Skip to content

Commit 59c4fc0

Browse files
authored
Merge pull request #249212 from dcurwin/wi-117301-agents-note-aug24-2023
Notes about AMA and MMA
2 parents 0b817b1 + c80a13f commit 59c4fc0

8 files changed

+86
-60
lines changed

articles/defender-for-cloud/apply-security-baseline.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,12 @@ ms.date: 06/27/2023
1010

1111
# Review hardening recommendations
1212

13+
> [!NOTE]
14+
> As the Log Analytics agent (also known as MMA) is set to retire in [August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/), all Defender for Servers features that currently depend on it, including those described on this page, will be available through either [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), before the retirement date. For more information about the roadmap for each of the features that are currently rely on Log Analytics Agent, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
15+
1316
To reduce a machine's attack surface and avoid known risks, it's important to configure the operating system (OS) as securely as possible.
1417

15-
The Microsoft cloud security benchmark has guidance for OS hardening which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
18+
The Microsoft cloud security benchmark has guidance for OS hardening, which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
1619

1720
Use the security recommendations described in this article to assess the machines in your environment and:
1821

articles/defender-for-cloud/auto-deploy-azure-monitoring-agent.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@ ms.custom: template-how-to, ignite-2022
1212

1313
To make sure that your server resources are secure, Microsoft Defender for Cloud uses agents installed on your servers to send information about your servers to Microsoft Defender for Cloud for analysis. You can quietly deploy the Azure Monitor Agent on your servers when you enable Defender for Servers.
1414

15+
> [!NOTE]
16+
> As part of the Defender for Cloud updated strategy, Azure Monitor Agent will no longer be required for the Defender for Servers offering. However, it will still be required for Defender for SQL Server on machines. As a result, the autoprovisioning process for both agents will be adjusted accordingly. For more information about this change, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
17+
1518
In this article, we're going to show you how to deploy the agent so that you can protect your servers.
1619

1720
## Availability
@@ -24,8 +27,8 @@ Before you deploy AMA with Defender for Cloud, you must have the following prere
2427

2528
- Make sure your multicloud and on-premises machines have Azure Arc installed.
2629
- AWS and GCP machines
27-
- [Onboard your AWS connector](quickstart-onboard-aws.md) and auto provision Azure Arc.
28-
- [Onboard your GCP connector](quickstart-onboard-gcp.md) and auto provision Azure Arc.
30+
- [Onboard your AWS connector](quickstart-onboard-aws.md) and autoprovision Azure Arc.
31+
- [Onboard your GCP connector](quickstart-onboard-gcp.md) and autoprovision Azure Arc.
2932
- On-premises machines
3033
- [Install Azure Arc](../azure-arc/servers/learn/quick-enable-hybrid-vm.md).
3134
- Make sure the Defender plans that you want the Azure Monitor Agent to support are enabled:

articles/defender-for-cloud/endpoint-protection-recommendations-technical.md

Lines changed: 25 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,9 @@ ms.date: 06/15/2023
88
---
99
# Endpoint protection assessment and recommendations in Microsoft Defender for Cloud
1010

11+
> [!NOTE]
12+
> As the Log Analytics agent (also known as MMA) is set to retire in [August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/), all Defender for Servers features that currently depend on it, including those described on this page, will be available through either [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), before the retirement date. For more information about the roadmap for each of the features that are currently rely on Log Analytics Agent, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
13+
1114
Microsoft Defender for Cloud provides health assessments of [supported](supported-machines-endpoint-solutions-clouds-servers.md#endpoint-supported) versions of Endpoint protection solutions. This article explains the scenarios that lead Defender for Cloud to generate the following two recommendations:
1215

1316
- [Endpoint protection should be installed on your machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/4fb67663-9ab9-475d-b026-8c544cced439)
@@ -22,7 +25,7 @@ Microsoft Defender for Cloud provides health assessments of [supported](supporte
2225

2326
- Defender for Cloud recommends **Endpoint protection health issues should be resolved on your machines** when [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) runs and any of the following occurs:
2427

25-
* Any of the following properties are false:
28+
- Any of the following properties are false:
2629

2730
- **AMServiceEnabled**
2831
- **AntispywareEnabled**
@@ -31,18 +34,18 @@ Microsoft Defender for Cloud provides health assessments of [supported](supporte
3134
- **IoavProtectionEnabled**
3235
- **OnAccessProtectionEnabled**
3336

34-
* If one or both of the following properties are 7 or more:
37+
- If one or both of the following properties are 7 or more:
3538

3639
- **AntispywareSignatureAge**
3740
- **AntivirusSignatureAge**
3841

3942
## Microsoft System Center endpoint protection
4043

41-
* Defender for Cloud recommends **Endpoint protection should be installed on your machines** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results in **AMServiceEnabled = false**.
44+
- Defender for Cloud recommends **Endpoint protection should be installed on your machines** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results in **AMServiceEnabled = false**.
4245

43-
* Defender for Cloud recommends **Endpoint protection health issues should be resolved on your machines** when **Get-MprotComputerStatus** runs and any of the following occurs:
46+
- Defender for Cloud recommends **Endpoint protection health issues should be resolved on your machines** when **Get-MprotComputerStatus** runs and any of the following occurs:
4447

45-
* At least one of the following properties is false:
48+
- At least one of the following properties is false:
4649

4750
- **AMServiceEnabled**
4851
- **AntispywareEnabled**
@@ -51,20 +54,21 @@ Microsoft Defender for Cloud provides health assessments of [supported](supporte
5154
- **IoavProtectionEnabled**
5255
- **OnAccessProtectionEnabled**
5356

54-
* If one or both of the following Signature Updates are greater or equal to 7:
57+
- If one or both of the following Signature Updates are greater or equal to 7:
5558

56-
* **AntispywareSignatureAge**
57-
* **AntivirusSignatureAge**
59+
- **AntispywareSignatureAge**
60+
- **AntivirusSignatureAge**
5861

5962
## Trend Micro
6063

61-
* Defender for Cloud recommends **Endpoint protection should be installed on your machines** when any of the following checks aren't met:
62-
- **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent** exists
63-
- **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent\InstallationFolder** exists
64-
- The **dsa_query.cmd** file is found in the Installation Folder
65-
- Running **dsa_query.cmd** results with **Component.AM.mode: on - Trend Micro Deep Security Agent detected**
64+
- Defender for Cloud recommends **Endpoint protection should be installed on your machines** when any of the following checks aren't met:
65+
- **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent** exists
66+
- **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent\InstallationFolder** exists
67+
- The **dsa_query.cmd** file is found in the Installation Folder
68+
- Running **dsa_query.cmd** results with **Component.AM.mode: on - Trend Micro Deep Security Agent detected**
6669

6770
## Symantec endpoint protection
71+
6872
Defender for Cloud recommends **Endpoint protection should be installed on your machines** when any of the following checks aren't met:
6973

7074
- **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\PRODUCTNAME = "Symantec Endpoint Protection"**
@@ -81,10 +85,11 @@ Defender for Cloud recommends **Endpoint protection health issues should be reso
8185
- Check Real-Time Protection status: **HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection\AV\Storages\Filesystem\RealTimeScan\OnOff == 1**
8286
- Check Signature Update status: **HKLM\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\LatestVirusDefsDate <= 7 days**
8387
- Check Full Scan status: **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\LastSuccessfulScanDateTime <= 7 days**
84-
- Find signature version number Path to signature version for Symantec 12: **Registry Paths+ "CurrentVersion\SharedDefs" -Value "SRTSP"**
88+
- Find signature version number Path to signature version for Symantec 12: **Registry Paths+ "CurrentVersion\SharedDefs" -Value "SRTSP"**
8589
- Path to signature version for Symantec 14: **Registry Paths+ "CurrentVersion\SharedDefs\SDSDefs" -Value "SRTSP"**
8690

8791
Registry Paths:
92+
8893
- **"HKLM:\Software\Symantec\Symantec Endpoint Protection" + $Path;**
8994
- **"HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection" + $Path**
9095

@@ -102,7 +107,7 @@ Defender for Cloud recommends **Endpoint protection health issues should be reso
102107
- Find Signature date: **HKLM:\Software\McAfee\AVSolution\DS\DS -Value "szContentCreationDate" >= 7 days**
103108
- Find Scan date: **HKLM:\Software\McAfee\Endpoint\AV\ODS -Value "LastFullScanOdsRunTime" >= 7 days**
104109

105-
## McAfee Endpoint Security for Linux Threat Prevention
110+
## McAfee Endpoint Security for Linux Threat Prevention
106111

107112
Defender for Cloud recommends **Endpoint protection should be installed on your machines** when any of the following checks aren't met:
108113

@@ -115,17 +120,19 @@ Defender for Cloud recommends **Endpoint protection health issues should be reso
115120
- **"/opt/McAfee/ens/tp/bin/mfetpcli --listtask"** returns **DAT and engine Update time** and both of them <= 7 days
116121
- **"/opt/McAfee/ens/tp/bin/mfetpcli --getoasconfig --summary"** returns **On Access Scan** status
117122

118-
## Sophos Antivirus for Linux
123+
## Sophos Antivirus for Linux
119124

120125
Defender for Cloud recommends **Endpoint protection should be installed on your machines** when any of the following checks aren't met:
126+
121127
- File **/opt/sophos-av/bin/savdstatus** exits or search for customized location **"readlink $(which savscan)"**
122128
- **"/opt/sophos-av/bin/savdstatus --version"** returns Sophos name = **Sophos Anti-Virus and Sophos version >= 9**
123129

124130
Defender for Cloud recommends **Endpoint protection health issues should be resolved on your machines** when any of the following checks aren't met:
131+
125132
- **"/opt/sophos-av/bin/savlog --maxage=7 | grep -i "Scheduled scan .\* completed" | tail -1"**, returns a value
126133
- **"/opt/sophos-av/bin/savlog --maxage=7 | grep "scan finished"** | tail -1", returns a value
127-
- **"/opt/sophos-av/bin/savdstatus --lastupdate"** returns lastUpdate, which should be <= 7 days
128-
- **"/opt/sophos-av/bin/savdstatus -v"** is equal to **"On-access scanning is running"**
134+
- **"/opt/sophos-av/bin/savdstatus --lastupdate"** returns lastUpdate, which should be <= 7 days
135+
- **"/opt/sophos-av/bin/savdstatus -v"** is equal to **"On-access scanning is running"**
129136
- **"/opt/sophos-av/bin/savconfig get LiveProtection"** returns enabled
130137

131138
## Troubleshoot and support

articles/defender-for-cloud/file-integrity-monitoring-enable-ama.md

Lines changed: 20 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ ms.date: 11/14/2022
1010

1111
To provide [File Integrity Monitoring (FIM)](file-integrity-monitoring-overview.md), the Azure Monitor Agent (AMA) collects data from machines according to [data collection rules](../azure-monitor/essentials/data-collection-rule-overview.md). When the current state of your system files is compared with the state during the previous scan, FIM notifies you about suspicious modifications.
1212

13+
> [!NOTE]
14+
> As part of our Defender for Cloud updated strategy, the Azure Monitor Agent will no longer be required to receive all the capabilities of Defender for Servers. All features that currently rely on the Azure Monitor Agent, including those described on this page, will be available through [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), by August 2024. To access the full capabilities of Defender for SQL server on machines, the Azure monitoring Agent (also known as AMA) is required. For more information about the feature road map, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
15+
1316
File Integrity Monitoring with the Azure Monitor Agent offers:
1417

1518
- **Compatibility with the unified monitoring agent** - Compatible with the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) that enhances security, reliability, and facilitates multi-homing experience to store data.
@@ -20,9 +23,9 @@ File Integrity Monitoring with the Azure Monitor Agent offers:
2023

2124
In this article you'll learn how to:
2225

23-
- [Enable File Integrity Monitoring with AMA](#enable-file-integrity-monitoring-with-ama)
24-
- [Edit the list of tracked files and registry keys](#edit-the-list-of-tracked-files-and-registry-keys)
25-
- [Exclude machines from File Integrity Monitoring](#exclude-machines-from-file-integrity-monitoring)
26+
- [Enable File Integrity Monitoring with AMA](#enable-file-integrity-monitoring-with-ama)
27+
- [Edit the list of tracked files and registry keys](#edit-the-list-of-tracked-files-and-registry-keys)
28+
- [Exclude machines from File Integrity Monitoring](#exclude-machines-from-file-integrity-monitoring)
2629

2730
## Availability
2831

@@ -45,19 +48,19 @@ To track changes to your files on machines with AMA:
4548

4649
To enable File Integrity Monitoring (FIM), use the FIM recommendation to select machines to monitor:
4750

48-
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
49-
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
50-
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
51+
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
52+
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
53+
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
54+
55+
The recommendation fix:
56+
57+
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
58+
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
59+
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
5160

52-
The recommendation fix:
61+
You can update the DCR and Log Analytics workspace settings later.
5362

54-
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
55-
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
56-
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
57-
58-
You can update the DCR and Log Analytics workspace settings later.
59-
60-
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
63+
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
6164

6265
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-banner.png" alt-text="Screenshot of banner in File integrity monitoring to show the results for machines with Azure Monitor Agent.":::
6366

@@ -82,9 +85,9 @@ To edit the list of tracked files and registries:
8285
1. Select the DCR that you want to update for a subscription.
8386

8487
Each file in the list of Windows registry keys, Windows files, and Linux files contains a definition for a file or registry key, including name, path, and other options. You can also set **Enabled** to **False** to untrack the file or registry key without removing the definition.
85-
88+
8689
Learn more about [system file and registry key definitions](../automation/change-tracking/manage-change-tracking.md#track-files).
87-
90+
8891
1. Select a file, and then add or edit the file or registry key definition.
8992

9093
1. Select **Add** to save the changes.
@@ -95,7 +98,7 @@ Every machine in the subscription that is attached to the DCR is monitored. You
9598

9699
To exclude a machine from File Integrity Monitoring:
97100

98-
1. In the list of monitored machines in the FIM results, select the menu (**...**) for the machine
101+
1. In the list of monitored machines in the FIM results, select the menu (**...**) for the machine
99102
1. Select **Detach data collection rule**.
100103

101104
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png" alt-text="Screenshot of the option to detach a machine from a data collection rule and exclude the machines from File Integrity Monitoring." lightbox="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png":::

0 commit comments

Comments
 (0)