You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-pricing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,4 +66,4 @@ In this article, you were introduced to pricing for Security Center. For related
66
66
67
67
-[How to optimize your Azure workload costs](https://azure.microsoft.com/blog/how-to-optimize-your-azure-workload-costs/)
68
68
-[Pricing details in your currency of choice, and according to your region](https://azure.microsoft.com/pricing/details/security-center/)
69
-
- You may want to manage your costs and limit the amount of data collected for a solution by limiting it to a particular set of agents. [Solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md) allows you to apply a scope to the solution and target a subset of computers in the workspace. If you are using solution targeting, Security Center lists the workspace as not having a solution.
69
+
- You may want to manage your costs and limit the amount of data collected for a solution by limiting it to a particular set of agents. [Solution targeting](../azure-monitor/insights/solution-targeting.md) allows you to apply a scope to the solution and target a subset of computers in the workspace. If you are using solution targeting, Security Center lists the workspace as not having a solution.
Copy file name to clipboardExpand all lines: articles/security-center/security-center-readiness-roadmap.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,9 +55,9 @@ Security Center automatically collects, analyzes, and integrates log data from y
55
55
Use the following resources to assist you to manage security alerts and protect your resources.
56
56
57
57
Articles
58
-
-[Security health monitoring in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-monitoring)
59
-
-[Protecting your network in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-network-recommendations)
60
-
-[Protecting Azure SQL service and data in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-sql-service-recommendations)
58
+
-[Security health monitoring in Azure Security Center](./security-center-monitoring.md)
59
+
-[Protecting your network in Azure Security Center](./security-center-network-recommendations.md)
60
+
-[Protecting Azure SQL service and data in Azure Security Center](./security-center-remediate-recommendations.md)
61
61
62
62
63
63
Video
@@ -73,7 +73,7 @@ Videos
73
73
*[Respond quickly to threats with next-generation security operation, and investigation](https://youtu.be/e8iFCz5RM4g)
74
74
75
75
Articles
76
-
*[Using Azure Security Center for an incident response](https://docs.microsoft.com/azure/security-center/security-center-incident-response)
76
+
*[Using Azure Security Center for an incident response](./tutorial-security-incident.md)
77
77
*[Automate response with Workflow Automation](workflow-automation.md)
78
78
79
79
## Advanced cloud defense
@@ -87,8 +87,8 @@ Videos
87
87
*[Azure Security Center - Adaptive Application Controls](https://youtu.be/wWWekI1Y9ck)
88
88
89
89
Articles
90
-
*[Manage virtual machine access using just-in-time](https://docs.microsoft.com/azure/security-center/security-center-just-in-time)
91
-
*[Adaptive Application Controls in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-adaptive-application)
90
+
*[Manage virtual machine access using just-in-time](./security-center-just-in-time.md)
91
+
*[Adaptive Application Controls in Azure Security Center](./security-center-adaptive-application.md)
92
92
93
93
## Hands-on activities
94
94
@@ -97,17 +97,17 @@ Articles
97
97
*[Azure Security Center Playbook: Security Alerts](https://gallery.technet.microsoft.com/Azure-Security-Center-f621a046)
98
98
99
99
## Additional resources
100
-
*[Security Center Documentation Page](https://docs.microsoft.com/azure/security-center/)
101
-
*[Security Center REST API Documentation Page](https://msdn.microsoft.com/library/mt704034.aspx)
102
-
*[Azure Security Center frequently asked questions (FAQ)](https://docs.microsoft.com/azure/security-center/security-center-faq)
100
+
*[Security Center Documentation Page](./index.yml)
101
+
*[Security Center REST API Documentation Page](/previous-versions/azure/reference/mt704034(v=azure.100))
102
+
*[Azure Security Center frequently asked questions (FAQ)](./faq-general.md)
103
103
*[Security Center Pricing Page](https://azure.microsoft.com/pricing/details/security-center/)
104
-
*[Identity security best practices](https://docs.microsoft.com/azure/security/fundamentals/identity-management-best-practices)
105
-
*[Network security best practices](https://docs.microsoft.com/azure/security/fundamentals/network-best-practices)
*[Log analytics customers can now use Azure Security Center to protect their hybrid cloud workloads](https://blogs.technet.microsoft.com/msoms/2017/09/25/oms-customers-can-now-use-azure-security-center-to-protect-their-hybrid-cloud-workloads/)
108
+
*[Log analytics customers can now use Azure Security Center to protect their hybrid cloud workloads](/archive/blogs/msoms/oms-customers-can-now-use-azure-security-center-to-protect-their-hybrid-cloud-workloads)
109
109
110
110
## Community Resources
111
111
112
112
*[Security Center UserVoice](https://feedback.azure.com/forums/347535-azure-security-center)
113
-
*[Q&A page for Security Center](https://docs.microsoft.com/answers/topics/azure-security-center.html)
113
+
*[Q&A page for Security Center](/answers/topics/azure-security-center.html)
Copy file name to clipboardExpand all lines: articles/security-center/security-center-troubleshooting-guide.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.author: memildin
15
15
16
16
This guide is for information technology (IT) professionals, information security analysts, and cloud administrators whose organizations are using Azure Security Center and need to troubleshoot Security Center related issues.
17
17
18
-
Security Center uses the Log Analytics agent to collect and store data. See [Azure Security Center Platform Migration](security-center-platform-migration.md) to learn more. The information in this article represents Security Center functionality after transition to the Log Analytics agent.
18
+
Security Center uses the Log Analytics agent to collect and store data. See [Azure Security Center Platform Migration](./security-center-enable-data-collection.md) to learn more. The information in this article represents Security Center functionality after transition to the Log Analytics agent.
19
19
20
20
## Troubleshooting guide
21
21
@@ -87,14 +87,14 @@ There are two installation scenarios that can produce different results when ins
87
87
| Installation failed - local agent already installed | Log Analytics agent install failed. Security Center identified a local agent (Log Analytics or System Center Operations Manager) already installed on the VM. To avoid multi-homing configuration, where the VM is reporting to two separate workspaces, the Log Analytics agent installation stopped. | There are two ways to resolve: [manually install the extension](../azure-monitor/learn/quick-collect-azurevm.md#enable-the-log-analytics-vm-extension) and connect it to your desired workspace. Or, set your desired workspace as your default workspace and enable automatic provisioning of the agent. See [enable automatic provisioning](security-center-enable-data-collection.md). |
88
88
| Agent cannot connect to workspace | Log Analytics agent installed but failed due to network connectivity. Check that there is internet access or that a valid HTTP proxy has been configured for the agent. | See monitoring agent network requirements. |
89
89
| Agent connected to missing or unknown workspace | Security Center identified that the Log Analytics agent installed on the VM is connected to a workspace which it doesn't have access to. | This can happen in two cases. The workspace was deleted and no longer exists. Reinstall the agent with the correct workspace or uninstall the agent and allow Security Center to complete its automatic provisioning installation. The second case is where the workspace is part of a subscription that Security Center does not have permissions to. Security Center requires subscriptions to allow the Microsoft Security Resource Provider to access them. To enable, register the subscription to the Microsoft Security Resource Provider. This can be done by API, PowerShell, portal or by simply filtering on the subscription in the Security Center **Overview** dashboard. See [Resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#azure-portal) for more information. |
90
-
| Agent not responsive or missing ID | Security Center is unable to retrieve security data scanned from the VM, even though the agent is installed. | The agent is not reporting any data, including heartbeat. The agent might be damaged or something is blocking traffic. Or, the agent is reporting data but is missing an Azure resource ID so it's impossible to match the data to the Azure VM. To troubleshoot Linux, see [Troubleshooting Guide for Log Analytics Agent for Linux](https://github.com/Microsoft/OMS-Agent-for-Linux/blob/master/docs/Troubleshooting.md#im-not-seeing-any-linux-data-in-the-oms-portal). To troubleshoot Windows, see [Troubleshooting Windows Virtual Machines](https://docs.microsoft.com/azure/virtual-machines/extensions/oms-windows#troubleshoot-and-support). |
90
+
| Agent not responsive or missing ID | Security Center is unable to retrieve security data scanned from the VM, even though the agent is installed. | The agent is not reporting any data, including heartbeat. The agent might be damaged or something is blocking traffic. Or, the agent is reporting data but is missing an Azure resource ID so it's impossible to match the data to the Azure VM. To troubleshoot Linux, see [Troubleshooting Guide for Log Analytics Agent for Linux](https://github.com/Microsoft/OMS-Agent-for-Linux/blob/master/docs/Troubleshooting.md#im-not-seeing-any-linux-data-in-the-oms-portal). To troubleshoot Windows, see [Troubleshooting Windows Virtual Machines](../virtual-machines/extensions/oms-windows.md#troubleshoot-and-support). |
91
91
| Agent not installed | Data collection is disabled. | Turn on data collection in the security policy or manually install the Log Analytics agent. |
For agents to connect to and register with Security Center, they must have access to network resources, including the port numbers and domain URLs.
96
96
97
-
* For proxy servers, you need to ensure that the appropriate proxy server resources are configured in agent settings. Read this article for more information on [how to change the proxy settings](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents).
97
+
* For proxy servers, you need to ensure that the appropriate proxy server resources are configured in agent settings. Read this article for more information on [how to change the proxy settings](../azure-monitor/platform/agent-windows.md).
98
98
* For firewalls that restrict access to the Internet, you need to configure your firewall to permit access to Log Analytics. No action is needed in agent settings.
99
99
100
100
The following table shows resources needed for communication.
@@ -120,15 +120,15 @@ The guest agent is the parent process of everything the [Microsoft Antimalware](
120
120
* Certain Access Control List (ACL) may prevent disk access.
121
121
* Lack of disk space can block the guest agent from functioning properly.
122
122
123
-
By default the Microsoft Antimalware User Interface is disabled, read [Enabling Microsoft Antimalware User Interface on Azure Resource Manager VMs Post Deployment](https://blogs.msdn.microsoft.com/azuresecurity/2016/03/09/enabling-microsoft-antimalware-user-interface-post-deployment/) for more information on how to enable it if you need.
123
+
By default the Microsoft Antimalware User Interface is disabled, read [Enabling Microsoft Antimalware User Interface on Azure Resource Manager VMs Post Deployment](/archive/blogs/azuresecurity/enabling-microsoft-antimalware-user-interface-post-deployment) for more information on how to enable it if you need.
124
124
125
125
## Troubleshooting problems loading the dashboard
126
126
127
127
If you experience issues loading the Security Center dashboard, ensure that the user that registers the subscription to Security Center (i.e. the first user one who opened Security Center with the subscription) and the user who would like to turn on data collection should be *Owner* or *Contributor* on the subscription. From that moment on also users with *Reader* on the subscription can see the dashboard/alerts/recommendation/policy.
128
128
129
129
## Contacting Microsoft Support
130
130
131
-
Some issues can be identified using the guidelines provided in this article, others you can also find documented at the Security Center public [Microsoft Q&A page](https://docs.microsoft.com/answers/topics/azure-security-center.html). However if you need further troubleshooting, you can open a new support request using **Azure portal** as shown below:
131
+
Some issues can be identified using the guidelines provided in this article, others you can also find documented at the Security Center public [Microsoft Q&A page](/answers/topics/azure-security-center.html). However if you need further troubleshooting, you can open a new support request using **Azure portal** as shown below:
@@ -139,12 +139,12 @@ In this document, you learned how to configure security policies in Azure Securi
139
139
*[Azure Security Center Planning and Operations Guide](security-center-planning-and-operations-guide.md) — Learn how to plan and understand the design considerations to adopt Azure Security Center.
140
140
*[Security health monitoring in Azure Security Center](security-center-monitoring.md) — Learn how to monitor the health of your Azure resources
141
141
*[Managing and responding to security alerts in Azure Security Center](security-center-managing-and-responding-alerts.md) — Learn how to manage and respond to security alerts
142
-
*[Understanding security alerts in Azure Security Center](security-center-alerts-type.md)
142
+
*[Understanding security alerts in Azure Security Center](./security-center-alerts-overview.md)
143
143
*[Tutorial: Respond to security incidents](tutorial-security-incident.md)
144
144
*[Alerts Validation in Azure Security Center](security-center-alert-validation.md)
145
145
*[Email Notifications in Azure Security Center](security-center-provide-security-contact-details.md)
146
146
*[Handling Security Incidents in Azure Security Center](security-center-incident.md)
147
-
*[Azure Security Center detection capabilities](security-center-detection-capabilities.md)
148
-
*[Monitoring partner solutions with Azure Security Center](security-center-partner-solutions.md) — Learn how to monitor the health status of your partner solutions.
147
+
*[Azure Security Center detection capabilities](./security-center-alerts-overview.md)
148
+
*[Monitoring partner solutions with Azure Security Center](./security-center-partner-integration.md) — Learn how to monitor the health status of your partner solutions.
149
149
*[Azure Security Center FAQ](faq-general.md) — Find frequently asked questions about using the service
150
-
*[Azure Security Blog](https://docs.microsoft.com/archive/blogs/azuresecurity/) — Find blog posts about Azure security and compliance
150
+
*[Azure Security Blog](/archive/blogs/azuresecurity/) — Find blog posts about Azure security and compliance
0 commit comments