Skip to content

Commit 15ef1ce

Browse files
authored
Merge pull request #54231 from MicrosoftDocs/NEW-connect-hybrid-multicloud-environments-defender
Push from release branch to Main
2 parents 5553b0f + 8c16b49 commit 15ef1ce

30 files changed

Lines changed: 820 additions & 0 deletions
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.introduction
3+
metadata:
4+
title: Introduction
5+
description: Introduction to connecting hybrid and multicloud environments to Microsoft Defender for Cloud.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Introduction
12+
durationInMinutes: 2
13+
content: |
14+
[!include[](includes/1-introduction.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.explore-multicloud-connectivity-model
3+
metadata:
4+
title: Explore the Defender for Cloud multicloud connectivity model
5+
description: Learn how Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) coverage layers work. Explore what federated authentication means for AWS and GCP connectors, and what becomes available after connecting each environment type.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Explore the Defender for Cloud multicloud connectivity model
12+
durationInMinutes: 8
13+
content: |
14+
[!include[](includes/2-explore-multicloud-connectivity-model.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.plan-connector-strategy
3+
metadata:
4+
title: Plan a connector strategy for hybrid and multicloud environments
5+
description: Plan connector scope, scan interval, permission model, and deployment path for on-premises, AWS, and GCP environments in Microsoft Defender for Cloud.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Plan a connector strategy for hybrid and multicloud environments
12+
durationInMinutes: 8
13+
content: |
14+
[!include[](includes/3-plan-connector-strategy.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.connect-on-premises-azure-arc
3+
metadata:
4+
title: Connect on-premises machines using Azure Arc
5+
description: Connect on-premises Windows and Linux servers to Microsoft Defender for Cloud using Azure Arc-enabled servers, covering single-machine and at-scale deployment paths.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Connect on-premises machines using Azure Arc
12+
durationInMinutes: 6
13+
content: |
14+
[!include[](includes/4-connect-on-premises-azure-arc.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.connect-amazon-accounts
3+
metadata:
4+
title: Connect AWS accounts to Defender for Cloud
5+
description: Connect AWS accounts to Microsoft Defender for Cloud using the native cloud connector, configure Defender plans, deploy the CloudFormation template, and validate connector health.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Connect AWS accounts to Defender for Cloud
12+
durationInMinutes: 6
13+
content: |
14+
[!include[](includes/5-connect-amazon-accounts.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.connect-google-projects
3+
metadata:
4+
title: Connect GCP projects to Defender for Cloud
5+
description: Connect GCP projects and organizations to Microsoft Defender for Cloud using the native cloud connector, configure Defender plans, run the GCloud deployment script, and validate connector health.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Connect GCP projects to Defender for Cloud
12+
durationInMinutes: 8
13+
content: |
14+
[!include[](includes/6-connect-google-projects.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.verify-multicloud-coverage
3+
metadata:
4+
title: Verify multicloud coverage and validate protection
5+
description: Verify multicloud connector health, confirm CSPM recommendations and compliance standards are active, and validate CWPP plan activation across on-premises, AWS, and GCP environments.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Verify multicloud coverage and validate protection
12+
durationInMinutes: 6
13+
content: |
14+
[!include[](includes/7-verify-multicloud-coverage.md)]
Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,87 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.knowledge-check
3+
metadata:
4+
title: Knowledge check
5+
description: Check your knowledge of connecting hybrid and multicloud environments to Microsoft Defender for Cloud.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Knowledge check
12+
durationInMinutes: 5
13+
content: |
14+
[!include[](includes/8-knowledge-check.md)]
15+
quiz:
16+
title: Check your knowledge
17+
questions:
18+
- content: "When you connect an AWS account to Microsoft Defender for Cloud, how does Defender for Cloud authenticate to AWS APIs?"
19+
choices:
20+
- content: "It stores AWS access keys and secret keys in Azure Key Vault and uses them to call AWS APIs."
21+
isCorrect: false
22+
explanation: "Incorrect. Storing long-lived access keys or secret keys in Azure Key Vault would create a persistent credential that could be exfiltrated if the Azure environment were compromised. Defender for Cloud is designed to avoid this pattern. It uses federated trust with short-lived credentials instead."
23+
- content: "It uses the customer's Microsoft Entra service principal to call AWS APIs directly."
24+
isCorrect: false
25+
explanation: "Incorrect. Defender for Cloud authenticates to AWS using a Microsoft-managed Microsoft Entra application—not a customer's service principal. The trust relationship in the IAM role created by the CloudFormation template is bound to Microsoft's managed application, not the customer's tenant."
26+
- content: "It creates IAM roles with a federated trust relationship through OIDC and authenticates using short-lived credentials from AWS Security Token Service."
27+
isCorrect: true
28+
explanation: "Correct. The CloudFormation template creates an OpenID Connect identity provider and IAM roles in the customer's AWS account. Defender for Cloud exchanges a Microsoft Entra token for short-lived credentials through AWS Security Token Service. No long-lived credentials are stored in Azure—the trust model prevents credential exfiltration even if the Azure environment is compromised."
29+
- content: "It requires a dedicated IAM user with programmatic access enabled on the AWS account."
30+
isCorrect: false
31+
explanation: "Incorrect. IAM users with programmatic access require long-lived access key and secret key pairs. Defender for Cloud's design specifically avoids this pattern. The CloudFormation template creates IAM roles—not IAM users—that Defender for Cloud can assume through web identity federation."
32+
- content: "You connect an AWS account to Defender for Cloud with both Defender CSPM and Defender for Servers enabled. Which coverage becomes active within hours of connector creation, and which requires Azure Arc deployed on EC2 instances before it provides protection?"
33+
choices:
34+
- content: "Both Defender CSPM and Defender for Servers become active immediately after the connector is created—no Arc agent is needed for either."
35+
isCorrect: false
36+
explanation: "Incorrect. Defender for Servers (a CWPP plan) provides runtime threat detection and requires the Azure Connected Machine agent to be present on EC2 instances. Only Defender CSPM is agentless. The native connector enables autoprovisioning of Arc on EC2 instances, but Arc must be successfully installed before Defender for Servers runtime protection is active on those machines."
37+
- content: "Defender for Servers activates immediately; Defender CSPM requires Arc agents on EC2 instances before posture recommendations appear."
38+
isCorrect: false
39+
explanation: "Incorrect. CSPM is the agentless component, not Defender for Servers. Defender CSPM calls AWS cloud provider APIs to assess resource configuration—no agent is required. Defender for Servers is the plan that requires Azure Arc on each EC2 instance for runtime protection."
40+
- content: "Defender CSPM activates within hours of connector creation through agentless API calls; Defender for Servers runtime protection requires Azure Arc deployed on each EC2 instance."
41+
isCorrect: true
42+
explanation: "Correct. Defender CSPM is agentless—it uses cloud provider APIs to assess configuration and surface recommendations within four to six hours of the first scan. Defender for Servers (a CWPP plan) requires the Azure Connected Machine agent (Azure Arc) on each EC2 instance to deliver runtime threat detection, just-in-time VM access, and file integrity monitoring."
43+
- content: "Both Defender CSPM and Defender for Servers require Azure Arc on EC2 instances before any coverage becomes active."
44+
isCorrect: false
45+
explanation: "Incorrect. Defender CSPM is explicitly designed to be agentless. It doesn't require Arc or any agent installation. CSPM calls AWS APIs directly to collect configuration data. Azure Arc is only required for CWPP plans like Defender for Servers."
46+
- content: "When Defender for Cloud connects to a GCP project, what authentication mechanism does it use, and what does this mean for credential storage in Azure?"
47+
choices:
48+
- content: "It downloads a GCP service account JSON key and stores it in Azure Key Vault for use in API calls."
49+
isCorrect: false
50+
explanation: "Incorrect. Storing a service account JSON key—a long-lived credential—in Azure Key Vault would create a persistent secret that could be exfiltrated if the Azure environment were compromised. GCP connector authentication is designed to avoid storing any long-lived credentials."
51+
- content: "It uses workload identity federation and service account impersonation—no private keys or long-lived credentials are stored in Azure."
52+
isCorrect: true
53+
explanation: "Correct. The GCloud script creates a workload identity pool, workload identity providers, and service accounts in GCP. Defender for Cloud exchanges a Microsoft Entra token with Google Cloud STS for a short-lived token, then uses that token to impersonate the service account. No private keys or long-lived credentials are stored in Azure at any point."
54+
- content: "It uses the customer's Microsoft Entra service principal to call GCP APIs directly, with no GCP-side resources required."
55+
isCorrect: false
56+
explanation: "Incorrect. GCP APIs require GCP-native authentication. The GCloud script creates GCP resources—a workload identity pool, providers, and service accounts—that form the trust bridge between Microsoft Entra ID and GCP. A Microsoft Entra service principal alone can't authenticate to GCP APIs."
57+
- content: "It creates a dedicated GCP IAM user with API key authentication and stores the key in the connector configuration."
58+
isCorrect: false
59+
explanation: "Incorrect. GCP IAM user accounts with API keys are long-lived credentials—the opposite of what the connector authentication model is designed to use. The GCloud script creates service accounts and workload identity resources, not IAM user accounts."
60+
- content: "After creating an AWS connector, you check Environment Settings and see 'Has issues' in the Connectivity status column. What does this status indicate, and how do you begin resolving it?"
61+
choices:
62+
- content: "The connector is still establishing its initial connection. Wait 24 hours and the status change to Healthy automatically."
63+
isCorrect: false
64+
explanation: "Incorrect. 'Connecting' is the status that appears while the initial connection is being established. 'Has issues' specifically indicates that a configuration or permission problem is preventing the connector from operating correctly. This status doesn't resolve automatically—it requires investigation and remediation."
65+
- content: "The connector detected configuration or permission problems. Select the status value to open the Environment details page, which lists specific issues and often provides remediation scripts."
66+
isCorrect: true
67+
explanation: "Correct. 'Has issues' status indicates that Defender for Cloud detected one or more problems preventing correct connector operation. Selecting the status value opens the Environment details page, which describes each issue, explains its cause, and in many cases provides a remediation script. Common issues include missing IAM permissions (fix by regenerating and redeploying the CloudFormation template) and IAM role trust policy mismatches."
68+
- content: "The AWS account reached its API call quota. Contact AWS Support to increase the API call limit before the connector can function."
69+
isCorrect: false
70+
explanation: "Incorrect. AWS API call quota issues don't manifest as connector health status problems in Defender for Cloud. 'Has issues' reflects authentication, configuration, or permission problems—such as missing IAM roles or incomplete CloudFormation deployment. API quota management is separate from connector health."
71+
- content: "The CloudFormation stack deployed incorrectly. You must delete the connector and restart the onboarding process from the beginning."
72+
isCorrect: false
73+
explanation: "Incorrect. Most connectivity issues don't require deleting and recreating the connector. The Environment details page typically provides targeted remediation steps—often just updating the CloudFormation stack or rerunning it with corrected settings. Full reonboarding is rarely necessary and should be the last resort after targeted remediation attempts fail."
74+
- content: "A security engineer needs full Defender for Servers Plan 2 coverage on on-premises Windows servers, including just-in-time VM access, file integrity monitoring, and agentless scanning. What is required to enable these capabilities?"
75+
choices:
76+
- content: "Install the Microsoft Monitoring Agent (MMA) on each server and connect it to a Log Analytics workspace linked to the Defender for Cloud subscription."
77+
isCorrect: false
78+
explanation: "Incorrect. The Microsoft Monitoring Agent retired in August 2024. Any guidance referencing MMA-based onboarding for on-premises servers is outdated. The MMA path is no longer supported for Defender for Cloud coverage."
79+
- content: "Enable Defender for Servers Plan 1 on the Azure subscription. Plan 1 includes all advanced protection features for on-premises machines without requiring any agent."
80+
isCorrect: false
81+
explanation: "Incorrect. Defender for Servers Plan 1 provides some capabilities—including direct Microsoft Defender for Endpoint integration—without Azure Arc. However, Plan 2 features such as just-in-time VM access, file integrity monitoring, agentless scanning, and 500-MB daily free log ingestion require Azure Arc. Plan 1 alone is insufficient for the scenario described."
82+
- content: "Deploy the Azure Connected Machine agent on each server to Arc-enable it, then enable Defender for Servers Plan 2 on the Azure subscription."
83+
isCorrect: true
84+
explanation: "Correct. Azure Arc-enabled server is the required path for on-premises machines. The Azure Connected Machine agent registers each server as an Azure resource, making it eligible for Defender for Servers Plan 2 coverage. Plan 2 features—just-in-time VM access, file integrity monitoring, agentless scanning, and 500-MB daily free log ingestion—all require Azure Arc. The Microsoft Monitoring Agent, the previous onboarding path, retired in August 2024."
85+
- content: "Create a native cloud connector for the on-premises environment in Defender for Cloud Environment Settings, the same way you would for AWS or GCP."
86+
isCorrect: false
87+
explanation: "Incorrect. Native cloud connectors exist for AWS and GCP because those environments have cloud provider APIs that Defender for Cloud can call. On-premises servers have no equivalent API surface. The only supported path for on-premises machines is installing the Azure Connected Machine agent to Arc-enable each server."
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.summary
3+
metadata:
4+
title: Summary
5+
description: Summary of connecting hybrid and multicloud environments to Microsoft Defender for Cloud, including key architectural decisions and next steps.
6+
ms.date: 04/01/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Summary
12+
durationInMinutes: 3
13+
content: |
14+
[!include[](includes/9-summary.md)]
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
Contoso's security team can see everything happening inside Azure. Virtual machines generate alerts. Misconfigurations surface as recommendations. The regulatory compliance dashboard tracks Azure resources against the Microsoft Cloud Security Benchmark. But outside the Azure boundary—in the Amazon Web Services (AWS) EC2 instances running production workloads, the Google Cloud Platform (GCP) Compute Engine virtual machines hosting development environments, and the on-premises Windows and Linux servers powering the data centers—Defender for Cloud sees nothing. No recommendations surface. No secure score reflects those environments. No Cloud Workload Protection Platform (CWPP) plan covers those machines. The Chief Information Security Officer (CISO) mandated unified visibility and protection before the next compliance audit.
2+
3+
This module shows you how to close that gap. You connect Contoso's on-premises servers, AWS accounts, and GCP projects to Microsoft Defender for Cloud using native connectors and Azure Arc–enabled servers. Then you extend Cloud Security Posture Management (CSPM) and CWPP protection across a unified hybrid and multicloud estate.
4+
5+
In this module, you:
6+
7+
- Explain the multicloud connectivity model in Defender for Cloud, including how federated authentication works for AWS and GCP connectors
8+
- Plan a connector strategy for hybrid and multicloud environments, including scope, scan interval, and required permissions per environment type
9+
- Connect on-premises machines to Defender for Cloud using Azure Arc–enabled servers
10+
- Connect AWS accounts to Defender for Cloud using the native cloud connector and CloudFormation template
11+
- Connect GCP projects to Defender for Cloud using the native cloud connector and GCloud deployment script
12+
- Verify multicloud connectivity health and confirm CSPM and CWPP coverage surfaces across connected environments

0 commit comments

Comments
 (0)