- 15 Aug 2024
- 1 Minute to read
- PDF
Navigate Tag Policy Exceptions in Microsoft Defender for Cloud
- Updated on 15 Aug 2024
- 1 Minute to read
- PDF
Understanding and managing tag policy exceptions in Microsoft Defender for Cloud is crucial for maintaining security posture while accommodating specific resource requirements. To configure a policy exception for Red Canary regarding tag requirements, enabling Red Canary to receive Microsoft Defender for Cloud alerts seamlessly via the Azure integration, follow the procedure from beginning to end.
Azure Console
In Azure, navigate to the Policy section from the Home page.
Under Authoring, click Assignments.
Identify and click the policies requiring tags.
Note: There are several approaches to complete the steps. Choose the option that best fits with your configuration and process.
Option 1 - Add an exemption
Select the Create exemption tab.
Click the ellipsis next to Exemption scope.
Under Exemption scope, click Resource Group and select RCAutomation for each subscription. Your title goes here
Note: Ensure you add exemptions to all applicable subscriptions.
Click Select.
Click Review + save.
Option 2 - Edit an existing policy assignment
Click Edit Assignment
Click the Exclusions ellipsis. This opens the Scope window
Add an exclusion for the RCAutomation Resource Group in each subscription.
Click Save.
Click Review + save.
Option 3 - Add an exclusion that applies to the entire scope of the policy
Expand the resource selectors, and under resourceType add a blanket exclusion for Microsoft.Security/automations.
Save the policy assignment. Check the compliance report to ensure that the scope was not overly broad.