Skip to content

Commit 0c9a286

Browse files
authored
Merge pull request #112848 from memildin/asc-melvyn-vmva
Added programatic method for deploying VA solution
2 parents 313e39b + 09edbda commit 0c9a286

File tree

1 file changed

+52
-3
lines changed

1 file changed

+52
-3
lines changed

articles/security-center/partner-vulnerability-assessment.md

Lines changed: 52 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ ms.author: memildin
1919

2020
If you're on the standard tier, you're able to use Azure Security Center's built-in vulnerability assessment tool as described in [Integrated vulnerability scanner for virtual machines](built-in-vulnerability-assessment.md). This tool doesn't require a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
2121

22-
Alternatively, you might want to deploy your own privately-licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/). You can install one of these partner solutions on multiple VMs that belong to the same subscription.
22+
Alternatively, you might want to deploy your own privately licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/). You can install one of these partner solutions on multiple VMs that belong to the same subscription.
2323

24-
## Configuring a partner solution
24+
## Configuring a partner solution (in the Azure portal)
2525

2626
1. On the **Security Center** dashboard, in the **Overview** section, click **Recommendations**.
2727

@@ -60,8 +60,57 @@ Alternatively, you might want to deploy your own privately-licensed vulnerabilit
6060

6161
1. Click **OK**.
6262

63+
64+
## Configuring a partner solution (using PowerShell and the REST API)
65+
66+
To programatically deploy your own privately licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/), use the supplied script [PowerShell > Vulnerability Solution](https://github.com/Azure/Azure-Security-Center/tree/master/Powershell%20scripts/Vulnerability%20Solution).
67+
68+
This script uses the REST API to create a new Security Solution in ASC. The solution requires a license and a key provided by the service provider: Qualys or Rapid7.
69+
70+
> [!IMPORTANT]
71+
> Only one solution can be created per license. Attempting to create another solution using the same name/license/key will fail.
72+
73+
### Prerequisites
74+
75+
Required PowerShell modules:
76+
77+
- Install-module Az
78+
- Install-module Az.security
79+
80+
### Running the script
81+
82+
To run the script, you'll need the relevant information for the parameters below.
83+
84+
| **Parameter** | **Required** | **Notes** |
85+
|----|:----:|----|
86+
|**SubscriptionId**||The subscriptionID of the Azure Subscription that contains the resources you want to analyze.|
87+
|**ResourceGroupName**||Name of the resource group. Use any existing resource group including the default ("DefaultResourceGroup-xxx"). Since the solution isn't an Azure resource, it won't be listed under the resource group, but still it is attached to it.|
88+
|**vaSolutionName**||The name of the new solution.|
89+
|**vaType**||Qualys or Rapid7.|
90+
|**licenceCode**||Vendor provided license string.|
91+
|**publicKey**||Vendor provided public key.|
92+
|**autoUpdate**|-|Enable (true) or disable (false) auto deploy for this VA solution. When enabled, every new VM on the subscription will automatically attempt to link to the solution.<br/>(Default: False)|
93+
94+
95+
Syntax:
96+
97+
```
98+
.\New-ASCVASolution.ps1 -subscriptionId <Subscription Id> -resourceGroupName <RG Name>
99+
-vaSolutionName <New solution name> -vaType <Qualys / Rapid7> -autoUpdate <true/false>
100+
-licenceCode <License code from vendor> -publicKey <Public Key received from vendor>
101+
```
102+
103+
Example (this example doesn't include valid license details):
104+
105+
```
106+
.\New-ASCVASolution.ps1 -subscriptionId 'f4cx1b69-dtgb-4ch6-6y6f-ea2e95373d3b' -resourceGroupName 'DefaultResourceGroup-WEU' -vaSolutionName 'QualysVa001' -vaType 'Qualys' -autoUpdate 'false' `
107+
-licenceCode 'eyJjaWQiOiJkZDg5OTYzXe4iMTMzLWM4NTAtODM5FD2mZWM1N2Q3ZGU5MjgiLCJgbTYuOiIyMmM5NDg3MS1lNTVkLTQ1OGItYjhlMC03OTRhMmM3YWM1ZGQiLCJwd3NVcmwiOiJodHRwczovL3FhZ3B1YmxpYy1wMDEuaW50LnF1YWx5cy5jb20vQ2xvdSKJY6VudC8iLCJwd3NQb3J0IjoiNDQzIn0=' `
108+
-publicKey 'MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCOiOLXjOywMfLZIBGPZLwSocf1Q64GASLK9OHFEmanBl1nkJhZDrZ4YD5lM98fThYbAx1Rde2iYV1ze/wDlX4cIvFAyXuN7HbdkeIlBl6vWXEBZpUU17bOdJOUGolzEzNBhtxi/elEZLghq9Chmah82me/okGMIhJJsCiTtglVQIDAQAB'
109+
```
110+
111+
63112
## Review the recommendation
64-
After the vulnerability assessment solution is installed on the target VM, Security Center scans the VM to detect and identify system and application vulnerabilities.
113+
After the vulnerability assessment solution is installed on the target VM, Security Center scans the VM to detect and identify vulnerabilities in the system and application.
65114

66115
> [!NOTE]
67116
> It might take a couple of hours for the first scan to complete. After that, it is an hourly process.

0 commit comments

Comments
 (0)