Skip to content

Commit 2cb07c7

Browse files
Merge pull request #261763 from SwathiDhanwada-MSFT/patch-102
Added info on how to enable AMA agent
2 parents 379e86c + baad0ae commit 2cb07c7

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/automanage/virtual-machines-custom-profile.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,7 @@ The following ARM template creates an Automanage custom profile. Details on the
122122
"LogAnalytics/Enable": true,
123123
"LogAnalytics/Reprovision": "[parameters('LogAnalyticsBehavior')]",
124124
"LogAnalytics/Workspace": "[parameters('logAnalyticsWorkspace')]",
125+
"LogAnalytics/UseAma": true,
125126
"UpdateManagement/Enable": true,
126127
"VMInsights/Enable": true,
127128
"WindowsAdminCenter/Enable": true,
@@ -157,6 +158,8 @@ The `azureSecurityBaselineAssignmentType` is the audit mode that you can choose
157158
* ApplyAndMonitor : This setting applies the Azure security baseline through the Guest Configuration extention when you first assign this profile to each machine. After it's applied, the Guest Configuration service will monitor the server baseline and report any drift from the desired state. However, it will not auto-remdiate.
158159
* Audit : This setting installs the Azure security baseline using the Guest Configuration extension. You're able to see where your machine is out of compliance with the baseline, but noncompliance isn't automatically remediated.
159160

161+
The `LogAnalytics/UseAma` value is where you can specify to use Azure Monitor Agent or not.
162+
160163
You can also specify an existing log analytics workspace by adding this setting to the configuration section of properties below:
161164
* "LogAnalytics/Workspace": "/subscriptions/**subscriptionId**/resourceGroups/**resourceGroupName**/providers/Microsoft.OperationalInsights/workspaces/**workspaceName**"
162165
* "LogAnalytics/Reprovision": false

0 commit comments

Comments
 (0)