Azure Blob
How to configure Azure Blob connection for scanning.
Last updated
Was this helpful?
How to configure Azure Blob connection for scanning.
Last updated
Was this helpful?
Login to Azure Portal
If there are multiple tenants to choose from, use the Settings icon in the top menu to switch to the tenant in which needs to be registered to the application from the Directories + subscriptions menu.
Browse to App Registration and select New registration
On the App Registration page enter below information and click Register button
Name: (Enter a meaningful application name that will be displayed to users of the app)
Supported account types:
Select which accounts the application will support. The options should be similar to those below. Select �Accounts in this organizational directory only�:
Leave the Redirect URI as empty and Click Register
Note the Application (client) ID, Directory (tenant) ID values
Navigate to Manage -> Certificates and secrets on the left menu, to create a new client secret
Provide a meaningful description and expiry to the secret, and click on Add
Once a client secret is created, note its Value and store it somewhere safe. NOTE: this value cannot be viewed once you leave this page
Navigate to Manage -> API permissions on the left menu, and Add a permission
Select Microsoft APIs -> Microsoft Graph
Select Application permissions
Permissions required
Microsoft Graph > Application permissions > Device > Device.Read.All
Microsoft Graph > Application permissions > Directory > Directory.Read.All
Microsoft Graph > Application permissions > Group > Group.Read.All
Microsoft Graph > Application permissions > User > User.Read.All
Once all the required permissions are added, click "Grant admin consent"
A connection string is needed for the storage account that is to be scanned.
Login to Azure Portal
If there are multiple tenants to choose from, use the Settings icon in the top menu to switch to the tenant which needs to be registered to the application from the Directories + subscriptions menu
Browse to Storage accounts and select the account to be scanned
Once the storage account is selected, note the Resouce group and Subscription ID values in the Overview page
Navigate to Security + networking -> Access keys on the left menu, and click on Show on the Connection string
Copy this Connection string value
Access Control (IAM) Role assignment - there are 2 options, one is to assign a built-in role, the other is to create and assign a custom role. Using a built-in role is an easier option to configure, while a custom role may be preferred to ensure least privileges assignment for increased security.
Option 1: In the storage account, go to Access Control (IAM) and check on either Storage Blob Data Owner
or Data Contributor
role to assign the role to the blob storage. (Per Microsoft's documentation the Data Contributor role is the least privileged, built-in role for Listing Containers)
We also need to assign Reader role to the azure app created in the first step
Save the changes.
Option 2: This option creates a custom role and assigns the same permissions as the Data Contributor role, except for the delete permissions. In the Blob storage account, go to Access Control (IAM) and click Add to create a new role. Name the role with a preferred name, and choose the following actions below to assign to this custom role. Select this custom role for the blob and save changes.
We also need to assign Reader role to the azure app created in the first step
Real Time Events Monitoring (Streaming) Permissions: To enable "Real Time Events Monitoring (Streaming)", the following additional Azure permission roles are required:
EventGrid Data Contributor
EventGrid EventSubscription Contributor
EventGrid TopicSpaces Publisher
Assign these roles using Access Control (IAM) in the Blob storage account, similar to the steps mentioned above for assigning the Storage Blob Data Owner
or Data Contributor
role.
Next, in the Networking tab, under Public network access, select "Enabled from all networks", or "Enabled from select virtual networks and IP addresses". If the latter was chosen, then under Firewall section add the IP address range for the DSPM server.
Enable "Allow trusted Microsoft services to access this storage account" and Save the changes.
*** Firewall rules must also be in place to allow the DSPM server to connect to https://(mystorageaccount).blob.core.windows.net
Navigate to Administration -> Data Sources -> Azure Blob -> New scan
Provide the Connection string value obtained from above steps
Click on the Folder icon in Path to select a particular share to scan, or leave the path as empty to scan all shares
Save the configuration
Once the configuration is saved, click on the icon on the right and select Start file scan to begin the scanning
The results can be viewed under Dashboard -> Enterprise Search