Prerequisites
- Azure subscription with administrative access
- Microsoft Defender for Cloud enabled on your subscription
- Cloudgeni account (free trial available)
- Time estimate: 10-15 minutes
Step 1: Enable Microsoft Defender for Cloud
Enable Defender for Cloud in Azure Portal
Enable Defender for Cloud in Azure Portal
- Log into your Azure Portal
- Navigate to Microsoft Defender for Cloud service
- Go to “Environment settings” > Select your subscription
- Turn on Defender plans for comprehensive coverage:
- ✅ Servers - VM and server protection
- ✅ App Service - Web application protection
- ✅ Databases - SQL database protection
- ✅ Storage - Storage account protection
- ✅ Key Vault - Key vault protection
- ✅ Resource Manager - Subscription-level protection
- ✅ DNS - DNS layer protection
- Click “Save” to enable the plans
Microsoft Defender for Cloud offers a free tier with basic security assessments. Enhanced security features require paid plans.
Step 2: Create Service Principal for Cloudgeni
Set up Cloudgeni Azure Permissions
Set up Cloudgeni Azure Permissions
Cloudgeni needs read-only access to Defender for Cloud and related services:
Option A: Using Azure CLI
Option B: Using Azure Portal
- Go to Azure Active Directory > App registrations > New registration
- Name:
CloudgeniDefenderReader
- Click “Register”
- Go to Certificates & secrets > New client secret
- Copy the client secret (you won’t see it again)
- Note down Application (client) ID and Directory (tenant) ID
- Go to Subscriptions > Your subscription > Access control (IAM)
- Click “Add role assignment”
- Assign these roles to your service principal:
- Security Reader - Access to security findings
- Reader - Access to resource metadata
- Tenant ID: Directory (tenant) ID
- Client ID: Application (client) ID
- Client Secret: The secret you created
- Subscription ID: Your Azure subscription ID
Step 3: Configure Cloudgeni Integration
Add Azure Integration in Cloudgeni
Add Azure Integration in Cloudgeni
- Log into your Cloudgeni dashboard
- Navigate to “Integrations” > “Add Integration”
- Select “Azure Defender for Cloud”
- Enter your configuration:
- Integration Name:
Azure Production
(or your environment name) - Subscription ID: Your Azure subscription ID
- Tenant ID: Azure AD tenant ID
- Client ID: Service principal application ID
- Client Secret: Service principal secret
- Resource Groups: Select specific resource groups (optional)
- Integration Name:
- Click “Test Connection” to verify
- Click “Save Integration”
Start with one resource group to test, then expand to full subscription once confirmed working.
Step 4: Verify Integration and Run First Scan
Test Azure Scanning
Test Azure Scanning
- In Cloudgeni, go to “Cloud Infrastructure” > “Azure”
- Click “Scan Now” to trigger initial scan
- Wait 2-5 minutes for scan completion
- Review the results:
- Security findings from Defender for Cloud
- Compliance status by standard
- Resource inventory by service
- Risk prioritization by severity
- Virtual machines with security configurations
- Storage accounts with access control findings
- Network security groups with rule violations
- Key vaults with access policy issues
- SQL databases with security recommendations
Sample Findings
- VM vulnerability assessment - Missing security updates
- Storage account - Allow Blob public access is enabled
- Network security group - Unrestricted inbound SSH access
- SQL Database - Transparent data encryption disabled
- Key Vault - No diagnostic logs enabled
Multi-Subscription Setup
Enable Multiple Azure Subscriptions
Enable Multiple Azure Subscriptions
For comprehensive coverage across multiple subscriptions:Centralized Approach:
- Create service principal in management subscription
- Grant cross-subscription permissions:
- Add each subscription to your Cloudgeni integration
- Create separate integrations for each subscription
- Use subscription-specific service principals
- Manage access controls per subscription requirements
Consider using Azure Lighthouse for managing multiple customer subscriptions.
Troubleshooting
Common Setup Issues
Common Setup Issues
Connection Test Fails:
- Verify service principal credentials are correct
- Check tenant ID and subscription ID are accurate
- Ensure service principal has required role assignments
- Confirm client secret hasn’t expired
- Wait 24-48 hours for Defender for Cloud to populate findings
- Check that Defender plans are enabled for your resources
- Verify you have resources in the scanned subscription
- Ensure security policies are assigned
- Ensure Security Reader role is assigned
- Verify Reader role for resource metadata access
- Check role assignments at correct scope level
- Confirm service principal is active
- Re-test connection in Cloudgeni dashboard
- Check Azure Activity Log for authentication failures
- Verify service principal hasn’t been disabled
- Ensure client secret is still valid
- Enable corresponding Defender plans (Storage, SQL, etc.)
- Check resource group filtering in integration settings
- Verify resources exist in scanned subscription
Security Standards and Compliance
Enable Compliance Standards
Enable Compliance Standards
Configure compliance standards in Defender for Cloud:
- Go to Regulatory compliance in Defender for Cloud
- Add relevant standards:
- Azure Security Benchmark (default)
- CIS Microsoft Azure Foundations Benchmark
- PCI DSS 3.2.1
- SOC TSP
- NIST SP 800-53 R4
- ISO 27001
- Review compliance scores and recommendations
- Cloudgeni will import these compliance mappings automatically
Some compliance standards may require Defender for Cloud paid plans.
What’s Next?
Azure Permissions Setup
Configure Azure service principal permissions
Understanding Findings
Learn how to interpret and prioritize security findings
Automated Remediation
Set up AI-powered fix generation and deployment
Compliance Reporting
Generate compliance reports for audits
Need Help?
Having Issues?
- Service principal problems? Contact hello@cloudgeni.io with your tenant and subscription IDs
- No findings appearing? Check our Azure Troubleshooting Guide
- Multi-subscription setup? See our Azure Management Groups Integration
- Cost concerns? Review Microsoft Defender for Cloud Pricing