Microsoft Azure
Overview
Heeler supports broad visibility into Microsoft Azure and can be configured to onboard and harvest inventory data from all subscriptions.
Microsoft Azure
To add your Microsoft Azure tenant to Heeler, create an App Registration with the necessary API permissions and a client secret.
Create a new App Registration. Navigate to that resource type and click on New registration

Add Name, e.g.,
Heeler Security, and select the option Accounts in this organizational directory only. Then Register

Return to Overview and copy/save the Application (client) ID and Directory (tenant) ID, which will be used when adding Microsoft Azure as a cloud organization in Heeler

Ensure the App registration has the correct permissions. Under Manage, select API permissions, Add a permission, and then Microsoft Graph

Select Application permissions, search for and select the following permissions one-by-one, and then select Add permissions. N.b.,
User.Readis present by default
Channel.ReadBasic.All
ChannelMember.Read.All
Chat.Create
ChatMember.Read.All
ChatMessage.Read.All
Team.ReadBasic.All
TeamMember.Read.All
Teamwork.Migrate.All
User.Read.All
User.ReadBasic.All
Confirm that permissions are added. Note their status is
Not grantedand then select Grant admin consent

After selecting Grant admin consent, click Yes in the confirmation modal

Confirm permission Status is Granted

Now navigate to Certificates & secrets and Client secrets. Add a client secret by adding a description, e.g.,
Heeler Security, and providing an expiration window, e.g.,730 days.

Confirm the secret is saved and copy its Value, which will be used when adding Microsoft Azure as a cloud organization in Heeler

Now create a new Subscription to define Heeler's permissions and scope. It is recommended that a dedicated subscription be added to your company's existing tenant. Doing this ensures isolation and adheres to industry standard best practices. The new subscription, typically named
heeler-security, will use aReaderrole. Navigate to Subscriptions and click Add

Navigate to Access control (IAM) and select Add role assignment

Select Role, search for
Reader, selectReader, and then Next

Select Members, assign access to User, group, or service principal, then click on + Select members. That opens a side panel where you can search for your App Registration by name (not its ID), select it, and then click Select

Confirm that your subscription has assigned a Reader role to your App Registration service principal

Finally, navigate to Overview and copy the value for your Subscription ID, , which will be used when adding Microsoft Azure as a cloud organization in Heeler. Afterwards, switch to Heeler

Heeler Configuration
Once the resources are created and configured in Microsoft Azure, you need to add their information to Heeler. Open the URL https://app.heeler.com/administration/connections/organizations or just click on the settings icon at the top right, select Connections, and then Cloud Organizations. Click on Add Organization and then select Microsoft Azure.

Enter:
Organization Identifer, i.e., the tenant ID
Organization Name, e.g., a unique name that describes the Microsoft Azure environment
Client ID
Client Secret
Subscription ID
Skip Listed Subscriptions, an optional comma-separated listed of subscription IDs to skip harvesting

Click Save. If everything is configured properly within Microsoft Azure you should see a success message and inventory collection will immediately begin in the background. Please note that for the first round of collection it could take some time based on the size of the Microsoft Azure footprint.

Last updated
Was this helpful?
