Skip to content

Commit 3c1fa8b

Browse files
authored
Merge pull request #227933 from AlizaBernstein/WI-45763-add-deploy-procedure-screenshots
WI-45763-add deploy procedure screenshots
2 parents b6df137 + d7098da commit 3c1fa8b

File tree

8 files changed

+65
-55
lines changed

8 files changed

+65
-55
lines changed

articles/defender-for-cloud/auto-deploy-azure-monitoring-agent.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy the Azure Monitor Agent on your Azure, multiclo
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: how-to
7-
ms.date: 08/03/2022
7+
ms.date: 02/28/2023
88
ms.custom: template-how-to, ignite-2022
99
---
1010

@@ -40,15 +40,20 @@ To deploy the Azure Monitor Agent with Defender for Cloud:
4040
1. From Defender for Cloud's menu, open **Environment settings**.
4141
1. Select the relevant subscription.
4242
1. In the Monitoring coverage column of the Defender for Server plan, select **Settings**.
43+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-server-setting.png" alt-text="Screenshot showing selecting settings for server service plan." lightbox="media/auto-deploy-azure-monitoring-agent/select-server-setting.png":::
44+
4345
1. Enable deployment of the Azure Monitor Agent:
4446

4547
1. For the **Log Analytics agent/Azure Monitor Agent**, select the **On** status.
48+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png" alt-text="Screenshot showing turning on status for Log Analytics/Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png":::
4649

4750
In the Configuration column, you can see the enabled agent type. When you enable Defender plans, Defender for Cloud decides which agent to provision based on your environment. In most cases, the default is the Log Analytics agent.
4851

4952
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
5053

5154
1. For the Auto-provisioning configuration agent type, select **Azure Monitor Agent**.
55+
56+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png" alt-text="Screenshot showing selecting Azure Monitor Agent for auto-provisioning." lightbox="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png":::
5257

5358
By default:
5459

@@ -85,9 +90,17 @@ To configure a custom destination workspace for the Azure Monitor Agent:
8590
1. From Defender for Cloud's menu, open **Environment settings**.
8691
1. Select the relevant subscription.
8792
1. In the Monitoring coverage column of the Defender for Server plan, select **Settings**.
93+
94+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-server-setting.png" alt-text="Screenshot showing selecting settings in Monitoring coverage column." lightbox="media/auto-deploy-azure-monitoring-agent/select-server-setting.png":::
95+
8896
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
97+
98+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png" alt-text="Screenshot showing where to select edit configuration for Log Analytics agent/Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png":::
99+
89100
1. Select **Custom workspace**, and select the workspace that you want to send data to.
90101

102+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision-custom.png" alt-text="screenshot showing selection of custom workspace." lightbox="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision-custom.png":::
103+
91104
### Log analytics workspace solutions
92105

93106
The Azure Monitor Agent requires Log analytics workspace solutions. These solutions are automatically installed when you auto-provision the Azure Monitor Agent with the default workspace.
@@ -99,7 +112,7 @@ The required [Log Analytics workspace solutions](../azure-monitor/insights/solut
99112

100113
### Additional extensions for Defender for Cloud
101114

102-
The Azure Monitor Agent requires additional extensions. The ASA extension, which supports endpoint protection recommendations, fileless attack detection, and Adaptive Application controls, is automatically installed when you auto-provision the Azure Monitor Agent.
115+
The Azure Monitor Agent requires more extensions. The ASA extension, which supports endpoint protection recommendations, fileless attack detection, and Adaptive Application controls, is automatically installed when you auto-provision the Azure Monitor Agent.
103116

104117
### Additional security events collection
105118

articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,18 @@ ms.topic: how-to
55
ms.custom: ignite-2022
66
ms.author: benmansheim
77
author: bmansheim
8-
ms.date: 11/09/2021
8+
ms.date: 02/28/2023
99
---
1010

1111
# Automatically configure vulnerability assessment for your machines
1212

13-
Defender for Cloud collects data from your machines using agents and extensions. To save you the process of manually installing the extensions, such as [the manual installation of the Log Analytics agent](working-with-log-analytics-agent.md#manual-agent-provisioning), Defender for Cloud reduces management overhead by installing all required extensions on existing and new machines. Learn more [monitoring components](monitoring-components.md).
13+
Defender for Cloud collects data from your machines using agents and extensions. To save you the process of manually installing the extensions, such as [the manual installation of the Log Analytics agent](working-with-log-analytics-agent.md#manual-agent-provisioning), Defender for Cloud reduces management overhead by installing all required extensions on existing and new machines. Learn more about [monitoring components](monitoring-components.md).
1414

1515
To assess your machines for vulnerabilities, you can use one of the following solutions:
1616

1717
- Microsoft's threat and vulnerability management module of Microsoft Defender for Endpoint (included with Microsoft Defender for Servers)
1818
- An integrated Qualys agent (included with Microsoft Defender for Servers)
19-
- A Qualys or Rapid7 scanner which you have licensed separately and configured within Defender for Cloud (this is called the Bring Your Own License, or BYOL, scenario)
19+
- A Qualys or Rapid7 scanner that you've licensed separately and configured within Defender for Cloud (this scenario is called the Bring Your Own License, or BYOL, scenario)
2020

2121
> [!NOTE]
2222
> To automatically configure a BYOL solution, see [Integrate security solutions in Microsoft Defender for Cloud](partner-integration.md).
@@ -25,8 +25,10 @@ To assess your machines for vulnerabilities, you can use one of the following so
2525

2626
1. From Defender for Cloud's menu, open **Environment settings**.
2727
1. Select the relevant subscription.
28-
1. In the Monitoring coverage column of the Defender for Server plan, select **Settings**.
29-
1. Turn on the vulnerability assessment for machines and select the relevant solution.
28+
1. In the Monitoring coverage column of the Defender for Servers plan, select **Settings**.
29+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-server-setting.png" alt-text="Screenshot showing selecting service plan settings for server." lightbox="media/auto-deploy-azure-monitoring-agent/select-server-setting.png":::
30+
1. Turn on the **Vulnerability assessment for machines** and select the relevant solution.
31+
:::image type="content" source="media/auto-deploy-vulnerability-assessment/turn-on-deploy-vulnerability-assessment.png" alt-text="Screenshot showing where to turn on deployment of vulnerability assessment for machines." lightbox="media/auto-deploy-vulnerability-assessment/turn-on-deploy-vulnerability-assessment.png":::
3032

3133
> [!TIP]
3234
> Defender for Cloud enables the following policy: [(Preview) Configure machines to receive a vulnerability assessment provider](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f13ce0167-8ca6-4048-8e6b-f996402e3c1b).

0 commit comments

Comments
 (0)