[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-05 (世界標準時間)。"],[],[],null,["| Enterprise [service tier](/security-command-center/docs/service-tiers)\n\n\u003cbr /\u003e\n\nThe following document describe how to modify the Azure connector configuration\nafter it has been configured for the first time. If you encounter errors, see\nthe [Troubleshooting](/security-command-center/docs/connect-scc-to-azure#troubleshooting-connection) section.\n\nBefore you begin\n\nMake sure you have the permissions described in\n[Connect to Azure for configuration and resource data collection](/security-command-center/docs/connect-scc-to-azure#before-begin).\n\nEdit the Azure connector\n\nYou can change the location and subscriptions collected by the connector\nand the user-assigned managed identity. The following fields cannot be modified:\n\n- **Azure tenant ID**\n- **Service agent ID**\n\nTo change the values of these fields, you must delete the Azure connector\nand set up a new connection.\n\n1. Open the **Connectors** tab on the **Settings** page.\n\n [Go to Connectors](https://console.cloud.google.com/security/command-center/config/connectors)\n2. Select the organization where you activated Security Command Center Enterprise.\n\n3. In the **Connectors** table \\\u003e **Azure** row, click\n more_vert\n \\*\\*More options \\\u003e **Edit**.\n\n4. On the **Configure connector** page, you can change the following\n configuration:\n\n - **Azure subscriptions**\n - **Azure locations**\n - **Grant permissions for Sensitive Data Protection\n discovery**\n5. Click **Continue**\n\n6. On the **Connect to Azure** page, you can change the following configuration:\n\n - **Managed identity client ID**\n - **Managed identity object ID**\n7. Click **Continue**, .\n\n8. In the **Test connector** page, click **Test Connector** to verify\n that Security Command Center can connect to the Microsoft Azure environment.\n\n If the connection is successful, the Google Cloud service agent assumes\n the Microsoft Azure user-assigned managed identity and has the required\n Microsoft Azure and Microsoft Entra permissions. If the connection isn't successful, see\n [Troubleshooting errors when testing the connection](/security-command-center/docs/connect-scc-to-azure#troubleshooting-connection).\n9. Click **Save** . The **Connectors** page appears.\n\nDelete the Azure connector\n\n1. Open the **Connectors** tab on the **Settings** page.\n\n [Go to Connectors](https://console.cloud.google.com/security/command-center/config/connectors)\n2. Select the organization where you activated Security Command Center Enterprise.\n\n3. In the **Connectors** table \\\u003e **Azure** row, click\n more_vert\n **More options \\\u003e Delete**."]]