Skip to content

Commit 3f8fa80

Browse files
Merge pull request #109642 from memildin/asc-melvyn-anh
Replaced "Microsoft Monitoring Agent" and "MMA" with updated names
2 parents 0e8224f + 47e563e commit 3f8fa80

22 files changed

+91
-91
lines changed

articles/security-center/faq-azure-monitor-logs.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Security Center FAQ - questions about existing MMAs
3-
description: This FAQ answers questions for customers already using the Microsoft Monitoring Agent and considering Azure Security Center, a product that helps you prevent, detect, and respond to threats.
2+
title: Azure Security Center FAQ - questions about existing Log Analytics agents
3+
description: This FAQ answers questions for customers already using the Log Analytics agent and considering Azure Security Center, a product that helps you prevent, detect, and respond to threats.
44
services: security-center
55
documentationcenter: na
66
author: memildin
@@ -20,12 +20,12 @@ ms.author: memildin
2020

2121
## Does Security Center override any existing connections between VMs and workspaces?
2222

23-
If a VM already has the Microsoft Monitoring Agent installed as an Azure extension, Security Center does not override the existing workspace connection. Instead, Security Center uses the existing workspace. The VM will be protected provided that the "Security" or "SecurityCenterFree" solution has been installed on the workspace to which it is reporting.
23+
If a VM already has the Log Analytics agent installed as an Azure extension, Security Center does not override the existing workspace connection. Instead, Security Center uses the existing workspace. The VM will be protected provided that the "Security" or "SecurityCenterFree" solution has been installed on the workspace to which it is reporting.
2424

2525
A Security Center solution is installed on the workspace selected in the Data Collection screen if not present already, and the solution is applied only to the relevant VMs. When you add a solution, it's automatically deployed by default to all Windows and Linux agents connected to your Log Analytics workspace. [Solution Targeting](../operations-management-suite/operations-management-suite-solution-targeting.md) allows you to apply a scope to your solutions.
2626

2727
> [!TIP]
28-
> If the Microsoft Monitoring Agent is installed directly on the VM (not as an Azure extension), Security Center does not install the Microsoft Monitoring Agent, and security monitoring is limited.
28+
> If the Log Analytics agent is installed directly on the VM (not as an Azure extension), Security Center does not install the Log Analytics agent, and security monitoring is limited.
2929
3030
## Does Security Center install solutions on my existing Log Analytics workspaces? What are the billing implications?
3131
When Security Center identifies that a VM is already connected to a workspace you created, Security Center enables solutions on this workspace according to your pricing tier. The solutions are applied only to the relevant Azure VMs, via [solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md), so the billing remains the same.
@@ -36,9 +36,9 @@ When Security Center identifies that a VM is already connected to a workspace yo
3636
![Solutions on default workspace](./media/security-center-platform-migration-faq/solutions.png)
3737

3838
## I already have workspaces in my environment, can I use them to collect security data?
39-
If a VM already has the Microsoft Monitoring Agent installed as an Azure extension, Security Center uses the existing connected workspace. A Security Center solution is installed on the workspace if not present already, and the solution is applied only to the relevant VMs via [solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md).
39+
If a VM already has the Log Analytics agent installed as an Azure extension, Security Center uses the existing connected workspace. A Security Center solution is installed on the workspace if not present already, and the solution is applied only to the relevant VMs via [solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md).
4040

41-
When Security Center installs the Microsoft Monitoring Agent on VMs, it uses the default workspace(s) created by Security Center.
41+
When Security Center installs the Log Analytics agent on VMs, it uses the default workspace(s) created by Security Center.
4242

4343
## I already have security solution on my workspaces. What are the billing implications?
4444
The Security & Audit solution is used to enable Security Center standard tier features for Azure VMs. If the Security & Audit solution is already installed on a workspace, Security Center uses the existing solution. There is no change in billing.

articles/security-center/faq-data-collection-agents.md

Lines changed: 26 additions & 26 deletions
Large diffs are not rendered by default.

articles/security-center/faq-general.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.author: memildin
2121
## What is Azure Security Center?
2222
Azure Security Center helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your resources. It provides integrated security monitoring and policy management across your subscriptions, helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of security solutions.
2323

24-
Security Center uses the Microsoft Monitoring Agent to collect and store data. For in-depth details, see [Data collection in Azure Security Center](security-center-enable-data-collection.md).
24+
Security Center uses the Log Analytics agent to collect and store data. For in-depth details, see [Data collection in Azure Security Center](security-center-enable-data-collection.md).
2525

2626

2727
## How do I get Azure Security Center?

articles/security-center/faq-vms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Below are the latency times for Security Center scans of vulnerabilities, update
4848
Security Center typically scans for new data every hour, and refreshes the recommendations accordingly.
4949

5050
> [!NOTE]
51-
> Security Center uses the Microsoft Monitoring Agent to collect and store data. To learn more, see [Azure Security Center Platform Migration](security-center-platform-migration.md).
51+
> Security Center uses the Log Analytics agent to collect and store data. To learn more, see [Azure Security Center Platform Migration](security-center-platform-migration.md).
5252
5353

5454
## Why do I get the message "VM Agent is Missing?"

articles/security-center/quick-onboard-linux-computer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,14 +18,14 @@ ms.author: memildin
1818

1919
---
2020
# Quickstart: Onboard Linux computers to Azure Security Center
21-
After you onboard your Azure subscriptions, you can enable Security Center for Linux resources running outside of Azure, for example on-premises or in other clouds, by provisioning an Agent. The Agent is called the Microsoft Monitoring Agent (MMA), but it is also known as the OMS agent.
21+
After you onboard your Azure subscriptions, you can enable Security Center for Linux resources running outside of Azure, for example on-premises or in other clouds, by provisioning an Agent. The Agent is called the Log Analytics agent, but it is also known as the OMS agent.
2222

2323
This quickstart shows you how to install the Agent on a Linux computer.
2424

2525
## Prerequisites
2626
To get started with Security Center, you must have a subscription to Microsoft Azure. If you do not have a subscription, you can sign up for a [free account](https://azure.microsoft.com/pricing/free-trial/).
2727

28-
You must be on Security Centers Standard pricing tier before starting this quickstart. See [Onboard your Azure subscription to Security Center Standard](security-center-get-started.md) for upgrade instructions. You can try Security Centers Standard at no cost. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
28+
You must be on Security Center's Standard pricing tier before starting this quickstart. See [Onboard your Azure subscription to Security Center Standard](security-center-get-started.md) for upgrade instructions. You can try Security Center's Standard at no cost. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
2929

3030
## Add new Linux computer
3131

articles/security-center/quick-onboard-windows-computer.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Onboard Windows computers to Azure Security Center
3-
description: This quickstart shows you how to provision the Microsoft Monitoring Agent on a Windows computer.
3+
description: This quickstart shows you how to provision the Log Analytics agent on a Windows computer.
44
services: security-center
55
documentationcenter: na
66
author: memildin
@@ -18,9 +18,9 @@ ms.author: memildin
1818

1919
---
2020
# Quickstart: Onboard Windows computers to Azure Security Center
21-
After you onboard your Azure subscriptions, you can enable Security Center for resources running outside of Azure, for example on-premises or in other clouds, by provisioning the Microsoft Monitoring Agent.
21+
After you onboard your Azure subscriptions, you can enable Security Center for resources running outside of Azure, for example on-premises or in other clouds, by provisioning the Log Analytics agent.
2222

23-
This quickstart shows you how to install the Microsoft Monitoring Agent on a Windows computer.
23+
This quickstart shows you how to install the Log Analytics agent on a Windows computer.
2424

2525
## Prerequisites
2626
To get started with Security Center, you must have a subscription to Microsoft Azure. If you do not have a subscription, you can sign up for a [free account](https://azure.microsoft.com/pricing/free-trial/).
@@ -68,7 +68,7 @@ You must now install the downloaded file on the target computer.
6868
9. On the **Ready to Install** page, review your choices and then select **Install**.
6969
10. On the **Configuration completed successfully** page, select **Finish**
7070

71-
When complete, the **Microsoft Monitoring Agent** appears in **Control Panel**. You can review your configuration there and verify that the agent is connected.
71+
When complete, the **Log Analytics agent** appears in **Control Panel**. You can review your configuration there and verify that the agent is connected.
7272

7373
For further information on installing and configuring the agent, see [Connect Windows computers](../azure-monitor/platform/agent-windows.md#install-the-agent-using-setup-wizard).
7474

@@ -89,10 +89,10 @@ To remove the agent:
8989

9090
1. Open **Control Panel**.
9191
2. Open **Programs and Features**.
92-
3. In **Programs and Features**, select **Microsoft Monitoring Agent** and click **Uninstall**.
92+
3. In **Programs and Features**, select **Log Analytics agent** and click **Uninstall**.
9393

9494
## Next steps
95-
In this quickstart, you provisioned the Microsoft Monitoring Agent on a Windows computer. To learn more about how to use Security Center, continue to the tutorial for configuring a security policy and assessing the security of your resources.
95+
In this quickstart, you provisioned the Log Analytics agent on a Windows computer. To learn more about how to use Security Center, continue to the tutorial for configuring a security policy and assessing the security of your resources.
9696

9797
> [!div class="nextstepaction"]
9898
> [Tutorial: Define and assess security policies](tutorial-security-policy.md)

articles/security-center/security-center-data-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,8 +66,8 @@ Machine artifacts are stored centrally in the same region as the VM.
6666

6767
## Managing data collection from virtual machines
6868

69-
When you enable Security Center in Azure, data collection is turned on for each of your Azure subscriptions. You can also turn on data collection for your subscriptions in the Security Policy section of Azure Security Center. When Data collection is turned on, Azure Security Center provisions the Microsoft Monitoring Agent on all existing supported Azure virtual machines and any new ones that are created.
70-
The Microsoft Monitoring agent scans for various security-related configurations and events it into [Event Tracing for Windows](https://msdn.microsoft.com/library/windows/desktop/bb968803.aspx) (ETW) traces. In addition, the operating system will raise event log events during the course of running the machine. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, logged in user, and tenant ID. The Microsoft Monitoring Agent reads event log entries and ETW traces and copies them to your workspace(s) for analysis. The Microsoft Monitoring Agent also copies crash dump files to your workspace(s), enable process creation events, and enable command line auditing.
69+
When you enable Security Center in Azure, data collection is turned on for each of your Azure subscriptions. You can also turn on data collection for your subscriptions in the Security Policy section of Azure Security Center. When Data collection is turned on, Azure Security Center provisions the Log Analytics agent on all existing supported Azure virtual machines and any new ones that are created.
70+
The Log Analytics agent scans for various security-related configurations and events it into [Event Tracing for Windows](https://msdn.microsoft.com/library/windows/desktop/bb968803.aspx) (ETW) traces. In addition, the operating system will raise event log events during the course of running the machine. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, logged in user, and tenant ID. The Log Analytics agent reads event log entries and ETW traces and copies them to your workspace(s) for analysis. The Log Analytics agent also copies crash dump files to your workspace(s), enable process creation events, and enable command line auditing.
7171

7272
If you are using Azure Security Center Free, you can also disable data collection from virtual machines in the Security Policy. Data Collection is required for subscriptions on the Standard tier. VM disk snapshots and artifact collection will still be enabled even if data collection has been disabled.
7373

articles/security-center/security-center-enable-data-collection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -304,7 +304,7 @@ You can manually install the Log Analytics Agent, so Security Center can collect
304304

305305
- To identify Unmonitored VMs and computers issues:
306306

307-
A VM or computer is unmonitored by Security Center if the machine is not running the Microsoft Monitoring Agent extension. A machine may have a local agent already installed, for example the OMS direct agent or the System Center Operations Manager agent. Machines with these agents are identified as unmonitored because these agents are not fully supported in Security Center. To fully benefit from all of Security Center’s capabilities, the Microsoft Monitoring Agent extension is required.
307+
A VM or computer is unmonitored by Security Center if the machine is not running the Log Analytics agent extension. A machine may have a local agent already installed, for example the OMS direct agent or the System Center Operations Manager agent. Machines with these agents are identified as unmonitored because these agents are not fully supported in Security Center. To fully benefit from all of Security Center’s capabilities, the Log Analytics agent extension is required.
308308

309309
For more information about the reasons Security Center is unable to successfully monitor VMs and computers initialized for automatic provisioning, see [Monitoring agent health issues](security-center-troubleshooting-guide.md#mon-agent).
310310

articles/security-center/security-center-features-retirement-july2019.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This article provides detailed information for each retired feature and the step
3939

4040
## Events dashboard<a name="menu_events"></a>
4141

42-
Security Center uses Microsoft Monitoring Agent to collect various security-related configurations and events from your machines. It stores these events in your workspaces. The [events dashboard](https://docs.microsoft.com/azure/security-center/security-center-events-dashboard) lets you view this data and gives you an entry point to Log Analytics.
42+
Security Center uses Log Analytics agent to collect various security-related configurations and events from your machines. It stores these events in your workspaces. The [events dashboard](https://docs.microsoft.com/azure/security-center/security-center-events-dashboard) lets you view this data and gives you an entry point to Log Analytics.
4343

4444
We retired the events dashboard that appeared when you selected a workspace:
4545

0 commit comments

Comments
 (0)