You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-iaas-advanced-data.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ To connect the SQL Server’s host to a workspace, follow the instructions in [C
59
59
60
60
## Set up email notification for ATP alerts
61
61
62
-
You can set a list of recipients to receive an email notification when ASC alerts are generated. The email contains a direct link to the alert in Azure Security Center with all the relevant details.
62
+
You can set a list of recipients to receive an email notification when Security Center alerts are generated. The email contains a direct link to the alert in Azure Security Center with all the relevant details.
63
63
64
64
1. Go to **Security Center** > **Pricing & settings** and click on the relevant subscription
Copy file name to clipboardExpand all lines: articles/security-center/security-center-just-in-time.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,12 +57,12 @@ There are three ways to configure a JIT policy on a VM:
57
57
-[Configure JIT access in an Azure VM blade](#jit-vm)
58
58
-[Configure a JIT policy on a VM programmatically](#jit-program)
59
59
60
-
## Configure JIT in ASC
60
+
## Configure JIT in Security Center
61
61
62
-
From ASC, you can configure a JIT policy and request access to a VM using a JIT policy
62
+
From Security Center, you can configure a JIT policy and request access to a VM using a JIT policy
63
63
64
64
65
-
### Configure JIT access on a VM in ASC <aname="jit-asc"></a>
65
+
### Configure JIT access on a VM in Security Center <aname="jit-asc"></a>
66
66
67
67
1. Open the **Security Center** dashboard.
68
68
@@ -110,9 +110,9 @@ From ASC, you can configure a JIT policy and request access to a VM using a JIT
110
110
>When JIT VM Access is enabled for a VM, Azure Security Center creates "deny all inbound traffic" rules for the selected ports in the network security groups associated and Azure Firewall with it. If other rules had been created for the selected ports, then the existing rules take priority over the new “deny all inbound traffic” rules. If there are no existing rules on the selected ports, then the new “deny all inbound traffic” rules take top priority in the Network Security Groups and Azure Firewall.
111
111
112
112
113
-
## Request JIT access via ASC
113
+
## Request JIT access via Security Center
114
114
115
-
To request access to a VM via ASC:
115
+
To request access to a VM via Security Center:
116
116
117
117
1. Under **Just-in-time VM access**, select the **Configured** tab.
118
118
@@ -136,7 +136,7 @@ To request access to a VM via ASC:
136
136
> [!NOTE]
137
137
> If a user who is requesting access is behind a proxy, the option **My IP** may not work. You may need to define the full IP address range of the organization.
138
138
139
-
## Edit a JIT access policy via ASC
139
+
## Edit a JIT access policy via Security Center
140
140
141
141
You can change a VM's existing just-in-time policy by adding and configuring a new port to protect for that VM, or by changing any other setting related to an already protected port.
142
142
@@ -147,7 +147,7 @@ To edit an existing just-in-time policy of a VM:
147
147
1. Under **JIT VM access configuration**, you can either edit the existing settings of an already protected port or add a new custom port.
148
148

149
149
150
-
## Audit JIT access activity in ASC
150
+
## Audit JIT access activity in Security Center
151
151
152
152
You can gain insights into VM activities using log search. To view logs:
153
153
@@ -164,11 +164,11 @@ Modify the filters and click **Apply** to create a search and log.
164
164
165
165
166
166
167
-
## Configure JIT access in an Azure VM blade <aname="jit-vm"></a>
167
+
## Configure JIT access from an Azure VM's page <aname="jit-vm"></a>
168
168
169
-
For your convenience, you can connect to a VM using JIT directly from within the VM blade in Azure.
169
+
For your convenience, you can connect to a VM using JIT directly from within the VM's page in Security Center.
170
170
171
-
### Configure JIT access on a VM via the Azure VM blade
171
+
### Configure JIT access on a VM via the Azure VM page
172
172
173
173
To make it easy to roll out just-in-time access across your VMs, you can set a VM to allow only just-in-time access directly from within the VM.
Copy file name to clipboardExpand all lines: articles/security-center/security-center-management-groups.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -164,7 +164,7 @@ Once the RBAC roles have been assigned to the users, the tenant administrator sh
164
164
165
165
166
166
167
-
## Adding subscriptions to a management groups
167
+
## Adding subscriptions to a management group
168
168
You can add subscriptions to the management group that you created. These steps aren't mandatory for gaining tenant-wide visibility and global policy and access management.
169
169
170
170
1. Under **Management Groups**, select a management group to add your subscription to.
Copy file name to clipboardExpand all lines: articles/security-center/security-center-powershell-onboarding.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,13 @@ This article provides a sample PowerShell script that can be modified and used i
26
26
27
27
In this example, we will enable Security Center on a subscription with ID: d07c0080-170c-4c24-861d-9c817742786c and apply the recommended settings that provide a high level of protection, by implementing the Standard tier of Security Center, which provides advanced threat protection and detection capabilities:
28
28
29
-
1. Set the [ASC standard level of protection](https://azure.microsoft.com/pricing/details/security-center/).
29
+
1. Set the [Security Center standard level of protection](https://azure.microsoft.com/pricing/details/security-center/).
30
30
31
31
2. Set the Log Analytics workspace to which the Microsoft Monitoring Agent will send the data it collects on the VMs associated with the subscription – in this example, an existing user defined workspace (myWorkspace).
32
32
33
33
3. Activate Security Center’s automatic agent provisioning which [deploys the Microsoft Monitoring Agent](security-center-enable-data-collection.md#auto-provision-mma).
34
34
35
-
5. Set the organization’s [CISO as the security contact for ASC alerts and notable events](security-center-provide-security-contact-details.md).
35
+
5. Set the organization’s [CISO as the security contact for Security Center alerts and notable events](security-center-provide-security-contact-details.md).
0 commit comments