You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-enable-data-collection.md
+14-20Lines changed: 14 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,36 +2,30 @@
2
2
title: Data Collection in Azure Security Center | Microsoft Docs
3
3
description: " Learn how to enable data collection in Azure Security Center. "
4
4
services: security-center
5
-
documentationcenter: na
6
-
author: monhaber
7
-
manager: barbkess
8
-
editor: ''
5
+
author: memildin
6
+
manager: rkarlin
9
7
10
-
ms.assetid: 411d7bae-c9d4-4e83-be63-9f2f2312b075
11
8
ms.service: security-center
12
-
ms.devlang: na
13
9
ms.topic: conceptual
14
-
ms.tgt_pltfrm: na
15
-
ms.workload: na
16
-
ms.date: 06/10/2019
17
-
ms.author: v-mohabe
10
+
ms.date: 09/10/2019
11
+
ms.author: memildin
18
12
19
13
---
20
14
# Data collection in Azure Security Center
21
15
Security Center collects data from your Azure virtual machines (VMs), virtual machine scale sets, IaaS containers, and non-Azure (including on-premises) computers to monitor for security vulnerabilities and threats. Data is collected using the Log Analytics Agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, and logged in user. The Log Analytics Agent also copies crash dump files to your workspace.
22
16
23
17
Data collection is required to provide visibility into missing updates, misconfigured OS security settings, endpoint protection enablement, and health and threat detections.
24
18
25
-
This article provides guidance on how to install a Log Analytics Agent and set a Log Analytics workspace in which to store the collected data. Both operations are required to enable data collection.
19
+
This article describes how to install a Log Analytics Agent and set a Log Analytics workspace in which to store the collected data. Both operations are required to enable data collection.
26
20
27
21
> [!NOTE]
28
22
> - Data collection is only needed for Compute resources (VMs, virtual machine scale sets, IaaS containers, and non-Azure computers). You can benefit from Azure Security Center even if you don’t provision agents; however, you will have limited security and the capabilities listed above are not supported.
29
23
> - For the list of supported platforms, see [Supported platforms in Azure Security Center](security-center-os-coverage.md).
30
-
> - Storing data in Log Analytics, whether you use a new or existing workspace, might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
24
+
> - Storing data in Log Analytics, whether you use a new or existing workspace, might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
31
25
32
26
## Enable automatic provisioning of the Log Analytics Agent <aname="auto-provision-mma"></a>
33
27
34
-
To collect the data from the machines, you should have the Log Analytics Agent installed. Installation of the agent can be done automatically (recommended) or you can install the agent manually.
28
+
To collect the data from the machines, you should have the Log Analytics Agent installed. Installation of the agent can be done automatically (recommended) or you can install the agent manually.
35
29
36
30
>[!NOTE]
37
31
> Automatic provisioning is off by default. To set Security Center to install automatic provisioning by default, set it to **On**.
@@ -61,7 +55,7 @@ To enable automatic provisioning of the Log Analytics Agent:
61
55
>
62
56
63
57
## Workspace configuration
64
-
Data collected by Security Center is stored in Log Analytics workspace(s). You can select to have data collected from Azure VMs stored in workspaces created by Security Center or in an existing workspace you created.
58
+
Data collected by Security Center is stored in Log Analytics workspace(s). You can select to have data collected from Azure VMs stored in workspaces created by Security Center or in an existing workspace you created.
65
59
66
60
Workspace configuration is set per subscription, and many subscriptions may use the same workspace.
67
61
@@ -84,19 +78,19 @@ To select a workspace created by Security Center:
84
78
85
79
> [!NOTE]
86
80
> The Log Analytics pricing tier of workspaces created by Security Center does not affect Security Center billing. Security Center billing is always based on your Security Center security policy and the solutions installed on a workspace. For the Free tier, Security Center enables the *SecurityCenterFree* solution on the default workspace. For the Standard tier, Security Center enables the *Security* solution on the default workspace.
87
-
> Storing data in Log Analytics might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
81
+
> Storing data in Log Analytics might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
88
82
89
83
For more information about existing log analytics accounts, see [Existing log analytics customers](security-center-faq.md#existingloganalyticscust).
90
84
91
85
### Using an existing workspace
92
86
93
-
If you already have an existing Log Analytics workspace you might want to use the same workspace.
87
+
If you already have an existing Log Analytics workspace, you might want to use the same workspace.
94
88
95
89
To use your existing Log Analytics workspace, you must have read and write permissions on the workspace.
96
90
97
91
> [!NOTE]
98
92
> Solutions enabled on the existing workspace will be applied to Azure VMs that are connected to it. For paid solutions, this could result in additional charges. For data privacy considerations, make sure your selected workspace is in the right geographic region.
99
-
> Storing data in log analytics might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
93
+
> Storing data in log analytics might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
100
94
101
95
To select an existing Log Analytics workspace:
102
96
@@ -145,7 +139,7 @@ When you select a workspace in which to store your data, all the workspaces acro
145
139
## Data collection tier
146
140
Selecting a data collection tier in Azure Security Center will only affect the storage of security events in your Log Analytics workspace. The Log Analytics agent will still collect and analyze the security events required for Azure Security Center’s threat detections, regardless of which tier of security events you choose to store in your Log Analytics workspace (if any). Choosing to store security events in your workspace will enable investigation, search, and auditing of those events in your workspace.
147
141
> [!NOTE]
148
-
> Storing data in log analytics might incur additional charges for data storage. For more details, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
142
+
> Storing data in log analytics might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
149
143
>
150
144
> You can choose the right filtering policy for your subscriptions and workspaces from four sets of events to be stored in your workspace:
151
145
@@ -194,7 +188,7 @@ To choose your filtering policy:
194
188
195
189
![Choose filtering policy][5]
196
190
197
-
### Automatic provisioning in cases of a preexisting agent installation <aname="preexisting"></a>
191
+
### Automatic provisioning in cases of a pre-existing agent installation <aname="preexisting"></a>
198
192
199
193
The following use cases specify how automatic provision works in cases when there is already an agent or extension installed.
200
194
@@ -215,7 +209,7 @@ Note - If Operations Manager agent version 2012 is installed, **do not** turn au
215
209
- A pre-existing VM extension is present<br>
216
210
- When the Monitoring Agent is installed as an extension, the extension configuration allows reporting to only a single workspace. Security Center does not override existing connections to user workspaces. Security Center will store security data from the VM in the workspace already connected, provided that the "security" or "securityFree" solution has been installed on it. Security Center may upgrade the extension version to the latest version in this process.
217
211
- To see to which workspace the existing extension is sending data to, run the test to [Validate connectivity with Azure Security Center](https://blogs.technet.microsoft.com/yuridiogenes/2017/10/13/validating-connectivity-with-azure-security-center/). Alternatively, you can open Log Analytics workspaces, select a workspace, select the VM, and look at the Log Analytics agent connection.
218
-
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Azure Security Center](security-center-os-coverage.md) to make sure your operating system is supported, and see [Existing log analytics customers](security-center-faq.md#existingloganalyticscust) for more information.
212
+
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Azure Security Center](security-center-os-coverage.md) to make sure your operating system is supported. For more information, see [Existing log analytics customers](security-center-faq.md#existingloganalyticscust).
219
213
220
214
### Turn off automatic provisioning <aname="offprovisioning"></a>
221
215
You can turn off automatic provisioning from resources at any time by turning off this setting in the security policy.
0 commit comments