You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/apply-security-baseline.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,12 @@ ms.date: 06/27/2023
10
10
11
11
# Review hardening recommendations
12
12
13
+
> [!NOTE]
14
+
> As the Log Analytics agent (also known as MMA) is set to retire in [August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/), all Defender for Servers features that currently depend on it, including those described on this page, will be available through either [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), before the retirement date. For more information about the roadmap for each of the features that are currently rely on Log Analytics Agent, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
15
+
13
16
To reduce a machine's attack surface and avoid known risks, it's important to configure the operating system (OS) as securely as possible.
14
17
15
-
The Microsoft cloud security benchmark has guidance for OS hardening which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
18
+
The Microsoft cloud security benchmark has guidance for OS hardening, which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
16
19
17
20
Use the security recommendations described in this article to assess the machines in your environment and:
To make sure that your server resources are secure, Microsoft Defender for Cloud uses agents installed on your servers to send information about your servers to Microsoft Defender for Cloud for analysis. You can quietly deploy the Azure Monitor Agent on your servers when you enable Defender for Servers.
14
14
15
+
> [!NOTE]
16
+
> As part of the Defender for Cloud updated strategy, Azure Monitor Agent will no longer be required for the Defender for Servers offering. However, it will still be required for Defender for SQL Server on machines. As a result, the autoprovisioning process for both agents will be adjusted accordingly. For more information about this change, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
17
+
15
18
In this article, we're going to show you how to deploy the agent so that you can protect your servers.
16
19
17
20
## Availability
@@ -24,8 +27,8 @@ Before you deploy AMA with Defender for Cloud, you must have the following prere
24
27
25
28
- Make sure your multicloud and on-premises machines have Azure Arc installed.
26
29
- AWS and GCP machines
27
-
-[Onboard your AWS connector](quickstart-onboard-aws.md) and auto provision Azure Arc.
28
-
-[Onboard your GCP connector](quickstart-onboard-gcp.md) and auto provision Azure Arc.
30
+
-[Onboard your AWS connector](quickstart-onboard-aws.md) and autoprovision Azure Arc.
31
+
-[Onboard your GCP connector](quickstart-onboard-gcp.md) and autoprovision Azure Arc.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/endpoint-protection-recommendations-technical.md
+25-18Lines changed: 25 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,9 @@ ms.date: 06/15/2023
8
8
---
9
9
# Endpoint protection assessment and recommendations in Microsoft Defender for Cloud
10
10
11
+
> [!NOTE]
12
+
> As the Log Analytics agent (also known as MMA) is set to retire in [August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/), all Defender for Servers features that currently depend on it, including those described on this page, will be available through either [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), before the retirement date. For more information about the roadmap for each of the features that are currently rely on Log Analytics Agent, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
13
+
11
14
Microsoft Defender for Cloud provides health assessments of [supported](supported-machines-endpoint-solutions-clouds-servers.md#endpoint-supported) versions of Endpoint protection solutions. This article explains the scenarios that lead Defender for Cloud to generate the following two recommendations:
12
15
13
16
-[Endpoint protection should be installed on your machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/4fb67663-9ab9-475d-b026-8c544cced439)
@@ -22,7 +25,7 @@ Microsoft Defender for Cloud provides health assessments of [supported](supporte
22
25
23
26
- Defender for Cloud recommends **Endpoint protection health issues should be resolved on your machines** when [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) runs and any of the following occurs:
24
27
25
-
* Any of the following properties are false:
28
+
- Any of the following properties are false:
26
29
27
30
-**AMServiceEnabled**
28
31
-**AntispywareEnabled**
@@ -31,18 +34,18 @@ Microsoft Defender for Cloud provides health assessments of [supported](supporte
31
34
-**IoavProtectionEnabled**
32
35
-**OnAccessProtectionEnabled**
33
36
34
-
* If one or both of the following properties are 7 or more:
37
+
- If one or both of the following properties are 7 or more:
35
38
36
39
-**AntispywareSignatureAge**
37
40
-**AntivirusSignatureAge**
38
41
39
42
## Microsoft System Center endpoint protection
40
43
41
-
* Defender for Cloud recommends **Endpoint protection should be installed on your machines** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results in **AMServiceEnabled = false**.
44
+
- Defender for Cloud recommends **Endpoint protection should be installed on your machines** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results in **AMServiceEnabled = false**.
42
45
43
-
* Defender for Cloud recommends **Endpoint protection health issues should be resolved on your machines** when **Get-MprotComputerStatus** runs and any of the following occurs:
46
+
- Defender for Cloud recommends **Endpoint protection health issues should be resolved on your machines** when **Get-MprotComputerStatus** runs and any of the following occurs:
44
47
45
-
* At least one of the following properties is false:
48
+
- At least one of the following properties is false:
46
49
47
50
-**AMServiceEnabled**
48
51
-**AntispywareEnabled**
@@ -51,20 +54,21 @@ Microsoft Defender for Cloud provides health assessments of [supported](supporte
51
54
-**IoavProtectionEnabled**
52
55
-**OnAccessProtectionEnabled**
53
56
54
-
* If one or both of the following Signature Updates are greater or equal to 7:
57
+
- If one or both of the following Signature Updates are greater or equal to 7:
55
58
56
-
***AntispywareSignatureAge**
57
-
***AntivirusSignatureAge**
59
+
-**AntispywareSignatureAge**
60
+
-**AntivirusSignatureAge**
58
61
59
62
## Trend Micro
60
63
61
-
* Defender for Cloud recommends **Endpoint protection should be installed on your machines** when any of the following checks aren't met:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/file-integrity-monitoring-enable-ama.md
+20-17Lines changed: 20 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,9 @@ ms.date: 11/14/2022
10
10
11
11
To provide [File Integrity Monitoring (FIM)](file-integrity-monitoring-overview.md), the Azure Monitor Agent (AMA) collects data from machines according to [data collection rules](../azure-monitor/essentials/data-collection-rule-overview.md). When the current state of your system files is compared with the state during the previous scan, FIM notifies you about suspicious modifications.
12
12
13
+
> [!NOTE]
14
+
> As part of our Defender for Cloud updated strategy, the Azure Monitor Agent will no longer be required to receive all the capabilities of Defender for Servers. All features that currently rely on the Azure Monitor Agent, including those described on this page, will be available through [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), by August 2024. To access the full capabilities of Defender for SQL server on machines, the Azure monitoring Agent (also known as AMA) is required. For more information about the feature road map, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
15
+
13
16
File Integrity Monitoring with the Azure Monitor Agent offers:
14
17
15
18
-**Compatibility with the unified monitoring agent** - Compatible with the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) that enhances security, reliability, and facilitates multi-homing experience to store data.
@@ -20,9 +23,9 @@ File Integrity Monitoring with the Azure Monitor Agent offers:
20
23
21
24
In this article you'll learn how to:
22
25
23
-
-[Enable File Integrity Monitoring with AMA](#enable-file-integrity-monitoring-with-ama)
24
-
-[Edit the list of tracked files and registry keys](#edit-the-list-of-tracked-files-and-registry-keys)
25
-
-[Exclude machines from File Integrity Monitoring](#exclude-machines-from-file-integrity-monitoring)
26
+
-[Enable File Integrity Monitoring with AMA](#enable-file-integrity-monitoring-with-ama)
27
+
-[Edit the list of tracked files and registry keys](#edit-the-list-of-tracked-files-and-registry-keys)
28
+
-[Exclude machines from File Integrity Monitoring](#exclude-machines-from-file-integrity-monitoring)
26
29
27
30
## Availability
28
31
@@ -45,19 +48,19 @@ To track changes to your files on machines with AMA:
45
48
46
49
To enable File Integrity Monitoring (FIM), use the FIM recommendation to select machines to monitor:
47
50
48
-
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
49
-
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
50
-
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
51
+
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
52
+
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
53
+
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
54
+
55
+
The recommendation fix:
56
+
57
+
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
58
+
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
59
+
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
51
60
52
-
The recommendation fix:
61
+
You can update the DCR and Log Analytics workspace settings later.
53
62
54
-
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
55
-
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
56
-
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
57
-
58
-
You can update the DCR and Log Analytics workspace settings later.
59
-
60
-
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
63
+
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
61
64
62
65
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-banner.png" alt-text="Screenshot of banner in File integrity monitoring to show the results for machines with Azure Monitor Agent.":::
63
66
@@ -82,9 +85,9 @@ To edit the list of tracked files and registries:
82
85
1. Select the DCR that you want to update for a subscription.
83
86
84
87
Each file in the list of Windows registry keys, Windows files, and Linux files contains a definition for a file or registry key, including name, path, and other options. You can also set **Enabled** to **False** to untrack the file or registry key without removing the definition.
85
-
88
+
86
89
Learn more about [system file and registry key definitions](../automation/change-tracking/manage-change-tracking.md#track-files).
87
-
90
+
88
91
1. Select a file, and then add or edit the file or registry key definition.
89
92
90
93
1. Select **Add** to save the changes.
@@ -95,7 +98,7 @@ Every machine in the subscription that is attached to the DCR is monitored. You
95
98
96
99
To exclude a machine from File Integrity Monitoring:
97
100
98
-
1.In the list of monitored machines in the FIM results, select the menu (**...**) for the machine
101
+
1. In the list of monitored machines in the FIM results, select the menu (**...**) for the machine
99
102
1. Select **Detach data collection rule**.
100
103
101
104
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png" alt-text="Screenshot of the option to detach a machine from a data collection rule and exclude the machines from File Integrity Monitoring." lightbox="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png":::
0 commit comments