Identifying Subscriptions that are not Managed by Azure Security Center

Published Feb 02 2021 09:51 AM 2,993 Views

Azure Security Center continually assesses your subscriptions to identify resources and provide security recommendations for them. 

For the large organizations with many subscriptions, it is recommended to manage access and policies using Azure Management Groups to organize their subscriptions according to the business needs. By moving multiple subscriptions under that management group, you can create one Azure role assignment on the management group level, which will inherit that access to all the subscriptions. Every directory is given a single top-level management group called “Root” management group. This root management group is built into the hierarchy to have all management groups and subscriptions fold up to it. Similarly, when organizations need to enable Azure Security Center across different subscriptions that have different workloads and therefore different assessment needs, it is also common that they want to customize its policies and control it in the Management Group level rather than in the subscription level to maintain centralized policy management in Azure Security Center. Refer to this article if you haven’t already thought of this approach.

 

With the above understanding of Management Groups and visibility across multiple subscriptions, is important to always be aware of scenarios that a new subscriptions is created and by default stays in the Root Management Group. It is a common scenario for organizations provision new subscriptions on the daily basis and since those subscription will be added to the root management group, it creates a challenge to maintain them in the correct Management Group. This also creates a problem of monitored vs non-monitored subscriptions. In this blog, I’m introducing you to a workflow automation that helps you to identify subscriptions that are not monitored and take an action to fix the problem.

 

Prerequisites

The automation uses User Assigned Managed Identity to be able to query the Root management group. Please follow the below step by step instructions:

  1. Create User Assigned Managed Identity. Follow the instructions listed in the doc to create user-assigned managed identity 
  2. Once User-assigned managed identity is created, make sure to assign Reader Permissions to the Root Management Group (Please refer the section ‘Authorize the Tenant Root Group and Logic App’s managed identity’ for step-by-step instructions)
  3. Enable and add the above created User assigned Identity to the Logic App. Follow the instructions here to assign the User assigned identity to the Logic App or refer the section ‘Authorize the Tenant Root Group and Logic App’s managed identity’ for step-by-step instructions.

How to deploy the automation playbook

You can find an ARM template that will deploy the Logic App Playbook and all necessary API connections in the Azure Security Center GitHub repository. Once you have deployed the ARM template, you will have some manual steps to take before the tool will work as expected.

 

Make sure to authorize the Office 365 API connection

This API connection is used to send emails weekly. To authorize the API connection:

  1. Go to the Resource Group you have used to deploy the template resources.
  2. Select the Office365 API connection and press 'Edit API connection'.
  3. Press the 'Authorize' button.
  4. Make sure to authenticate against Azure AD.
  5. Press 'Save'.

Authorize the Tenant Root Group and Logic App’s managed identity

The Logic App is using a user assigned managed identity. For this purpose, you need to grant it the Reader role on tenant root management group, so it is able to query all the subscriptions.

 

Make sure you have User Access Administrator or Owner permissions for this scope.

  1. Go to the Management groups page.
  2. Click on the details in the ‘Tenant root group’
  3. Press 'Access Control (IAM)' on the navigation bar.
  4. Press '+Add' and 'Add role assignment'.
  5. Choose ‘Reader’ role.
  6. Assign access to User assigned managed identity.
  7. Choose the subscription where the logic app was deployed.
  8. Select the name of the User assigned identity.
  9. Press 'Save'.

Picture1.png

Make sure you assign the User assigned managed identity to Logic App.

  1. Choose the logic app
  2. Select Identity under Settings
  3. Choose User assigned
  4. Click on ‘Add’ and select the User assigned managed identity you created in the pre-requisite section

Picture2.png

 

How it works

By default this automation runs weekly and queries the Root Management group to identify any new subscription(s) that are directly assigned to the root management group. If one or more subscriptions are found in the Root management group, the Logic App will send an email with the following details: Subscription Name, Subscription ID, Action, Status of the subscription (If ASC is enabled or disabled). Image 1 has an example of how this email look like:

Image 1: Email Notification of subscription(s) assigned to Root Management GroupImage 1: Email Notification of subscription(s) assigned to Root Management Group

Make sure to add the subscription(s) to the Management Groups in order to start monitoring using Azure Security Center. The automation artifact also creates a Storage account with a table storage in it during the deployment of the template. If the intent of assigning the subscription to the root management group was on purpose, you could exclude the subscription from being displayed in the email on next run by just clicking on the hyperlink ‘Exclude <subscriptionname>’ under the Action column of Image 1. When you click on the hyperlink, the subscription name will be added to the table storage of the storage account. The successful addition to the exclusion list will be confirmed in the browser as shown in Image 2.

Image 2: Confirmation of subscription addition to Storage account’s Table Storage (Exclusion List)Image 2: Confirmation of subscription addition to Storage account’s Table Storage (Exclusion List)

With the help of Microsoft Azure Storage Explorer, you can connect to the storage account to confirm the subscription has been added successfully in the above step. Refer to the example in Image 3.

Image 3: Storage Explorer viewImage 3: Storage Explorer view

By doing so, during the next run of the logicapp, it queries the exclusion list (table storage) and incase the result matches to the subscription(s) already in the exclusion list, the logicapp does not alert you for that subscription(s) as it understands the assignment to the root management group was on purpose. This process makes it easy to the security admins to deal with monitored vs un-monitored subscriptions.

An example of next run is shown in the example screenshot Image 4 (Notice how ‘Azure Subscription 1’ is excluded and not notified in the email).

Image 4: Logic App next run resultImage 4: Logic App next run result

It is very important to notice the ASC Enabled field and make sure the subscription is monitored with the help of Azure Security Center so that Security Center is able to assess your environment and enables you to understand the status of the resources and eventually help you increase your organization’s secure score.

 

Go ahead, deploy the workflow in your environment to prioritize monitoring security hygiene. Make sure to let us know what you think by commenting on this article.

 

This logic app as well as many other can be found here:

Direct Link to GitHub sample

Azure Security Center GitHub Repo

 

Reviewer

Special Thanks to ‘Nicholas DiCola, Principal Director’ & ‘Gilad Elyashar, Principal Group Program Manager’, for envisioning this wonderful automation idea.

Special Thanks to Yuri Diogenes, Principal Program Manager in the CxE ASC Team for reviewing this article and for the inputs.

2 Comments
Occasional Contributor

@Safeena Begum Lepakshi . A good article. Thanks for sharing. One thing once we receive the email for unmonitored subscription. Customer need to manually enable it and then add to exclusions ?  

@Pavan_Gelli1910 Thank you for the feedback. The automation uses two logic apps, in an instance you receive an email with unmonitored subscription(s) and if you'd like to add the subscription(s) to the exclusion list, you simply have to click on the subscription ID hyperlink under 'Action' (in the email) and the 2nd logic app will be kicked-in automatically and adds that subscription to the exclusion list. 

You can view the exclusions in the storage account that the logicapp creates automatically during the deployment. 

%3CLINGO-SUB%20id%3D%22lingo-sub-2111408%22%20slang%3D%22en-US%22%3EIdentifying%20Subscriptions%20that%20are%20not%20Managed%20by%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2111408%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Security%20Center%20continually%20assesses%20your%20subscriptions%20to%20identify%20resources%20and%20provide%20security%20recommendations%20for%20them.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20the%20large%20organizations%20with%20many%20subscriptions%2C%20it%20is%20recommended%20to%20manage%20access%20and%20policies%20using%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fmanagement-groups%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Management%20Groups%3C%2FA%3E%20to%20organize%20their%20subscriptions%20according%20to%20the%20business%20needs.%20By%20moving%20multiple%20subscriptions%20under%20that%20management%20group%2C%20you%20can%20create%20one%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Frole-based-access-control%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20role%20assignment%3C%2FA%3E%26nbsp%3Bon%20the%20management%20group%20level%2C%20which%20will%20inherit%20that%20access%20to%20all%20the%20subscriptions.%20Every%20directory%20is%20given%20a%20single%20top-level%20management%20group%20called%20%E2%80%9CRoot%E2%80%9D%20management%20group.%20This%20root%20management%20group%20is%20built%20into%20the%20hierarchy%20to%20have%20all%20management%20groups%20and%20subscriptions%20fold%20up%20to%20it.%20Similarly%2C%20when%20organizations%20need%20to%20enable%20Azure%20Security%20Center%20across%20different%20subscriptions%20that%20have%20different%20workloads%20and%20therefore%20different%20assessment%20needs%2C%20it%20is%20also%20common%20that%20they%20want%20to%20customize%20its%20policies%20and%20control%20it%20in%20the%20Management%20Group%20level%20rather%20than%20in%20the%20subscription%20level%20to%20maintain%20centralized%20policy%20management%20in%20Azure%20Security%20Center.%20Refer%20to%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fcentralized-policy-management-in-azure-security-center-using%2Fba-p%2F1276331%22%20target%3D%22_blank%22%3Ethis%20article%3C%2FA%3E%20if%20you%20haven%E2%80%99t%20already%20thought%20of%20this%20approach.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20the%20above%20understanding%20of%20Management%20Groups%20and%20visibility%20across%20multiple%20subscriptions%2C%20is%20important%20to%20always%20be%20aware%20of%20scenarios%20that%20a%20new%20subscriptions%20is%20created%20and%20by%20default%20stays%20in%20the%20Root%20Management%20Group.%20It%20is%20a%20common%20scenario%20for%20organizations%20provision%20new%20subscriptions%20on%20the%20daily%20basis%20and%20since%20those%20subscription%20will%20be%20added%20to%20the%20root%20management%20group%2C%20it%20creates%20a%20challenge%20to%20maintain%20them%20in%20the%20correct%20Management%20Group.%20This%20also%20creates%20a%20problem%20of%20monitored%20vs%20non-monitored%20subscriptions.%20In%20this%20blog%2C%20I%E2%80%99m%20introducing%20you%20to%20a%20workflow%20automation%20that%20helps%20you%20to%20identify%20subscriptions%20that%20are%20not%20monitored%20and%20take%20an%20action%20to%20fix%20the%20problem.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EPrerequisites%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20automation%20uses%20%3CEM%3EUser%20Assigned%20Managed%20Identity%3C%2FEM%3E%20to%20be%20able%20to%20query%20the%20Root%20management%20group.%20Please%20follow%20the%20below%20step%20by%20step%20instructions%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ECreate%20User%20Assigned%20Managed%20Identity.%20Follow%20the%20instructions%20listed%20in%20the%20doc%20to%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fmanaged-identities-azure-resources%2Fhow-to-manage-ua-identity-portal%23create-a-user-assigned-managed-identity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ecreate%20user-assigned%20managed%20identity%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EOnce%20User-assigned%20managed%20identity%20is%20created%2C%20make%20sure%20to%20assign%20Reader%20Permissions%20to%20the%20Root%20Management%20Group%20(Please%20refer%20the%20section%20%E2%80%98%3CEM%3EAuthorize%20the%20Tenant%20Root%20Group%20and%20Logic%20App%E2%80%99s%20managed%20identity%3C%2FEM%3E%E2%80%99%20for%20step-by-step%20instructions)%3C%2FLI%3E%0A%3CLI%3EEnable%20and%20add%20the%20above%20created%20User%20assigned%20Identity%20to%20the%20Logic%20App.%20Follow%20the%20instructions%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flogic-apps%2Fcreate-managed-service-identity%23create-user-assigned-identity-in-the-azure-portal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%26nbsp%3Bto%20assign%20the%20User%20assigned%20identity%20to%20the%20Logic%20App%20or%20refer%20the%20section%20%E2%80%98%3CEM%3EAuthorize%20the%20Tenant%20Root%20Group%20and%20Logic%20App%E2%80%99s%20managed%20identity%3C%2FEM%3E%E2%80%99%20for%20step-by-step%20instructions.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSTRONG%3EHow%20to%20deploy%20the%20automation%20playbook%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYou%20can%20find%20an%20ARM%20template%20that%20will%20deploy%20the%20Logic%20App%20Playbook%20and%20all%20necessary%20API%20connections%20in%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Security-Center%2Ftree%2Fmaster%2FWorkflow%2520automation%2FSubscriptionManagement%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Center%20GitHub%20repository%3C%2FA%3E.%20Once%20you%20have%20deployed%20the%20ARM%20template%2C%20you%20will%20have%20some%20manual%20steps%20to%20take%20before%20the%20tool%20will%20work%20as%20expected.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMake%20sure%20to%20authorize%20the%20Office%20365%20API%20connection%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThis%20API%20connection%20is%20used%20to%20send%20emails%20weekly.%20To%20authorize%20the%20API%20connection%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EGo%20to%20the%20Resource%20Group%20you%20have%20used%20to%20deploy%20the%20template%20resources.%3C%2FLI%3E%0A%3CLI%3ESelect%20the%20Office365%20API%20connection%20and%20press%20'Edit%20API%20connection'.%3C%2FLI%3E%0A%3CLI%3EPress%20the%20'Authorize'%20button.%3C%2FLI%3E%0A%3CLI%3EMake%20sure%20to%20authenticate%20against%20Azure%20AD.%3C%2FLI%3E%0A%3CLI%3EPress%20'Save'.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSTRONG%3EAuthorize%20the%20Tenant%20Root%20Group%20and%20Logic%20App%E2%80%99s%20managed%20identity%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20Logic%20App%20is%20using%20a%20user%20assigned%20managed%20identity.%20For%20this%20purpose%2C%20you%20need%20to%20grant%20it%20the%20%3CEM%3EReader%3C%2FEM%3E%20role%20on%20tenant%20root%20management%20group%2C%20so%20it%20is%20able%20to%20query%20all%20the%20subscriptions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMake%20sure%20you%20have%20User%20Access%20Administrator%20or%20Owner%20permissions%20for%20this%20scope.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EGo%20to%20the%20Management%20groups%20page.%3C%2FLI%3E%0A%3CLI%3EClick%20on%20the%20details%20in%20the%20%E2%80%98Tenant%20root%20group%E2%80%99%3C%2FLI%3E%0A%3CLI%3EPress%20'Access%20Control%20(IAM)'%20on%20the%20navigation%20bar.%3C%2FLI%3E%0A%3CLI%3EPress%20'%2BAdd'%20and%20'Add%20role%20assignment'.%3C%2FLI%3E%0A%3CLI%3EChoose%20%E2%80%98%3CEM%3EReader%E2%80%99%3C%2FEM%3E%26nbsp%3Brole.%3C%2FLI%3E%0A%3CLI%3EAssign%20access%20to%20User%20assigned%20managed%20identity.%3C%2FLI%3E%0A%3CLI%3EChoose%20the%20subscription%20where%20the%20logic%20app%20was%20deployed.%3C%2FLI%3E%0A%3CLI%3ESelect%20the%20name%20of%20the%20User%20assigned%20identity.%3C%2FLI%3E%0A%3CLI%3EPress%20'Save'.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture1.png%22%20style%3D%22width%3A%20624px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251427i0189A74A49BE3C6D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture1.png%22%20alt%3D%22Picture1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EMake%20sure%20you%20assign%20the%20User%20assigned%20managed%20identity%20to%20Logic%20App.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EChoose%20the%20logic%20app%3C%2FLI%3E%0A%3CLI%3ESelect%20Identity%20under%20Settings%3C%2FLI%3E%0A%3CLI%3EChoose%20User%20assigned%3C%2FLI%3E%0A%3CLI%3EClick%20on%20%E2%80%98Add%E2%80%99%20and%20select%20the%20User%20assigned%20managed%20identity%20you%20created%20in%20the%20pre-requisite%20section%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture2.png%22%20style%3D%22width%3A%20624px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251428iDEC566ED2828A0F3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture2.png%22%20alt%3D%22Picture2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EHow%20it%20works%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EBy%20default%20this%20automation%20runs%20weekly%20and%20queries%20the%20Root%20Management%20group%20to%20identify%20any%20new%20subscription(s)%20that%20are%20directly%20assigned%20to%20the%20root%20management%20group.%20If%20one%20or%20more%20subscriptions%20are%20found%20in%20the%20Root%20management%20group%2C%20the%20Logic%20App%20will%20send%20an%20email%20with%20the%20following%20details%3A%20%3CEM%3ESubscription%20Name%3C%2FEM%3E%2C%20%3CEM%3ESubscription%20ID%3C%2FEM%3E%2C%20%3CEM%3EAction%3C%2FEM%3E%2C%20%3CEM%3EStatus%3C%2FEM%3E%20of%20the%20subscription%20(If%20ASC%20is%20enabled%20or%20disabled).%20%3CEM%3EImage%201%3C%2FEM%3E%20has%20an%20example%20of%20how%20this%20email%20look%20like%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture3.png%22%20style%3D%22width%3A%20624px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251430i2FD787DC1DFB1A20%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture3.png%22%20alt%3D%22Image%201%3A%20Email%20Notification%20of%20subscription(s)%20assigned%20to%20Root%20Management%20Group%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%201%3A%20Email%20Notification%20of%20subscription(s)%20assigned%20to%20Root%20Management%20Group%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EMake%20sure%20to%20add%20the%20subscription(s)%20to%20the%20Management%20Groups%20in%20order%20to%20start%20monitoring%20using%20Azure%20Security%20Center.%20The%20automation%20artifact%20also%20creates%20a%20Storage%20account%20with%20a%20table%20storage%20in%20it%20during%20the%20deployment%20of%20the%20template.%20If%20the%20intent%20of%20assigning%20the%20subscription%20to%20the%20root%20management%20group%20was%20on%20purpose%2C%20you%20could%20exclude%20the%20subscription%20from%20being%20displayed%20in%20the%20email%20on%20next%20run%20by%20just%20clicking%20on%20the%20hyperlink%20%E2%80%98%3CEM%3EExclude%20%3CSUBSCRIPTIONNAME%3E%3C%2FSUBSCRIPTIONNAME%3E%3C%2FEM%3E%E2%80%99%20under%20the%20%3CEM%3EAction%3C%2FEM%3E%20column%20of%20%3CEM%3EImage%201%3C%2FEM%3E.%20When%20you%20click%20on%20the%20hyperlink%2C%20the%20subscription%20name%20will%20be%20added%20to%20the%20table%20storage%20of%20the%20storage%20account.%20The%20successful%20addition%20to%20the%20exclusion%20list%20will%20be%20confirmed%20in%20the%20browser%20as%20shown%20in%20%3CEM%3EImage%202%3C%2FEM%3E.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture4.png%22%20style%3D%22width%3A%20624px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251431i7D485E6B6D97B612%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture4.png%22%20alt%3D%22Image%202%3A%20Confirmation%20of%20subscription%20addition%20to%20Storage%20account%E2%80%99s%20Table%20Storage%20(Exclusion%20List)%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%202%3A%20Confirmation%20of%20subscription%20addition%20to%20Storage%20account%E2%80%99s%20Table%20Storage%20(Exclusion%20List)%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWith%20the%20help%20of%20Microsoft%20Azure%20Storage%20Explorer%2C%20you%20can%20connect%20to%20the%20storage%20account%20to%20confirm%20the%20subscription%20has%20been%20added%20successfully%20in%20the%20above%20step.%20Refer%20to%20the%20example%20in%20%3CEM%3EImage%203%3C%2FEM%3E.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture5.png%22%20style%3D%22width%3A%20624px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251432i9E41F41D723367ED%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture5.png%22%20alt%3D%22Image%203%3A%20Storage%20Explorer%20view%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%203%3A%20Storage%20Explorer%20view%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EBy%20doing%20so%2C%20during%20the%20next%20run%20of%20the%20logicapp%2C%20it%20queries%20the%20exclusion%20list%20(table%20storage)%20and%20incase%20the%20result%20matches%20to%20the%20subscription(s)%20already%20in%20the%20exclusion%20list%2C%20the%20logicapp%20does%20not%20alert%20you%20for%20that%20subscription(s)%20as%20it%20understands%20the%20assignment%20to%20the%20root%20management%20group%20was%20on%20purpose.%20This%20process%20makes%20it%20easy%20to%20the%20security%20admins%20to%20deal%20with%20monitored%20vs%20un-monitored%20subscriptions.%3C%2FP%3E%0A%3CP%3EAn%20example%20of%20next%20run%20is%20shown%20in%20the%20example%20screenshot%20%3CEM%3EImage%204%20%3C%2FEM%3E(Notice%20how%20%E2%80%98Azure%20Subscription%201%E2%80%99%20is%20excluded%20and%20not%20notified%20in%20the%20email).%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture6.png%22%20style%3D%22width%3A%20624px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251433i2988361F97C7C8B3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture6.png%22%20alt%3D%22Image%204%3A%20Logic%20App%20next%20run%20result%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%204%3A%20Logic%20App%20next%20run%20result%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIt%20is%20very%20important%20to%20notice%20the%20%3CEM%3EASC%20Enabled%3C%2FEM%3E%20field%20and%20make%20sure%20the%20subscription%20is%20monitored%20with%20the%20help%20of%20Azure%20Security%20Center%20so%20that%20Security%20Center%20is%20able%20to%20assess%20your%20environment%20and%20enables%20you%20to%20understand%20the%20status%20of%20the%20resources%20and%20eventually%20help%20you%20increase%20your%20organization%E2%80%99s%20secure%20score.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EGo%20ahead%2C%20deploy%20the%20workflow%20in%20your%20environment%20to%20prioritize%20monitoring%20security%20hygiene.%20Make%20sure%20to%20let%20us%20know%20what%20you%20think%20by%20commenting%20on%20this%20article.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20logic%20app%20as%20well%20as%20many%20other%20can%20be%20found%20here%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Security-Center%2Ftree%2Fmaster%2FWorkflow%2520automation%2FSubscriptionManagement%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDirect%20Link%20to%20GitHub%20sample%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Security-Center%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Center%20GitHub%20Repo%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1970997555%22%20id%3D%22toc-hId-1970997555%22%20id%3D%22toc-hId-1970997555%22%20id%3D%22toc-hId-1970997555%22%20id%3D%22toc-hId-1970010398%22%3E%3CSTRONG%3EReviewer%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3E%3CEM%3ESpecial%20Thanks%20to%20%E2%80%98%3C%2FEM%3E%3CEM%3ENicholas%20DiCola%2C%20Principal%20Director%E2%80%99%20%26amp%3B%20%E2%80%98Gilad%20Elyashar%2C%20Principal%20Group%20Program%20Manager%E2%80%99%2C%20for%20envisioning%20this%20wonderful%20automation%20idea.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3ESpecial%20Thanks%20to%26nbsp%3B%3C%2FEM%3E%3CEM%3E%E2%80%98%3C%2FEM%3E%3CEM%3EYuri%20Diogenes%2C%20Principal%20Program%20Manager%3C%2FEM%3E%3CEM%3E%E2%80%99%3C%2FEM%3E%3CEM%3E%20in%20the%20CxE%20ASC%20Team%20for%20reviewing%20this%20article%3C%2FEM%3E%3CEM%3E%20and%20for%20the%20inputs%3C%2FEM%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2155746%22%20slang%3D%22en-US%22%3ERe%3A%20Identifying%20Subscriptions%20that%20are%20not%20Managed%20by%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2155746%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F223891%22%20target%3D%22_blank%22%3E%40Safeena%20Begum%20Lepakshi%3C%2FA%3E%26nbsp%3B.%20A%20good%20article.%20Thanks%20for%20sharing.%20One%20thing%20once%20we%20receive%20the%20email%20for%20unmonitored%20subscription.%20Customer%20need%20to%20manually%20enable%20it%20and%20then%20add%20to%20exclusions%20%3F%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2164539%22%20slang%3D%22en-US%22%3ERe%3A%20Identifying%20Subscriptions%20that%20are%20not%20Managed%20by%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2164539%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F492724%22%20target%3D%22_blank%22%3E%40Pavan_Gelli1910%3C%2FA%3E%26nbsp%3BThank%20you%20for%20the%20feedback.%20The%20automation%20uses%20two%20logic%20apps%2C%20in%20an%20instance%20you%20receive%20an%20email%20with%20unmonitored%20subscription(s)%20and%20if%20you'd%20like%20to%20add%20the%20subscription(s)%20to%20the%20exclusion%20list%2C%20you%20simply%20have%20to%20click%20on%20the%20subscription%20ID%20hyperlink%20under%20'Action'%20(in%20the%20email)%20and%20the%202nd%20logic%20app%20will%20be%20kicked-in%20automatically%20and%20adds%20that%20subscription%20to%20the%20exclusion%20list.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20view%20the%20exclusions%20in%20the%20storage%20account%20that%20the%20logicapp%20creates%20automatically%20during%20the%20deployment.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Feb 02 2021 08:42 AM