Skip to content

Commit

Permalink
Merge pull request #918 from dortwalner/patch-6
Browse files Browse the repository at this point in the history
Update Module 14-Onboarding Azure DevOps to Defender for Cloud.md
  • Loading branch information
velahuer authored Nov 19, 2024
2 parents 9d7ce9b + 28fc470 commit d9888fe
Showing 1 changed file with 7 additions and 8 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -24,24 +24,23 @@ If you already finished [Module 1](https://github.com/Azure/Microsoft-Defender-f
2. In the left navigation pane, click **Environment settings** option
3. Click the **Add environment** button and click **Azure DevOps** option. The **Create Azure DevOps connection** page appears as shown the sample below.

![Azure DevOps Connector](../Images/M14_Fig1.PNG?raw=true)
<img width="625" alt="image" src="https://github.com/user-attachments/assets/f85b2051-39ae-4dd3-be28-ac3643a1fbeb">

4. Type the name for the connector, select the subscription, select the Resource Group, which can be the same you used in this lab and the region.
11. Click **Next:select plans >** button to continue.
12. In the next page, select **Defender CSPM** and click **Next: Authorize connection >** button to continue.

![Azure DevOps Connector - Authorize](../Images/M14_Fig2.PNG?raw=true)
4. Type the name for the connector, select the subscription, select the Resource Group, which can be the same you used in this lab and the region.
11. Click **Next: Configure access >** button to continue.
12. In the next page, click **Next: Authorize connection >** button to continue.

<img width="468" alt="image" src="https://github.com/user-attachments/assets/79801359-2618-4d7c-acb9-c4a3335058a9">

13. Click **Authorize** button. If this is the first time you’re authorizing your DevOps connection, you’ll receive a pop-up screen, that will ask your permission to authorize. Scroll down the popped up window screen and click the **Accept** button as shown in the sample below:

![Azure ADO Connector - Accept](../Images/M14_Fig3.PNG?raw=true)

<img width="1040" alt="image" src="https://github.com/user-attachments/assets/1794e5b1-ddd9-4a7d-9be2-d3a6e3f6c537">

> **Note** When you click **Accept** in your Azure DevOps, you’ll notice the proof of Authorization to the **Microsoft Security DevOps** App. You can find this in your Azure ADO organization, under the **Personal Access tokens** / **User Settings** / **Authorizatons**.

14. Click **Review and create** button to continue.
14. Click **Review and generate** button to continue.


> **Note** You need to be a **Project Collection Admin** in the Azure DevOps organization that you selected to complete this process. Learn more about this role [here](https://learn.microsoft.com/en-us/azure/devops/organizations/settings/about-settings?view=azure-devops&WT.mc_id=Portal-Microsoft_Azure_Security_DevOps#project-collection-administrator-pca-role-and-managing-collections-of-projects)
Expand Down

0 comments on commit d9888fe

Please sign in to comment.