Skip to content

Commit 519e9f9

Browse files
committed
Minor fixes and corrections
1 parent ed5d62e commit 519e9f9

8 files changed

+85
-109
lines changed

articles/security-center/security-center-enable-data-collection.md

Lines changed: 14 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -2,36 +2,30 @@
22
title: Data Collection in Azure Security Center | Microsoft Docs
33
description: " Learn how to enable data collection in Azure Security Center. "
44
services: security-center
5-
documentationcenter: na
6-
author: monhaber
7-
manager: barbkess
8-
editor: ''
5+
author: memildin
6+
manager: rkarlin
97

10-
ms.assetid: 411d7bae-c9d4-4e83-be63-9f2f2312b075
118
ms.service: security-center
12-
ms.devlang: na
139
ms.topic: conceptual
14-
ms.tgt_pltfrm: na
15-
ms.workload: na
16-
ms.date: 06/10/2019
17-
ms.author: v-mohabe
10+
ms.date: 09/10/2019
11+
ms.author: memildin
1812

1913
---
2014
# Data collection in Azure Security Center
2115
Security Center collects data from your Azure virtual machines (VMs), virtual machine scale sets, IaaS containers, and non-Azure (including on-premises) computers to monitor for security vulnerabilities and threats. Data is collected using the Log Analytics Agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, and logged in user. The Log Analytics Agent also copies crash dump files to your workspace.
2216

2317
Data collection is required to provide visibility into missing updates, misconfigured OS security settings, endpoint protection enablement, and health and threat detections.
2418

25-
This article provides guidance on how to install a Log Analytics Agent and set a Log Analytics workspace in which to store the collected data. Both operations are required to enable data collection.
19+
This article describes how to install a Log Analytics Agent and set a Log Analytics workspace in which to store the collected data. Both operations are required to enable data collection.
2620

2721
> [!NOTE]
2822
> - Data collection is only needed for Compute resources (VMs, virtual machine scale sets, IaaS containers, and non-Azure computers). You can benefit from Azure Security Center even if you don’t provision agents; however, you will have limited security and the capabilities listed above are not supported.
2923
> - For the list of supported platforms, see [Supported platforms in Azure Security Center](security-center-os-coverage.md).
30-
> - Storing data in Log Analytics, whether you use a new or existing workspace, might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
24+
> - Storing data in Log Analytics, whether you use a new or existing workspace, might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
3125
3226
## Enable automatic provisioning of the Log Analytics Agent <a name="auto-provision-mma"></a>
3327

34-
To collect the data from the machines, you should have the Log Analytics Agent installed. Installation of the agent can be done automatically (recommended) or you can install the agent manually.
28+
To collect the data from the machines, you should have the Log Analytics Agent installed. Installation of the agent can be done automatically (recommended) or you can install the agent manually.
3529

3630
>[!NOTE]
3731
> Automatic provisioning is off by default. To set Security Center to install automatic provisioning by default, set it to **On**.
@@ -61,7 +55,7 @@ To enable automatic provisioning of the Log Analytics Agent:
6155
>
6256
6357
## Workspace configuration
64-
Data collected by Security Center is stored in Log Analytics workspace(s). You can select to have data collected from Azure VMs stored in workspaces created by Security Center or in an existing workspace you created.
58+
Data collected by Security Center is stored in Log Analytics workspace(s). You can select to have data collected from Azure VMs stored in workspaces created by Security Center or in an existing workspace you created.
6559

6660
Workspace configuration is set per subscription, and many subscriptions may use the same workspace.
6761

@@ -84,19 +78,19 @@ To select a workspace created by Security Center:
8478

8579
> [!NOTE]
8680
> The Log Analytics pricing tier of workspaces created by Security Center does not affect Security Center billing. Security Center billing is always based on your Security Center security policy and the solutions installed on a workspace. For the Free tier, Security Center enables the *SecurityCenterFree* solution on the default workspace. For the Standard tier, Security Center enables the *Security* solution on the default workspace.
87-
> Storing data in Log Analytics might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
81+
> Storing data in Log Analytics might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
8882
8983
For more information about existing log analytics accounts, see [Existing log analytics customers](security-center-faq.md#existingloganalyticscust).
9084

9185
### Using an existing workspace
9286

93-
If you already have an existing Log Analytics workspace you might want to use the same workspace.
87+
If you already have an existing Log Analytics workspace, you might want to use the same workspace.
9488

9589
To use your existing Log Analytics workspace, you must have read and write permissions on the workspace.
9690

9791
> [!NOTE]
9892
> Solutions enabled on the existing workspace will be applied to Azure VMs that are connected to it. For paid solutions, this could result in additional charges. For data privacy considerations, make sure your selected workspace is in the right geographic region.
99-
> Storing data in log analytics might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
93+
> Storing data in log analytics might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
10094
10195
To select an existing Log Analytics workspace:
10296

@@ -145,7 +139,7 @@ When you select a workspace in which to store your data, all the workspaces acro
145139
## Data collection tier
146140
Selecting a data collection tier in Azure Security Center will only affect the storage of security events in your Log Analytics workspace. The Log Analytics agent will still collect and analyze the security events required for Azure Security Center’s threat detections, regardless of which tier of security events you choose to store in your Log Analytics workspace (if any). Choosing to store security events in your workspace will enable investigation, search, and auditing of those events in your workspace.
147141
> [!NOTE]
148-
> Storing data in log analytics might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
142+
> Storing data in log analytics might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
149143
>
150144
> You can choose the right filtering policy for your subscriptions and workspaces from four sets of events to be stored in your workspace:
151145
@@ -194,7 +188,7 @@ To choose your filtering policy:
194188

195189
![Choose filtering policy][5]
196190

197-
### Automatic provisioning in cases of a preexisting agent installation <a name="preexisting"></a>
191+
### Automatic provisioning in cases of a pre-existing agent installation <a name="preexisting"></a>
198192

199193
The following use cases specify how automatic provision works in cases when there is already an agent or extension installed.
200194

@@ -215,7 +209,7 @@ Note - If Operations Manager agent version 2012 is installed, **do not** turn au
215209
- A pre-existing VM extension is present<br>
216210
- When the Monitoring Agent is installed as an extension, the extension configuration allows reporting to only a single workspace. Security Center does not override existing connections to user workspaces. Security Center will store security data from the VM in the workspace already connected, provided that the "security" or "securityFree" solution has been installed on it. Security Center may upgrade the extension version to the latest version in this process.
217211
- To see to which workspace the existing extension is sending data to, run the test to [Validate connectivity with Azure Security Center](https://blogs.technet.microsoft.com/yuridiogenes/2017/10/13/validating-connectivity-with-azure-security-center/). Alternatively, you can open Log Analytics workspaces, select a workspace, select the VM, and look at the Log Analytics agent connection.
218-
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Azure Security Center](security-center-os-coverage.md) to make sure your operating system is supported, and see [Existing log analytics customers](security-center-faq.md#existingloganalyticscust) for more information.
212+
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Azure Security Center](security-center-os-coverage.md) to make sure your operating system is supported. For more information, see [Existing log analytics customers](security-center-faq.md#existingloganalyticscust).
219213

220214
### Turn off automatic provisioning <a name="offprovisioning"></a>
221215
You can turn off automatic provisioning from resources at any time by turning off this setting in the security policy.

0 commit comments

Comments
 (0)