Skip to content

Commit 5e8f8c8

Browse files
committed
removed obsolete section
1 parent 9b285f8 commit 5e8f8c8

File tree

1 file changed

+0
-143
lines changed

1 file changed

+0
-143
lines changed

articles/azure-vmware/integrate-azure-native-services.md

Lines changed: 0 additions & 143 deletions
Original file line numberDiff line numberDiff line change
@@ -75,146 +75,3 @@ If your VM template already has these changes incorporated, you won't need to do
7575
1. When you're done, select **Review + create**.
7676

7777
When the extension installation steps are completed, they trigger deployment and install the selected extension on the VM.
78-
79-
80-
81-
82-
83-
84-
85-
86-
87-
88-
89-
90-
91-
92-
93-
94-
95-
96-
97-
98-
99-
100-
101-
102-
103-
104-
105-
106-
107-
108-
109-
110-
111-
112-
113-
114-
115-
116-
117-
118-
119-
120-
121-
122-
123-
124-
125-
126-
127-
128-
>
129-
>
130-
>
131-
>
132-
>
133-
>
134-
>
135-
136-
____________________________________________OLD**
137-
138-
## Before you start
139-
140-
If you're new to Azure or not familiar with any of the services previously mentioned, review the following articles:
141-
142-
- [Enable Azure Monitor for VMs overview](../azure-monitor/vm/vminsights-enable-overview.md)
143-
144-
## Enable guest management extension
145-
146-
[Azure Update Management](../automation/update-management/overview.md) in Azure Automation manages operating system updates for your Windows and Linux machines in a hybrid environment. It monitors patching compliance and forwards patching deviation alerts to Azure Monitor for remediation. Azure Update Management must connect to your Log Analytics workspace to use stored data to assess the status of updates on your VMs.
147-
148-
1. Before you can add Log Analytics Workspace to Azure Update Management, you first need to [Create an Azure Automation account](../automation/automation-create-standalone-account.md).
149-
150-
>[!TIP]
151-
>You can [use an Azure Resource Manager (ARM) template to create an Automation account](../automation/quickstart-create-automation-account-template.md). Using an ARM template takes fewer steps compared to other deployment methods.
152-
153-
1. [Create a Log Analytics workspace in the Azure portal](../azure-monitor/logs/quick-create-workspace.md). If you prefer, you can also create a workspace via [CLI](../azure-monitor/logs/resource-manager-workspace.md), [PowerShell](../azure-monitor/logs/powershell-workspace-configuration.md), or [Azure Resource Manager template](../azure-monitor/logs/resource-manager-workspace.md).
154-
155-
1. [Enable Update Management from an Automation account](../automation/update-management/enable-from-automation-account.md). In the process, you'll link your Log Analytics workspace with your automation account.
156-
157-
1. Once you've enabled Update Management, you can [deploy updates on VMs and review the results](../automation/update-management/deploy-updates.md).
158-
159-
## Enable Microsoft Defender for Cloud
160-
161-
Assess the vulnerability of Azure VMware Solution VMs and raise alerts as needed. These security alerts can be forwarded to Azure Monitor for resolution. For more information, see [Supported features for VMs](../security-center/security-center-services.md).
162-
163-
Defender for Cloud offers many features, including:
164-
165-
- File integrity monitoring
166-
- Fileless attack detection
167-
- Operating system patch assessment
168-
- Security misconfigurations assessment
169-
- Endpoint protection assessment
170-
171-
>[!NOTE]
172-
>Microsoft Defender for Cloud is a pre-configured tool that doesn't require deployment, but you'll need to enable it in the Azure portal.
173-
174-
1. [Add Azure VMware Solution VMs to Defender for Cloud](azure-security-integration.md#add-azure-vmware-solution-vms-to-defender-for-cloud).
175-
176-
2. [Enable Microsoft Defender for Cloud](../security-center/enable-azure-defender.md). Defender for Cloud assesses the VMs for potential security issues. It also provides [security recommendations](../security-center/security-center-recommendations.md) in the Overview tab.
177-
178-
3. [Define security policies](../security-center/tutorial-security-policy.md) in Defender for Cloud.
179-
180-
For more information, see [Integrate Microsoft Defender for Cloud with Azure VMware Solution](azure-security-integration.md).
181-
182-
## Onboard VMs to Azure Arc enabled servers
183-
184-
Extend Azure management to any infrastructure, including Azure VMware Solution, on-premises, or other cloud platforms. For information on enabling Azure Arc enabled servers for multiple Windows or Linux VMs, see [Connect hybrid machines to Azure at scale](../azure-arc/servers/onboard-service-principal.md).
185-
186-
## Onboard hybrid Kubernetes clusters with Azure Arc-enabled Kubernetes
187-
188-
Attach a Kubernetes cluster hosted in your Azure VMware Solution environment using Azure Arc enabled Kubernetes. For more information, see [Create an Azure Arc-enabled Kubernetes cluster](../azure-arc/kubernetes/quickstart-connect-cluster.md).
189-
190-
## Deploy the Log Analytics agent
191-
192-
Monitor Azure VMware Solution VMs through the Log Analytics agent. Machines connected to the Log Analytics workspace use the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md) to collect data about changes to installed software, Microsoft services, Windows registry and files, and Linux daemons on monitored servers. When data is available, the agent sends it to Azure Monitor Logs for processing. Azure Monitor Logs applies logic to the received data, records it, and makes it available for analysis.
193-
194-
Deploy the Log Analytics agent by using [Azure Arc-enabled servers VM extension support](../azure-arc/servers/manage-vm-extensions.md).
195-
196-
## Enable Azure Monitor
197-
198-
Can collect data from different [sources to monitor and analyze](../azure-monitor/data-sources.md) and different types of [data for analysis, visualization, and alerting](../azure-monitor/data-platform.md). You can also create alert rules to identify issues in your environment, like high use of resources, missing patches, low disk space, and heartbeat of your VMs. You can set an automated response to detected events by sending an alert to IT Service Management (ITSM) tools. Alert detection notification can also be sent via email.
199-
200-
Monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
201-
202-
1. [Design your Azure Monitor Logs deployment](../azure-monitor/logs/workspace-design.md)
203-
204-
1. [Enable Azure Monitor for VMs overview](../azure-monitor/vm/vminsights-enable-overview.md)
205-
206-
1. [Configure Log Analytics workspace for Azure Monitor for VMs](../azure-monitor/vm/vminsights-configure-workspace.md).
207-
208-
1. Create alert rules to identify issues in your environment:
209-
210-
- [Create, view, and manage metric alerts using Azure Monitor](../azure-monitor/alerts/alerts-metric.md).
211-
212-
- [Create, view, and manage log alerts using Azure Monitor](../azure-monitor/alerts/alerts-log.md).
213-
214-
- [Action rules](../azure-monitor/alerts/alerts-action-rules.md) to set automated actions and notifications.
215-
216-
- [Connect Azure to ITSM tools using IT Service Management Connector](../azure-monitor/alerts/itsmc-overview.md).
217-
218-
## Next steps
219-
220-
Now that you've covered Azure VMware Solution network and interconnectivity concepts, you may want to learn about [integrating Microsoft Defender for Cloud with Azure VMware Solution](azure-security-integration.md).

0 commit comments

Comments
 (0)