Our Azure integration supports external-facing IPs and hostnames from DNS zones.
Azure app service endpoints (including web apps) would need to be added manually (as would internal-only VMs).
There are two places you can add your Microsoft Azure account in the portal:
From the Targets page by clicking the yellow + Add Targets
button then clicking Cloud Account Sync:
Or, from the Integrations page by clicking on the green + Add
button under Azure:
Create an application for Intruder
Log in to the Azure management portal > search for
App registrations
using the search functionality > clickApp registrations
:
Retrieve the Application ID, Application secret key, Directory ID and Subscription ID from Azure
We require four access keys to connect your Azure account to Intruder:
'Application (client) ID' of the Azure application you just created
'Directory (tenant) ID' from Azure Active Directory (also shown on the App Overview page)
'Application secret key' of the Azure application you just created
'Subscription ID' of your Azure subscription.
You need to get them from various sections of the Azure portal, so it's probably best to open a text document that you can copy them into. It should all be straightforward if you follow the steps below, so hang in there!
Application secret key (in Azure you're looking for the secret 'VALUE')
Now scroll down and click on
Certificates & secrets
in the left navigation panelClick on the
New client secret
button:
Enter a description (e.g. 'Intruder')
Set an expiry date (i.e. how long you want the secret to be valid for).
(⚠️ Please note that Intruder will no longer be able to access your Azure account when the secret expires.)
Now click
Add
and note down thesecret
VALUE
. (Not the Secret ID).
(You'll need this for the 'Application secret key' field in the Intruder portal.)
⚠️ Please note that you won't be able to see that 'Application secret key' again after you've left this screen, so make sure you copy and paste it now!
Subscription ID
Search for
Subscriptions
using the search functionality and click to see the 'Subscriptions' menu.
Select your subscription from the list of Azure Subscriptions displayed. The following screenshots show the 'Intruder' subscription but yours will likely be specific to your organisation
Create a role
Click '
Select members
', and in the pop up window, search for the application we created earlier (e.g. 'Intruder', or whatever you chose to name it).
Enter the IDs and Keys into the Intruder portal
Log into the Intruder portal > Targets page >
Cloud accounts
>Add account
>Microsoft Azure
:
Enter the Application ID, Directory ID, Application secret key and Subscription ID > click '
Add account
':
The next thing you'll see is this modal 👇, for automated management of your cloud targets.
If that's not of interest and you'd like to manage them manually, skip the boxes and simply press Confirm setup
.
Intruder scans comply with Microsoft's Penetration Testing Rules of Engagement.
Note: Azure integration is only available for customers on our Pro, Premium and Vanguard plans.