You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/auto-deploy-azure-monitoring-agent.md
+15-2Lines changed: 15 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy the Azure Monitor Agent on your Azure, multiclo
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: how-to
7
-
ms.date: 08/03/2022
7
+
ms.date: 02/28/2023
8
8
ms.custom: template-how-to, ignite-2022
9
9
---
10
10
@@ -40,15 +40,20 @@ To deploy the Azure Monitor Agent with Defender for Cloud:
40
40
1. From Defender for Cloud's menu, open **Environment settings**.
41
41
1. Select the relevant subscription.
42
42
1. In the Monitoring coverage column of the Defender for Server plan, select **Settings**.
43
+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-server-setting.png" alt-text="Screenshot showing selecting settings for server service plan." lightbox="media/auto-deploy-azure-monitoring-agent/select-server-setting.png":::
44
+
43
45
1. Enable deployment of the Azure Monitor Agent:
44
46
45
47
1. For the **Log Analytics agent/Azure Monitor Agent**, select the **On** status.
48
+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png" alt-text="Screenshot showing turning on status for Log Analytics/Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png":::
46
49
47
50
In the Configuration column, you can see the enabled agent type. When you enable Defender plans, Defender for Cloud decides which agent to provision based on your environment. In most cases, the default is the Log Analytics agent.
48
51
49
52
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
50
53
51
54
1. For the Auto-provisioning configuration agent type, select **Azure Monitor Agent**.
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
97
+
98
+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png" alt-text="Screenshot showing where to select edit configuration for Log Analytics agent/Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png":::
99
+
89
100
1. Select **Custom workspace**, and select the workspace that you want to send data to.
90
101
102
+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision-custom.png" alt-text="screenshot showing selection of custom workspace." lightbox="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision-custom.png":::
103
+
91
104
### Log analytics workspace solutions
92
105
93
106
The Azure Monitor Agent requires Log analytics workspace solutions. These solutions are automatically installed when you auto-provision the Azure Monitor Agent with the default workspace.
@@ -99,7 +112,7 @@ The required [Log Analytics workspace solutions](../azure-monitor/insights/solut
99
112
100
113
### Additional extensions for Defender for Cloud
101
114
102
-
The Azure Monitor Agent requires additional extensions. The ASA extension, which supports endpoint protection recommendations, fileless attack detection, and Adaptive Application controls, is automatically installed when you auto-provision the Azure Monitor Agent.
115
+
The Azure Monitor Agent requires more extensions. The ASA extension, which supports endpoint protection recommendations, fileless attack detection, and Adaptive Application controls, is automatically installed when you auto-provision the Azure Monitor Agent.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,18 +5,18 @@ ms.topic: how-to
5
5
ms.custom: ignite-2022
6
6
ms.author: benmansheim
7
7
author: bmansheim
8
-
ms.date: 11/09/2021
8
+
ms.date: 02/28/2023
9
9
---
10
10
11
11
# Automatically configure vulnerability assessment for your machines
12
12
13
-
Defender for Cloud collects data from your machines using agents and extensions. To save you the process of manually installing the extensions, such as [the manual installation of the Log Analytics agent](working-with-log-analytics-agent.md#manual-agent-provisioning), Defender for Cloud reduces management overhead by installing all required extensions on existing and new machines. Learn more [monitoring components](monitoring-components.md).
13
+
Defender for Cloud collects data from your machines using agents and extensions. To save you the process of manually installing the extensions, such as [the manual installation of the Log Analytics agent](working-with-log-analytics-agent.md#manual-agent-provisioning), Defender for Cloud reduces management overhead by installing all required extensions on existing and new machines. Learn more about [monitoring components](monitoring-components.md).
14
14
15
15
To assess your machines for vulnerabilities, you can use one of the following solutions:
16
16
17
17
- Microsoft's threat and vulnerability management module of Microsoft Defender for Endpoint (included with Microsoft Defender for Servers)
18
18
- An integrated Qualys agent (included with Microsoft Defender for Servers)
19
-
- A Qualys or Rapid7 scanner which you have licensed separately and configured within Defender for Cloud (this is called the Bring Your Own License, or BYOL, scenario)
19
+
- A Qualys or Rapid7 scanner that you've licensed separately and configured within Defender for Cloud (this scenario is called the Bring Your Own License, or BYOL, scenario)
20
20
21
21
> [!NOTE]
22
22
> To automatically configure a BYOL solution, see [Integrate security solutions in Microsoft Defender for Cloud](partner-integration.md).
@@ -25,8 +25,10 @@ To assess your machines for vulnerabilities, you can use one of the following so
25
25
26
26
1. From Defender for Cloud's menu, open **Environment settings**.
27
27
1. Select the relevant subscription.
28
-
1. In the Monitoring coverage column of the Defender for Server plan, select **Settings**.
29
-
1. Turn on the vulnerability assessment for machines and select the relevant solution.
28
+
1. In the Monitoring coverage column of the Defender for Servers plan, select **Settings**.
29
+
:::image type="content" source="media/auto-deploy-azure-monitoring-agent/select-server-setting.png" alt-text="Screenshot showing selecting service plan settings for server." lightbox="media/auto-deploy-azure-monitoring-agent/select-server-setting.png":::
30
+
1. Turn on the **Vulnerability assessment for machines** and select the relevant solution.
31
+
:::image type="content" source="media/auto-deploy-vulnerability-assessment/turn-on-deploy-vulnerability-assessment.png" alt-text="Screenshot showing where to turn on deployment of vulnerability assessment for machines." lightbox="media/auto-deploy-vulnerability-assessment/turn-on-deploy-vulnerability-assessment.png":::
30
32
31
33
> [!TIP]
32
34
> Defender for Cloud enables the following policy: [(Preview) Configure machines to receive a vulnerability assessment provider](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f13ce0167-8ca6-4048-8e6b-f996402e3c1b).
0 commit comments