Skip to content

Commit c5e141a

Browse files
committed
Fixed GCP and AWS filename issues
1 parent b42f7ae commit c5e141a

11 files changed

Lines changed: 11 additions & 13 deletions

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/5-connect-aws-accounts.yml renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/5-connect-amazon-accounts.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
### YamlMime:ModuleUnit
2-
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.connect-aws-accounts
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.connect-amazon-accounts
33
metadata:
44
title: Connect AWS accounts to Defender for Cloud
55
description: Connect AWS accounts to Microsoft Defender for Cloud using the native cloud connector, configure Defender plans, deploy the CloudFormation template, and validate connector health.
@@ -11,4 +11,4 @@ metadata:
1111
title: Connect AWS accounts to Defender for Cloud
1212
durationInMinutes: 6
1313
content: |
14-
[!include[](includes/5-connect-aws-accounts.md)]
14+
[!include[](includes/5-connect-amazon-accounts.md)]

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/6-connect-gcp-projects.yml renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/6-connect-google-projects.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
### YamlMime:ModuleUnit
2-
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.connect-gcp-projects
2+
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.connect-google-projects
33
metadata:
44
title: Connect GCP projects to Defender for Cloud
55
description: Connect GCP projects and organizations to Microsoft Defender for Cloud using the native cloud connector, configure Defender plans, run the GCloud deployment script, and validate connector health.
@@ -11,4 +11,4 @@ metadata:
1111
title: Connect GCP projects to Defender for Cloud
1212
durationInMinutes: 8
1313
content: |
14-
[!include[](includes/6-connect-gcp-projects.md)]
14+
[!include[](includes/6-connect-google-projects.md)]

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/2-explore-multicloud-connectivity-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The authentication flow works as follows. Defender for Cloud requests a token fr
3838

3939
AWS performs audience, signature, thumbprint, and role-level checks before issuing credentials, ensuring only the specific Microsoft-managed application can assume the connector role.
4040

41-
:::image type="content" source="../media/aws-auth-sequence.png" alt-text="Sequence diagram of the AWS federated auth flow: Defender for Cloud exchanges a Microsoft Entra token with AWS STS for temporary credentials, then calls AWS APIs. No credentials are stored.":::
41+
:::image type="content" source="../media/amazon-auth-sequence.png" alt-text="Sequence diagram of the AWS federated auth flow: Defender for Cloud exchanges a Microsoft Entra token with AWS STS for temporary credentials, then calls AWS APIs. No credentials are stored.":::
4242

4343
This architecture means that even if an attacker gained access to the Azure environment, there are no stored AWS credentials to exfiltrate. The trust is used by the specific Microsoft-managed application, during a valid authentication transaction.
4444

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/5-connect-aws-accounts.md renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/5-connect-amazon-accounts.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ If your AWS account is already connected to **Microsoft Sentinel**, review the M
1616

1717
## Create the AWS connector
1818

19-
:::image type="content" source="../media/add-aws-account-environment-settings.png" alt-text="Screenshot of the Environment Settings page in Microsoft Defender for Cloud showing the Add environment button with Amazon Web Services as an option.":::
19+
:::image type="content" source="../media/add-amazon-account-environment-settings.png" alt-text="Screenshot of the Environment Settings page in Microsoft Defender for Cloud showing the Add environment button with Amazon Web Services as an option.":::
2020

2121
1. In the Azure portal, open **Microsoft Defender for Cloud** and select **Environment settings** from the left menu.
2222
2. Select **Add environment** > **Amazon Web Services**.
@@ -61,8 +61,6 @@ On the **Configure access** tab:
6161
2. Select the deployment method: **AWS CloudFormation** or **Terraform**. For most environments, CloudFormation is the standard path.
6262
3. Select **Download** to get the CloudFormation template. The template file is customized to the plans you selected.
6363

64-
:::image type="content" source="../media/add-aws-account-configure-access.png" alt-text="Screenshot of the Configure access tab in the AWS connector wizard showing the CloudFormation template download option.":::
65-
6664
## Deploy the CloudFormation template
6765

6866
The CloudFormation template creates the authentication resources required for Defender for Cloud to access your AWS account using federated credentials.

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/6-connect-gcp-projects.md renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/6-connect-google-projects.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Confirm these prerequisites:
1919
2020
## Create the GCP connector
2121

22-
:::image type="content" source="../media/gcp-connector.png" alt-text="Screenshot of the Environment Settings Add environment menu in Microsoft Defender for Cloud with Google Cloud Platform highlighted as an option.":::
22+
:::image type="content" source="../media/google-connector.png" alt-text="Screenshot of the Environment Settings Add environment menu in Microsoft Defender for Cloud with Google Cloud Platform highlighted as an option.":::
2323

2424
1. In the Azure portal, open **Microsoft Defender for Cloud** and select **Environment settings**.
2525
2. Select **Add environment** > **Google Cloud Platform**.
@@ -50,7 +50,7 @@ Available CWPP plans for GCP:
5050
| Defender for Containers | GKE clusters | No |
5151
| Defender for Databases | Cloud SQL instances | No |
5252

53-
:::image type="content" source="../media/gcp-select-plans.png" alt-text="Screenshot of the Select plans tab for a GCP connector showing available Defender plan options.":::
53+
:::image type="content" source="../media/google-select-plans.png" alt-text="Screenshot of the Select plans tab for a GCP connector showing available Defender plan options.":::
5454

5555
For Contoso's GCP environment, enable Defender for Servers to extend CWPP coverage to GCP Compute Engine VMs. The GCloud script generated includes Compute Engine management permissions and Google Cloud OS Config API access needed for Arc autoprovisioning.
5656

@@ -65,7 +65,7 @@ For Contoso's GCP environment, enable Defender for Servers to extend CWPP covera
6565
> [!NOTE]
6666
> If this GCP connector already uses **Least privilege access** and you want to enable AI Security Posture Management (AI SPM) for AI workload visibility—including Google Vertex AI—the existing service account bindings don't include the required permissions. Rerun the updated GCloud script to add them.
6767
68-
:::image type="content" source="../media/add-gcp-project-configure-access.png" alt-text="Screenshot of the Configure access tab for the GCP connector showing the GCloud script.":::
68+
:::image type="content" source="../media/add-google-project-configure-access.png" alt-text="Screenshot of the Configure access tab for the GCP connector showing the GCloud script.":::
6969

7070
## Run the GCloud script
7171

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ units:
3939
- learn.wwl.connect-hybrid-multicloud-environments-defender.explore-multicloud-connectivity-model
4040
- learn.wwl.connect-hybrid-multicloud-environments-defender.plan-connector-strategy
4141
- learn.wwl.connect-hybrid-multicloud-environments-defender.connect-on-premises-azure-arc
42-
- learn.wwl.connect-hybrid-multicloud-environments-defender.connect-aws-accounts
43-
- learn.wwl.connect-hybrid-multicloud-environments-defender.connect-gcp-projects
42+
- learn.wwl.connect-hybrid-multicloud-environments-defender.connect-amazon-accounts
43+
- learn.wwl.connect-hybrid-multicloud-environments-defender.connect-google-projects
4444
- learn.wwl.connect-hybrid-multicloud-environments-defender.verify-multicloud-coverage
4545
- learn.wwl.connect-hybrid-multicloud-environments-defender.knowledge-check
4646
- learn.wwl.connect-hybrid-multicloud-environments-defender.summary

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/add-aws-account-environment-settings.png renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/add-amazon-account-environment-settings.png

File renamed without changes.

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/add-gcp-project-configure-access.png renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/add-google-project-configure-access.png

File renamed without changes.

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/aws-auth-sequence.png renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/amazon-auth-sequence.png

File renamed without changes.

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/gcp-connector.png renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/google-connector.png

File renamed without changes.

0 commit comments

Comments
 (0)