-link-overview). |
| 15 | + |
| 16 | +> [!NOTE] |
| 17 | +> Microsoft Security Private Link isn't supported in sovereign cloud regions, such as Azure Government and Azure operated by 21Vianet. |
| 18 | +
|
| 19 | +## Prerequisites |
| 20 | + |
| 21 | +Before you begin, make sure that: |
| 22 | + |
| 23 | +- Defender for Cloud is enabled on your Azure subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn). |
| 24 | + |
| 25 | +- A [virtual network and subnet](/azure/virtual-network/quick-create-portal) where your workloads are deployed. This is where the private endpoint is created. |
| 26 | + |
| 27 | +- You reviewed the required [roles and permissions](concept-private-links.md#roles-and-permissions). |
| 28 | + |
| 29 | +## Create a private endpoint using a Security Private Link resource (Azure portal) |
| 30 | + |
| 31 | +A Security Private Link resource must belong to a resource group. |
| 32 | + |
| 33 | +When you create a Security Private Link resource, you can create a private endpoint as part of the same workflow. |
| 34 | + |
| 35 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 36 | + |
| 37 | +1. Select **Create a resource**. |
| 38 | + |
| 39 | +1. Search for **Security Private Link**. |
| 40 | + |
| 41 | +1. Under **Security Private Link** select **Create**. |
| 42 | + |
| 43 | + :::image type="content"source="media/configure-private-endpoints/marketplace-create-security-private-link.png"alt-text="Screenshot of the Azure Marketplace showing the Security Private Link tile with the Create button."lightbox="media/configure-private-endpoints/marketplace-create-security-private-link.png"::: |
| 44 | + |
| 45 | +1. Select a subscription and an existing resource group, or create a new one. |
| 46 | + |
| 47 | +1. If needed, select a resource group location. |
| 48 | + |
| 49 | +1. Enter a name. |
| 50 | + |
| 51 | +1. Select **Next: Networking**. |
| 52 | + |
| 53 | + > [!NOTE] |
| 54 | + > Microsoft Security Private Link currently supports the **containers** sub-resource, which is used by the Defender for Containers plan. |
| 55 | +
|
| 56 | +1. Select **Create a private endpoint**. |
| 57 | + |
| 58 | +1. Enter a name and a location. |
| 59 | + |
| 60 | + :::image type="content" source="media/configure-private-endpoints/create-private-endpoint-blade-networking-tab.png" alt-text="Screenshot of the Create Security Private Link wizard on the Networking tab, showing the Create a private endpoint pane with sub-resource and Private DNS integration." lightbox="media/configure-private-endpoints/create-private-endpoint-blade-networking-tab.png"::: |
| 61 | + |
| 62 | +1. Select **containers** as the target sub-resource. |
| 63 | + |
| 64 | +1. Select the virtual network and subnet. |
| 65 | + |
| 66 | +1. Enable **Private DNS integration** to create a private DNS zone automatically. |
| 67 | + |
| 68 | +1. Select **Add**. |
| 69 | + |
| 70 | +1. Select **Next: Tags** and add any required tags. |
| 71 | + |
| 72 | +1. Select **Review + create** |
| 73 | + |
| 74 | +1. Select **Create**. |
| 75 | + |
| 76 | +## Create a private endpoint for an existing Security Private Link resource (Azure portal) |
| 77 | + |
| 78 | +If you already have a Security Private Link resource, you can create a private endpoint separately and connect it to that resource. |
| 79 | + |
| 80 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 81 | + |
| 82 | +1. Navigate to **Network foundation** > **Private Link** > **Private endpoints**. |
| 83 | + |
| 84 | +1. Select **Create**. |
| 85 | + |
| 86 | + :::image type="content" source="media/configure-private-endpoints/network-foundation-create-private-endpoint.png" alt-text="Screenshot of the Network foundation Private endpoints page, showing the Create button." lightbox="media/configure-private-endpoints/network-foundation-create-private-endpoint.png"::: |
| 87 | + |
| 88 | +1. Select a subscription and an existing resource group, or create a new one. |
| 89 | + |
| 90 | +1. Enter a name and network interface name, and select a region. |
| 91 | + |
| 92 | +1. Select **Next: Resource**. |
| 93 | + |
| 94 | + > [!NOTE] |
| 95 | + > Microsoft Security Private Link currently supports the **containers** sub-resource, which is used by the Defender for Containers plan. |
| 96 | +
|
| 97 | +1. Select **Connect to an Azure resource in my directory**. |
| 98 | + |
| 99 | +1. Select a subscription. |
| 100 | + |
| 101 | +1. Select **Microsoft.Security/privateLinks** as the resource type. |
| 102 | + |
| 103 | +1. Select the Security Private Link resource for Defender for Cloud. |
| 104 | + |
| 105 | +1. Select **containers** as the target sub-resource, then select **Next: Virtual Network**. |
| 106 | + |
| 107 | +1. Select the virtual network and the subnet. |
| 108 | + |
| 109 | +1. Leave the private IP address allocation set to **Dynamic**, then select **Next: DNS**. |
| 110 | + |
| 111 | +1. Enable **Integrate with private DNS zone** and verify that the private DNS zone is populated automatically. |
| 112 | + |
| 113 | +1. Select **Next: Tags**. |
| 114 | + |
| 115 | +1. Add any required tags. |
| 116 | + |
| 117 | +1. Select **Review + create**. |
| 118 | + |
| 119 | + 1. Select **Create**. |
| 120 | + |
| 121 | +## Approve the private endpoint connection |
| 122 | + |
| 123 | +When the private endpoint is created, a connection request is sent to the Security Private Link resource. |
| 124 | + |
| 125 | +- If the requester is an **Owner**, the connection is approved automatically. |
| 126 | + |
| 127 | +- Otherwise, an **Owner** must approve the request from **Private endpoint connections** in the Azure portal. |
| 128 | + |
| 129 | +## Validate the private endpoint connection |
| 130 | + |
| 131 | +From a workload connected to the virtual network, run: |
| 132 | + |
| 133 | +```bash |
| 134 | +nslookup api.cloud.defender.microsoft.com |
| 135 | +``` |
| 136 | + |
| 137 | +The FQDN should resolve to a private IP address under `privatelink.cloud.defender.microsoft.com`. |
| 138 | + |
| 139 | +## Related content |
| 140 | + |
| 141 | +- Learn more about [Microsoft Security Private Link for Microsoft Defender for Cloud](concept-private-links.md). |
0 commit comments