Skip to content

Commit

Permalink
RLP-126205 (#331)
Browse files Browse the repository at this point in the history
* first draft

* moving note

* note fix

* chitra feedback

* typo

* typo
  • Loading branch information
jenjoe22 authored Jan 26, 2024
1 parent 4df43c3 commit 0690b5a
Show file tree
Hide file tree
Showing 2 changed files with 17 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,18 @@ Using a manually created Custom Role you also have the option to enforce least a
* xref:authorize-prisma-cloud.adoc#manual[Manually Authorizing Prisma Cloud]
If your organization restricts the use of Terraform scripts, you can choose to manually create the required resources for Prisma Cloud to call the Azure APIs.
[NOTE]
====
The status of your Azure subscription may impact Prisma Cloud's ability to ingest and onboard your account. Reference the list below to review the impact of your subscription status on ingestion:
* Active/Enabled - Ingestion and Auto Remediation is possible.
* Expired - Ingestion and Auto Remediation is possible.
* Past Due - Ingestion and Auto Remediation is possible.
* Deleted - Ingestion is not possible.
* Disabled - Ingestion is not possible.
* Warned - Ingestion is possible, however the Azure portal shows the Subscription as disabled, since it can be deactivated at anytime during the 90 day grace period.
====

[.task]
[#prerequisites]
=== Prerequisites
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ This workflow automates the process of setting up the Prisma Cloud application o
====
Azure China workflows do not support the use of Terraform templates.
====

* xref:authorize-prisma-cloud.adoc#json[Using Custom Role JSON]
Using a manually created Custom Role you also have the option to enforce least access privilege to restrict access. To achieve this you will need to manually set up the Prisma Cloud application on Active Directory and Create a Custom Role to authorize access to Azure APIs.
* xref:authorize-prisma-cloud.adoc#manual[Manually Authorizing Prisma Cloud]
Expand Down Expand Up @@ -73,4 +74,7 @@ Account onboarding on https://app.prismacloud.cn/[Prisma Cloud] is only availabl

* Azure China does not support the use of Terraform templates to onboard a cloud account. To get started with monitoring your Azure China Subscription, review the xref:authorize-prisma-cloud.adoc#manual[manual onboarding steps] and gather the required information from your Azure China account.
* During the Configuration step, *Remediation of IaC templates* is not available for Azure China accounts.
* Advanced security capabilities such as Agentless Workload Scanning, Serverless Function Scanning and Agent-based Workload Protection are not available on Azure China.
* Advanced security capabilities such as Agentless Workload Scanning, Serverless Function Scanning and Agent-based Workload Protection are not available on Azure China.

0 comments on commit 0690b5a

Please sign in to comment.