Skip to content

Azure

The Azure Resource Manager (Azure RM) credentials includes several platforms: Azure Resources, Microsoft Entra ID, Microsoft Endpoint (Intune), Microsoft Defender. To inventory Azure Resource Manager (Azure RM), vScope needs an app registration with Graph/Defender permissions plus Reader on the subscriptions/platforms you want to scan. Here’s how its done.

  • Permission to create app registrations and grant admin consent in your tenant. See Azure Permissions
  • Reader access (or ability to assign it) on the target subscriptions.
  • Azure portal access at portal.azure.com.

  • In the portal, search App registrations+ New registration.
  • Name it (e.g., vScope), scope to Accounts in this directory only, and click Register.

Azure finding all App registrations Register a new application in Azure

2. Add Microsoft Graph application permissions

Section titled “2. Add Microsoft Graph application permissions”
  • Go to API permissions+ Add a permissionMicrosoft GraphApplication permissions.
  • Add the set of permission for your use case. Eg. Microsoft Defender, Entra ID, Endpoint Manager (Intune). See the full list at Azure permissions reference.
  • Click Add permissions, then Grant admin consent.

Azure request API permission for application Grant Admin Consent for Default Directory in Azure

Section titled “3. Add Defender for Endpoint permissions (optional but recommended)”
  • + Add a permissionAPIs my organization uses → search WindowsDefenderATP.
  • Under Application permissions, add AdvancedQuery.Read.All and Machine.Read.All (see reference list).
  • Grant admin consent.

Azure adding permission for app registration for Windows Defender

4. Assign Reader on the subscriptions you want inventoried

Section titled “4. Assign Reader on the subscriptions you want inventoried”
  • Open Subscriptions → select a subscription → Access control (IAM)Add role assignment.
  • Choose ReaderMembers → select the app you just created → Review + assign.

Azure add role assignment in Azure Access Control (IAM) Adding role assignment reader for Azure app registration

5. Create the Azure RM credential in vScope

Section titled “5. Create the Azure RM credential in vScope”
  • In the app’s Overview, copy the Application (client) ID.
  • In vScope: Discovery Manager → add Azure RM credential → paste the Application ID.
  • Under Certificates & secrets, create a New client secret, copy the Value, and paste it into the credential’s Key field.

Azure add new client secret Creating a connection to Azure RM in vScope Discovery

  • Click Test Credential in vScope. Green indicator = ready.
  • Run a discovery; confirm Azure resources appear. If not, see Troubleshoot Azure integration.