Step 1/3: Configure a Microsoft Entra ID Application for Forensics
Step 1/3: Configure a Microsoft Entra ID Application for Forensics
To configure Azure Blob Storage as a forensic destination, you must log in to the Azure portal as a subscription owner or global administrator and configure the following tasks:
Create a Microsoft Entra ID Application
To create a Microsoft Entra ID application, follow the steps below:
- Log in to portal.azure.com.
- Navigate to All services > Identity > Microsoft Entra ID.
- Click App registrations.
- Click + New registration and enter the following details:
- Name: Enter the name of the application.
- Supported account types: Keep the default selection to Accounts in this organizational directory only.
- Redirect URL (optional): Leave this blank.
- Click Register.
For additional information, refer to the Microsoft Azure documentation located here.
Get the Application ID and Directory ID
After registering the Microsoft Entra ID application, the page redirects you to the Microsoft Entra ID application Overview page. Note down the Application (client) ID and Directory (tenant) ID.
Note
These values will be required when you set up the Azure application instance in the Netskope UI.
Get the Authentication Key
To get the authentication key, follow the steps below:
- On the left navigation bar of the Microsoft Entra ID application page, click Certificates & secrets.
- Under Client secrets, click + New client secret and enter the following details:
- Description: Provide a description of the key.
- Expires: Set a duration for the key.
- Click Add.
- After you save the configuration changes, under Client secrets, the right-most column contains the authentication key. Copy the key value.
Important
Ensure that you copy the key value as it is not accessible once you leave this page. The key value will be required when you set up the Azure application instance in the Netskope UI.
For additional information, refer to the Microsoft Azure documentation located here.
Assign a Role to the Microsoft Entra ID Application
To assign a role, follow the steps below:
- Log in to portal.azure.com.
- Navigate to All services > General > Subscriptions.
- On the Subscriptions page, click the appropriate subscription from the list.
- If you want to set up multiple subscriptions, group them under a Management Group and assign a role at the Management Group. When you add a new subscription to the management group, Netskope will automatically detect the subscription and perform scans as per your configuration.
- Click Access control (IAM).
- Click + Add > Add role assignment.
Assign the roles and permissions specified in Step 2/3: Assign Azure permissions to store forensic objects.
For additional information, refer to the Microsoft Azure documentation located here.