Skip to content

Commit 62eb393

Browse files
committed
Added programatic method for deploying VA solution
1 parent b573397 commit 62eb393

File tree

1 file changed

+52
-1
lines changed

1 file changed

+52
-1
lines changed

articles/security-center/partner-vulnerability-assessment.md

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ If you're on the standard tier, you're able to use Azure Security Center's built
2121

2222
Alternatively, you might want to deploy your own privately-licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/). You can install one of these partner solutions on multiple VMs that belong to the same subscription.
2323

24-
## Configuring a partner solution
24+
## Configuring a partner solution (in the Azure Portal)
2525

2626
1. On the **Security Center** dashboard, in the **Overview** section, click **Recommendations**.
2727

@@ -60,6 +60,57 @@ Alternatively, you might want to deploy your own privately-licensed vulnerabilit
6060

6161
1. Click **OK**.
6262

63+
64+
## Configuring a partner solution (using PowerShell and the REST API)
65+
66+
To programatically deploy your own privately-licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/), use the supplied script [Powershell > Vulnerability Solution](https://github.com/Azure/Azure-Security-Center/tree/master/Powershell%20scripts/Vulnerability%20Solution).
67+
68+
This script uses the REST API to create a new Security Solution in ASC. The solution requires a license and a key provided by the service provider: Qualys or Rapid7.
69+
70+
> [!IMPORTANT]
71+
> Only one solution can be created per license. Attempting to create another solution using the same name/license/key will fail.
72+
73+
### Prerequisites
74+
75+
Required PowerShell modules:
76+
77+
- Install-module Az
78+
- Install-module Az.security
79+
80+
### Usage
81+
82+
To run the script, you'll need the relevant information for the parameters below.
83+
84+
| **Parameter** | **Required** | **Notes** |
85+
|----|:----:|----|
86+
|SubscriptionId||The subscriptionID of the Azure Subscription that contains the resources you want to analyze.|
87+
|ResourceGroupName||Name of the resource group. Use any existing resource group including the default ("DefaultResourceGroup-xxx"). Since the solution is not an Azure resource, it won't be listed under the resource group, but still it is attached to it.|
88+
|vaSolutionName||The name of the new solution.|
89+
|vaType|-|Qualys or Rapid7.|
90+
|autoUpdate|-|Enable (true) or disable (false) auto deploy for this VA solution. When enabled, every new VM on the subscription will automatically attempt to link to the solution.<br/>(Default: False)|
91+
|licenceCode|-|Vendor provided license string.|
92+
|publicKey|-|Vendor provided public key.|
93+
94+
95+
### Running the script
96+
97+
Syntax:
98+
99+
```
100+
.\New-ASCVASolution.ps1 -subscriptionId <Subscription Id> -resourceGroupName <RG Name>
101+
-vaSolutionName <New solution name> -vaType <Qualys / Rapid7> -autoUpdate <true/false>
102+
-licenceCode <License Code from vendor> -publicKey <Public Key recieved from vendor>
103+
```
104+
105+
Full command:
106+
107+
```
108+
.\New-ASCVASolution.ps1 -subscriptionId 'f4cx1b69-dtgb-4ch6-6y6f-ea2e95373d3b' -resourceGroupName 'DefaultResourceGroup-WEU' -vaSolutionName 'QualysVa001' -vaType 'Qualys' -autoUpdate 'false' `
109+
-licenceCode 'eyJjaWQiOiJkZDg5OTYzXe4iMTMzLWM4NTAtODM5FD2mZWM1N2Q3ZGU5MjgiLCJgbTYuOiIyMmM5NDg3MS1lNTVkLTQ1OGItYjhlMC03OTRhMmM3YWM1ZGQiLCJwd3NVcmwiOiJodHRwczovL3FhZ3B1YmxpYy1wMDEuaW50LnF1YWx5cy5jb20vQ2xvdSKJY6VudC8iLCJwd3NQb3J0IjoiNDQzIn0=' `
110+
-publicKey 'MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCOiOLXjOywMfLZIBGPZLwSocf1Q64GASLK9OHFEmanBl1nkJhZDrZ4YD5lM98fThYbAx1Rde2iYV1ze/wDlX4cIvFAyXuN7HbdkeIlBl6vWXEBZpUU17bOdJOUGolzEzNBhtxi/elEZLghq9Chmah82me/okGMIhJJsCiTtglVQIDAQAB'
111+
```
112+
113+
63114
## Review the recommendation
64115
After the vulnerability assessment solution is installed on the target VM, Security Center scans the VM to detect and identify system and application vulnerabilities.
65116

0 commit comments

Comments
 (0)