Skip to content

Commit 578ce07

Browse files
authored
Merge pull request #214902 from suzizuber/szuber/update-azure-security-integration-10182022
Update azure-security-integration.md
2 parents 9b02a3b + f6c13c0 commit 578ce07

File tree

1 file changed

+31
-49
lines changed

1 file changed

+31
-49
lines changed

articles/azure-vmware/azure-security-integration.md

Lines changed: 31 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -3,25 +3,26 @@ title: Integrate Microsoft Defender for Cloud with Azure VMware Solution
33
description: Learn how to protect your Azure VMware Solution VMs with Azure's native security tools from the workload protection dashboard.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 06/14/2021
6+
ms.date: 10/18/2022
77
---
88

99
# Integrate Microsoft Defender for Cloud with Azure VMware Solution
1010

11-
Microsoft Defender for Cloud provides advanced threat protection across your Azure VMware Solution and on-premises virtual machines (VMs). It assesses the vulnerability of Azure VMware Solution VMs and raises alerts as needed. These security alerts can be forwarded to Azure Monitor for resolution. You can define security policies in Microsoft Defender for Cloud. For more information, see [Working with security policies](../security-center/tutorial-security-policy.md).
11+
Microsoft Defender for Cloud provides advanced threat protection across your Azure VMware Solution and on-premises virtual machines (VMs). It assesses the vulnerability of Azure VMware Solution VMs and raises alerts as needed. These security alerts can be forwarded to Azure Monitor for resolution. You can define security policies in Microsoft Defender for Cloud. For more information, see [Working with security policies](../security-center/tutorial-security-policy.md).
1212

1313
Microsoft Defender for Cloud offers many features, including:
14+
1415
- File integrity monitoring
1516
- Fileless attack detection
16-
- Operating system patch assessment
17+
- Operating system patch assessment
1718
- Security misconfigurations assessment
1819
- Endpoint protection assessment
1920

2021
The diagram shows the integrated monitoring architecture of integrated security for Azure VMware Solution VMs.
21-
22+
2223
:::image type="content" source="media/azure-security-integration/azure-integrated-security-architecture.png" alt-text="Diagram showing the architecture of Azure Integrated Security." border="false":::
2324

24-
**Log Analytics agent** collects log data from Azure, Azure VMware Solution, and on-premises VMs. The log data is sent to Azure Monitor Logs and stored in a **Log Analytics Workspace**. Each workspace has its own data repository and configuration to store data. Once the logs are collected, **Microsoft Defender for Cloud** assesses the vulnerability status of Azure VMware Solution VMs and raises an alert for any critical vulnerability. Once assessed, Microsoft Defender for Cloud forwards the vulnerability status to Microsoft Sentinel to create an incident and map with other threats. Microsoft Defender for Cloud is connected to Microsoft Sentinel using Microsoft Defender for Cloud Connector.
25+
**Log Analytics agent** collects log data from Azure, Azure VMware Solution, and on-premises VMs. The log data is sent to Azure Monitor Logs and stored in a **Log Analytics Workspace**. Each workspace has its own data repository and configuration to store data. Once the logs are collected, **Microsoft Defender for Cloud** assesses the vulnerability status of Azure VMware Solution VMs and raises an alert for any critical vulnerability. Once assessed, Microsoft Defender for Cloud forwards the vulnerability status to Microsoft Sentinel to create an incident and map with other threats. Microsoft Defender for Cloud is connected to Microsoft Sentinel using Microsoft Defender for Cloud Connector.
2526

2627
## Prerequisites
2728

@@ -31,40 +32,35 @@ The diagram shows the integrated monitoring architecture of integrated security
3132

3233
- [Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) to collect data from various sources.
3334

34-
- [Enable Microsoft Defender for Cloud in your subscription](../security-center/security-center-get-started.md).
35+
- [Enable Microsoft Defender for Cloud in your subscription](../security-center/security-center-get-started.md).
3536

3637
>[!NOTE]
3738
>Microsoft Defender for Cloud is a pre-configured tool that doesn't require deployment, but you'll need to enable it.
3839
39-
- [Enable Microsoft Defender for Cloud](../security-center/enable-azure-defender.md).
40-
40+
- [Enable Microsoft Defender for Cloud](../security-center/enable-azure-defender.md).
4141

4242
## Add Azure VMware Solution VMs to Defender for Cloud
4343

4444
1. In the Azure portal, search on **Azure Arc** and select it.
4545

4646
2. Under Resources, select **Servers** and then **+Add**.
4747

48-
:::image type="content" source="media/azure-security-integration/add-server-to-azure-arc.png" alt-text="Screenshot showing Azure Arc Servers page for adding an Azure VMware Solution VM to Azure.":::
48+
:::image type="content" source="media/azure-security-integration/add-server-to-azure-arc.png" alt-text="Screenshot showing Azure Arc Servers page for adding an Azure VMware Solution VM to Azure."lightbox="media/azure-security-integration/add-server-to-azure-arc.png":::
4949

5050
3. Select **Generate script**.
51-
52-
:::image type="content" source="media/azure-security-integration/add-server-using-script.png" alt-text="Screenshot of Azure Arc page showing option for adding a server using interactive script.":::
53-
51+
52+
:::image type="content" source="media/azure-security-integration/add-server-using-script.png" alt-text="Screenshot of Azure Arc page showing option for adding a server using interactive script."lightbox="media/azure-security-integration/add-server-using-script.png":::
53+
5454
4. On the **Prerequisites** tab, select **Next**.
5555

56-
5. On the **Resource details** tab, fill in the following details and then select **Next: Tags**.
56+
5. On the **Resource details** tab, fill in the following details and then select **Next. Tags**:
5757

5858
- Subscription
59-
6059
- Resource group
61-
62-
- Region
63-
60+
- Region
6461
- Operating system
65-
6662
- Proxy Server details
67-
63+
6864
6. On the **Tags** tab, select **Next**.
6965

7066
7. On the **Download and run script** tab, select **Download**.
@@ -73,23 +69,23 @@ The diagram shows the integrated monitoring architecture of integrated security
7369

7470
## View recommendations and passed assessments
7571

76-
Recommendations and assessments provide you with the security health details of your resource.
72+
Recommendations and assessments provide you with the security health details of your resource.
7773

7874
1. In Microsoft Defender for Cloud, select **Inventory** from the left pane.
7975

8076
2. For Resource type, select **Servers - Azure Arc**.
81-
82-
:::image type="content" source="media/azure-security-integration/select-resource-in-security-center.png" alt-text="Screenshot showing the Microsoft Defender for Cloud Inventory page with the Servers - Azure Arc selected under Resource type.":::
77+
78+
:::image type="content" source="media/azure-security-integration/select-resource-in-security-center.png" alt-text="Screenshot showing the Microsoft Defender for Cloud Inventory page with the Servers - Azure Arc selected under Resource type."lightbox="media/azure-security-integration/select-resource-in-security-center.png":::
8379

8480
3. Select the name of your resource. A page opens showing the security health details of your resource.
8581

8682
4. Under **Recommendation list**, select the **Recommendations**, **Passed assessments**, and **Unavailable assessments** tabs to view these details.
8783

88-
:::image type="content" source="media/azure-security-integration/view-recommendations-assessments.png" alt-text="Screenshot showing the Microsoft Defender for Cloud security recommendations and assessments.":::
84+
:::image type="content" source="media/azure-security-integration/view-recommendations-assessments.png" alt-text="Screenshot showing the Microsoft Defender for Cloud security recommendations and assessments."lightbox="media/azure-security-integration/view-recommendations-assessments.png":::
8985

9086
## Deploy a Microsoft Sentinel workspace
9187

92-
Microsoft Sentinel provides security analytics, alert detection, and automated threat response across an environment. It's a cloud-native, security information event management (SIEM) solution that's built on top of a Log Analytics Workspace.
88+
Microsoft Sentinel provides security analytics, alert detection, and automated threat response across an environment. It's a cloud-native, security information event management (SIEM) solution that's built on top of a Log Analytics workspace.
9389

9490
Since Microsoft Sentinel is built on top of a Log Analytics workspace, you'll only need to select the workspace you want to use.
9591

@@ -105,32 +101,29 @@ Since Microsoft Sentinel is built on top of a Log Analytics workspace, you'll on
105101

106102
2. Under Configuration, select **Data connectors**.
107103

108-
3. Under the Connector Name column, select **Security Events** from the list, and then select **Open connector page**.
109-
110-
4. On the connector page, select the events you wish to stream and then select **Apply Changes**.
111-
112-
:::image type="content" source="media/azure-security-integration/select-events-you-want-to-stream.png" alt-text="Screenshot of Security Events page in Microsoft Sentinel where you can select which events to stream.":::
113-
104+
3. Under the Connector Name column, select **Security Events** from the list, then select **Open connector page**.
114105

106+
4. On the connector page, select the events you wish to stream, then select **Apply Changes**.
115107

108+
:::image type="content" source="media/azure-security-integration/select-events-you-want-to-stream.png" alt-text="Screenshot of Security Events page in Microsoft Sentinel where you can select which events to stream."lightbox="media/azure-security-integration/select-events-you-want-to-stream.png":::
116109

117110
## Connect Microsoft Sentinel with Microsoft Defender for Cloud
118111

119112
1. On the Microsoft Sentinel workspace page, select the configured workspace.
120113

121114
2. Under Configuration, select **Data connectors**.
122115

123-
3. Select **Microsoft Defender for Cloud** from the list and then select **Open connector page**.
116+
3. Select **Microsoft Defender for Cloud** from the list, then select **Open connector page**.
124117

125-
:::image type="content" source="media/azure-security-integration/connect-security-center-with-azure-sentinel.png" alt-text="Screenshot of Data connectors page in Microsoft Sentinel showing selection to connect Microsoft Defender for Cloud with Microsoft Sentinel.":::
118+
:::image type="content" source="media/azure-security-integration/connect-security-center-with-azure-sentinel.png" alt-text="Screenshot of Data connectors page in Microsoft Sentinel showing selection to connect Microsoft Defender for Cloud with Microsoft Sentinel."lightbox="media/azure-security-integration/connect-security-center-with-azure-sentinel.png":::
126119

127120
4. Select **Connect** to connect the Microsoft Defender for Cloud with Microsoft Sentinel.
128121

129122
5. Enable **Create incident** to generate an incident for Microsoft Defender for Cloud.
130123

131124
## Create rules to identify security threats
132125

133-
After connecting data sources to Microsoft Sentinel, you can create rules to generate alerts for detected threats. In the following example, we'll create a rule for attempts to sign in to Windows server with the wrong password.
126+
After connecting data sources to Microsoft Sentinel, you can create rules to generate alerts for detected threats. In the following example, we'll create a rule for attempts to sign into Windows server with the wrong password.
134127

135128
1. On the Microsoft Sentinel overview page, under Configurations, select **Analytics**.
136129

@@ -141,16 +134,12 @@ After connecting data sources to Microsoft Sentinel, you can create rules to gen
141134
4. On the **General** tab, enter the required information and then select **Next: Set rule logic**.
142135

143136
- Name
144-
145137
- Description
146-
147138
- Tactics
148-
149139
- Severity
150-
151140
- Status
152141

153-
5. On the **Set rule logic** tab, enter the required information, and then select **Next**.
142+
5. On the **Set rule logic** tab, enter the required information, then select **Next**.
154143

155144
- Rule query (here showing our example query)
156145

@@ -160,18 +149,13 @@ After connecting data sources to Microsoft Sentinel, you can create rules to gen
160149
|summarize count () by IpAddress,Computer
161150
|where count_ > 3
162151
```
163-
164-
- Map entities
165152
153+
- Map entities
166154
- Query scheduling
167-
168155
- Alert threshold
169-
170156
- Event grouping
171-
172157
- Suppression
173158
174-
175159
6. On the **Incident settings** tab, enable **Create incidents from alerts triggered by this analytics rule** and select **Next: Automated response**.
176160
177161
:::image type="content" source="../sentinel/media/tutorial-detect-threats-custom/general-tab.png" alt-text="Screenshot showing the Analytic rule wizard for creating a new rule in Microsoft Sentinel.":::
@@ -181,7 +165,7 @@ After connecting data sources to Microsoft Sentinel, you can create rules to gen
181165
8. On the **Review and create** tab, review the information, and select **Create**.
182166
183167
>[!TIP]
184-
>After the third failed attempt to sign in to Windows server, the created rule triggers an incident for every unsuccessful attempt.
168+
>After the third failed attempt to sign into Windows server, the created rule triggers an incident for every unsuccessful attempt.
185169
186170
## View alerts
187171
@@ -193,7 +177,7 @@ You can view generated incidents with Microsoft Sentinel. You can also assign in
193177
194178
3. Select an incident and then assign it to a team for resolution.
195179
196-
:::image type="content" source="media/azure-security-integration/assign-incident.png" alt-text="Screenshot of Microsoft Sentinel Incidents page with incident selected and option to assign the incident for resolution.":::
180+
:::image type="content" source="media/azure-security-integration/assign-incident.png" alt-text="Screenshot of Microsoft Sentinel Incidents page with incident selected and option to assign the incident for resolution."lightbox="media/azure-security-integration/assign-incident.png":::
197181
198182
>[!TIP]
199183
>After resolving the issue, you can close it.
@@ -205,16 +189,14 @@ You can create queries or use the available pre-defined query in Microsoft Senti
205189
1. On the Microsoft Sentinel overview page, under Threat management, select **Hunting**. A list of pre-defined queries is displayed.
206190
207191
>[!TIP]
208-
>You can also create a new query by selecting **New Query**.
192+
>You can also create a new query by selecting **New Query**.
209193
>
210194
>:::image type="content" source="../sentinel/media/hunting/save-query.png" alt-text="Screenshot of Microsoft Sentinel Hunting page with + New Query highlighted.":::
211195
212196
3. Select a query and then select **Run Query**.
213197
214198
4. Select **View Results** to check the results.
215199
216-
217-
218200
## Next steps
219201
220202
Now that you've covered how to protect your Azure VMware Solution VMs, you may want to learn about:

0 commit comments

Comments
 (0)