<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prisma Cloud: Azure Active Directory resources not being ingested in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/prisma-cloud-azure-active-directory-resources-not-being-ingested/m-p/577581#M115896</link>
    <description>&lt;P&gt;I've completed the setup successfully as the review status after following through the necessary steps of onboarding Azure Active Directory shows the Asset Configuration as "&lt;STRONG&gt;Successful".&amp;nbsp;&lt;/STRONG&gt;This was achieved after assigning the necessary API permissions inside of app registrations in Azure Cloud as guided by the documentation.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The issue, however, lies in whether Prisma Cloud ingests resources i.e. related to Active Directory "Roles and Administrators" or "Identity Protection" (located inside of Azure Entra ID Security Center and other such Security Center resources) or even "Users Password Reset". The resources located specifically in under these services are not being ingested to Prisma Cloud otherwise almost most of Azure AD seems to have been ingested.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;There are even partial ingestions for example, inside of User Settings, Default User Role Permissions is ingested onto Prisma Cloud but not "LinkedIn account connections" or "Administration Center" or “Show keep user signed-in”. There is no issue regarding resource configuration either, rather I have concerns surrounding Prisma's support for ingesting these specific settings/resources which are essential for policy making.&amp;nbsp;For Azure AD Policies to be created, I need these resources to ensure security best practice is implemented. However, currently am facing a hindrance. I’ve covered policies relating to Conditional Access Policies with ease and similar others so as well for reference.&lt;/P&gt;</description>
    <pubDate>Sat, 17 Feb 2024 18:07:08 GMT</pubDate>
    <dc:creator>AJohri</dc:creator>
    <dc:date>2024-02-17T18:07:08Z</dc:date>
    <item>
      <title>Prisma Cloud: Azure Active Directory resources not being ingested</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prisma-cloud-azure-active-directory-resources-not-being-ingested/m-p/577544#M115884</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have provided Prisma Cloud with all the necessary API Permissions and more, along with granting the necessary roles needed to view Azure Active Directory Security Settings. The issue lies in resources showing up in Prisma Cloud itself when queried, e.g Identity Protection related resources or Active Directory Roles and Administrators or even Password Reset Policies. I want to inquire what more I should carry out to ensure proper ingestion of these resources i.e where could I have gone wrong?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 19:00:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prisma-cloud-azure-active-directory-resources-not-being-ingested/m-p/577544#M115884</guid>
      <dc:creator>AJohri</dc:creator>
      <dc:date>2024-02-16T19:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Cloud: Azure Active Directory resources not being ingested</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prisma-cloud-azure-active-directory-resources-not-being-ingested/m-p/577565#M115890</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/296928"&gt;@AJohri&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Without knowing what process you followed it's a little hard to help really. Have you gone through &lt;A href="https://docs.prismacloud.io/en/classic/cspm-admin-guide/connect-your-cloud-platform-to-prisma-cloud/onboard-your-azure-account/connect-azure-tenant" target="_self"&gt;the docs&lt;/A&gt;&amp;nbsp;around getting all of this setup? If it was a permissions issue you should be able to validate that by looking at Setting &amp;gt; Cloud Accounts and looking at Status. The terraform script is highly recommended here, but you can go through and do it manually as well (requirements are in the Azure Application Permissions page) if you don't utilize Terraform.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Walking through the docs should get you to the finish line however. If you&amp;nbsp; aren't getting anything ingested it just sounds like the process isn't fully walked through yet and you're missing a couple steps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Feb 2024 05:10:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prisma-cloud-azure-active-directory-resources-not-being-ingested/m-p/577565#M115890</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-02-17T05:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Cloud: Azure Active Directory resources not being ingested</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prisma-cloud-azure-active-directory-resources-not-being-ingested/m-p/577581#M115896</link>
      <description>&lt;P&gt;I've completed the setup successfully as the review status after following through the necessary steps of onboarding Azure Active Directory shows the Asset Configuration as "&lt;STRONG&gt;Successful".&amp;nbsp;&lt;/STRONG&gt;This was achieved after assigning the necessary API permissions inside of app registrations in Azure Cloud as guided by the documentation.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The issue, however, lies in whether Prisma Cloud ingests resources i.e. related to Active Directory "Roles and Administrators" or "Identity Protection" (located inside of Azure Entra ID Security Center and other such Security Center resources) or even "Users Password Reset". The resources located specifically in under these services are not being ingested to Prisma Cloud otherwise almost most of Azure AD seems to have been ingested.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;There are even partial ingestions for example, inside of User Settings, Default User Role Permissions is ingested onto Prisma Cloud but not "LinkedIn account connections" or "Administration Center" or “Show keep user signed-in”. There is no issue regarding resource configuration either, rather I have concerns surrounding Prisma's support for ingesting these specific settings/resources which are essential for policy making.&amp;nbsp;For Azure AD Policies to be created, I need these resources to ensure security best practice is implemented. However, currently am facing a hindrance. I’ve covered policies relating to Conditional Access Policies with ease and similar others so as well for reference.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Feb 2024 18:07:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prisma-cloud-azure-active-directory-resources-not-being-ingested/m-p/577581#M115896</guid>
      <dc:creator>AJohri</dc:creator>
      <dc:date>2024-02-17T18:07:08Z</dc:date>
    </item>
  </channel>
</rss>

