Connection Guide
Connect Microsoft Defender for Cloud Without Breaking the Audit Trail
Use this guide to connect Microsoft Defender for Cloud or confirm the export-based path that fits your environment. Aurora keeps source, timestamps, ownership, and collection history attached so the first run becomes reusable proof instead of one-off setup work.
First-Run Checklist
Use this sequence to connect Microsoft Defender for Cloud and make sure the first collection lands cleanly.
- 1Register an Entra ID application and grant Security Reader on each in-scope subscription.
- 2Add Azure Reader only when Aurora must resolve underlying ARM resource metadata for cloud.resource coverage.
- 3Store tenant_id, client_id, client_secret, and subscription_ids; validate by listing subscriptions and reading Defender alerts and assessments.
Credentials and Secrets
The keys, secrets, or tokens Aurora uses to authenticate and collect proof.
Recommended Access
Aurora only asks for the minimum read access needed for collection and checks.
Access requirements depend on the collection mode and scope you choose.