Skip to content

Commit 67ddd30

Browse files
Merge pull request #220956 from jjaygbay1/monitor-protect-vmware
Updated article
2 parents a907742 + 46473eb commit 67ddd30

File tree

2 files changed

+51
-118
lines changed

2 files changed

+51
-118
lines changed
149 KB
Loading

articles/azure-vmware/integrate-azure-native-services.md

Lines changed: 51 additions & 118 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Monitor and protect VMs with Azure native services
33
description: Learn how to integrate and deploy Microsoft Azure native tools to monitor and manage your Azure VMware Solution workloads.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 10/26/2022
6+
ms.date: 12/13/2022
77
ms.custom: engagement-fy23
88
---
99

@@ -12,136 +12,69 @@ ms.custom: engagement-fy23
1212
Microsoft Azure native services let you monitor, manage, and protect your virtual machines (VMs) in a hybrid environment (Azure, Azure VMware Solution, and on-premises). In this article, you'll integrate Azure native services in your Azure VMware Solution private cloud. You'll also learn how to use the tools to manage your VMs throughout their lifecycle.
1313

1414
The Azure native services that you can integrate with Azure VMware Solution include:
15-
16-
- **Azure Arc** extends Azure management to any infrastructure, including Azure VMware Solution, on-premises, or other cloud platforms. [Azure Arc-enabled servers](../azure-arc/servers/overview.md) lets you manage your Windows and Linux physical servers and virtual machines hosted *outside* of Azure, on your corporate network, or another cloud provider. You can attach a Kubernetes cluster hosted in your Azure VMware Solution environment using [Azure Arc enabled Kubernetes](../azure-arc/kubernetes/overview.md).
17-
18-
- **Azure Monitor** collects, analyzes, and acts on data from your cloud and on-premises environments. It requires no deployment. You can monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
19-
20-
With Azure Monitor, you can collect data from different [sources to monitor and analyze](../azure-monitor/data-sources.md) and different types of [data for analysis, visualization, and alerting](../azure-monitor/data-platform.md). You can also create alert rules to identify issues in your environment, like high use of resources, missing patches, low disk space, and heartbeat of your VMs. You can set an automated response to detected events by sending an alert to IT Service Management (ITSM) tools. Alert detection notification can also be sent via email.
21-
22-
- **Microsoft Defender for Cloud** strengthens data centers' security and provides advanced threat protection across hybrid workloads in the cloud or on-premises. It assesses Azure VMware Solution VMs' vulnerability, raises alerts as needed, and forwards them to Azure Monitor for resolution. For instance, it assesses missing operating system patches, security misconfigurations, and [endpoint protection](../security-center/security-center-services.md). You can also define security policies in [Microsoft Defender for Cloud](azure-security-integration.md).
23-
24-
- **Azure Update Management** manages operating system updates for your Windows and Linux machines in a hybrid environment in Azure Automation. It monitors patching compliance and forwards patching deviation alerts to Azure Monitor for remediation. Azure Update Management must connect to your Log Analytics workspace to use stored data to assess the status of updates on your VMs.
25-
26-
- **Log Analytics workspace** stores log data. Each workspace has its own data repository and configuration to store data. You can monitor Azure VMware Solution VMs through the Log Analytics agent. Machines connected to the Log Analytics Workspace use the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md) to collect data about changes to installed software, Microsoft services, Windows registry and files, and Linux daemons on monitored servers. When data is available, the agent sends it to Azure Monitor Logs for processing. Azure Monitor Logs applies logic to the received data, records it, and makes it available for analysis. Use the Azure Arc enabled servers [VM extensions support](../azure-arc/servers/manage-vm-extensions.md) to deploy Log Analytics agents on VMs.
15+
- Azure Arc extends Azure management Azure VMware Solution. After your Azure VMware Solution private cloud is deployed to Arc, you'll be ready to execute operations in Azure VMware Solution vCenter Server from the Azure portal. Operations are related to Create, Read, Update, and Delete (CRUD) virtual machines (VMs) in an Arc-enabled Azure VMware Solution private cloud. Users can also enable guest management and install Azure extensions after the private cloud is Arc-enabled.
16+
- Azure Monitor collects, analyzes, and acts on data from your cloud and on-premises environments. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions. You can send logs from your Azure VMware Solution private cloud to your Log Analytics workspace, allowing you to take advantage of the Log Analytics feature set, including:
17+
- system patches, security misconfigurations, and endpoint protection. You can also define security policies in Microsoft Defender for Cloud.
18+
- Log Analytics workspace stores log data. Each workspace has its own data repository and configuration to store data. You can monitor Azure VMware Solution VMs through the Log Analytics agent. Machines connected to the Log Analytics Workspace use the Log Analytics agent to collect data about changes to installed software, Microsoft services, Windows registry and files, and Linux daemons on monitored servers. When data is available, the agent sends it to Azure Monitor Logs for processing. Azure Monitor Logs applies logic to the received data, records it, and makes it available for analysis.
2719

2820
## Benefits
29-
3021
- Azure native services can be used to manage your VMs in a hybrid environment (Azure, Azure VMware Solution, and on-premises).
3122
- Integrated monitoring and visibility of your Azure, Azure VMware Solution, and on-premises VMs.
32-
- With Azure Update Management in Azure Automation, you can manage operating system updates for both your Windows and Linux machines.
33-
- Microsoft Defender for Cloud provides advanced threat protection, including:
34-
- File integrity monitoring
35-
- Fileless security alerts
36-
- Operating system patch assessment
37-
- Security misconfigurations assessment
38-
- Endpoint protection assessment
39-
- Easily deploy the Log Analytics agent using Azure Arc enabled servers VM extension support for new and existing VMs.
40-
- Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions. Collect data and logs to a single point and present that data to different Azure native services.
23+
- Fileless security alerts
24+
- Operating system patch assessment
25+
- Security misconfigurations assessment
26+
- Endpoint protection assessment
27+
- Easily deploy the Log Analytics extension after enabling guest management on VMware vSphere virtual machine (VM).
28+
- Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics extensions. Collect data and logs to a single point and present that data to different Azure native services.
4129
- Added benefits of Azure Monitor include:
42-
- Seamless monitoring
43-
- Better infrastructure visibility
44-
- Instant notifications
45-
- Automatic resolution
46-
- Cost efficiency
30+
- Seamless monitoring
31+
- Better infrastructure visibility
32+
- Instant notifications
33+
- Automatic resolution
34+
- Cost efficiency
4735

4836
## Topology
4937

5038
The diagram shows the integrated monitoring architecture for Azure VMware Solution VMs.
5139

5240
:::image type="content" source="media/concepts/integrated-azure-monitoring-architecture.png" alt-text="Diagram showing the integrated Azure monitoring architecture."lightbox="media/concepts/integrated-azure-monitoring-architecture.png" border="false":::
5341

54-
The Log Analytics agent enables collection of log data from Azure, Azure VMware Solution, and on-premises VMs. The log data is sent to Azure Monitor Logs and stored in a Log Analytics workspace. You can deploy the Log Analytics agent using Arc enabled servers [VM extensions support](../azure-arc/servers/manage-vm-extensions.md) for new and existing VMs.
55-
56-
Once the Log Analytics workspace collects the logs, you can configure the Log Analytics workspace with Defender for Cloud to assess the vulnerability status of Azure VMware Solution VMs and raise an alert for any critical vulnerability. For instance, it assesses missing operating system patches, security misconfigurations, and [endpoint protection](../security-center/security-center-services.md).
57-
58-
You can configure the Log Analytics workspace with Microsoft Sentinel for alert detection, threat visibility, hunting, and threat response. In the preceding diagram, Defender for Cloud is connected to Microsoft Sentinel using the Defender for Cloud connector. Defender for Cloud forwards the environment vulnerability to Microsoft Sentinel to create an incident and map with other threats. You can also create the scheduled rules query to detect unwanted activity and convert it to the incidents.
59-
60-
## Before you start
61-
62-
If you're new to Azure or unfamiliar with any of the services previously mentioned, review the following articles:
63-
64-
- [Automation account authentication overview](../automation/automation-security-overview.md)
65-
- [Designing your Azure Monitor Logs deployment](../azure-monitor/logs/workspace-design.md) and [Azure Monitor](../azure-monitor/overview.md)
66-
- [Planning](../defender-for-cloud/defender-for-cloud-planning-and-operations-guide.md) and [Supported platforms](../security-center/security-center-os-coverage.md) for Microsoft Defender for Cloud
67-
- [Enable Azure Monitor for VMs overview](../azure-monitor/vm/vminsights-enable-overview.md)
68-
- [What is Azure Arc enabled servers?](../azure-arc/servers/overview.md) and [What is Azure Arc enabled Kubernetes?](../azure-arc/kubernetes/overview.md)
69-
- [Update Management overview](../automation/update-management/overview.md)
70-
71-
## Enable Azure Update Management
72-
73-
[Azure Update Management](../automation/update-management/overview.md) in Azure Automation manages operating system updates for your Windows and Linux machines in a hybrid environment. It monitors patching compliance and forwards patching deviation alerts to Azure Monitor for remediation. Azure Update Management must connect to your Log Analytics workspace to use stored data to assess the status of updates on your VMs.
74-
75-
1. Before you can add Log Analytics Workspace to Azure Update Management, you first need to [Create an Azure Automation account](../automation/automation-create-standalone-account.md).
76-
77-
>[!TIP]
78-
>You can [use an Azure Resource Manager (ARM) template to create an Automation account](../automation/quickstart-create-automation-account-template.md). Using an ARM template takes fewer steps compared to other deployment methods.
79-
80-
1. [Create a Log Analytics workspace in the Azure portal](../azure-monitor/logs/quick-create-workspace.md). If you prefer, you can also create a workspace via [CLI](../azure-monitor/logs/resource-manager-workspace.md), [PowerShell](../azure-monitor/logs/powershell-workspace-configuration.md), or [Azure Resource Manager template](../azure-monitor/logs/resource-manager-workspace.md).
81-
82-
1. [Enable Update Management from an Automation account](../automation/update-management/enable-from-automation-account.md). In the process, you'll link your Log Analytics workspace with your automation account.
83-
84-
1. Once you've enabled Update Management, you can [deploy updates on VMs and review the results](../automation/update-management/deploy-updates.md).
85-
86-
## Enable Microsoft Defender for Cloud
87-
88-
Assess the vulnerability of Azure VMware Solution VMs and raise alerts as needed. These security alerts can be forwarded to Azure Monitor for resolution. For more information, see [Supported features for VMs](../security-center/security-center-services.md).
89-
90-
Defender for Cloud offers many features, including:
91-
92-
- File integrity monitoring
93-
- Fileless attack detection
94-
- Operating system patch assessment
95-
- Security misconfigurations assessment
96-
- Endpoint protection assessment
97-
9842
>[!NOTE]
99-
>Microsoft Defender for Cloud is a pre-configured tool that doesn't require deployment, but you'll need to enable it in the Azure portal.
100-
101-
1. [Add Azure VMware Solution VMs to Defender for Cloud](azure-security-integration.md#add-azure-vmware-solution-vms-to-defender-for-cloud).
102-
103-
2. [Enable Microsoft Defender for Cloud](../security-center/enable-azure-defender.md). Defender for Cloud assesses the VMs for potential security issues. It also provides [security recommendations](../security-center/security-center-recommendations.md) in the Overview tab.
104-
105-
3. [Define security policies](../security-center/tutorial-security-policy.md) in Defender for Cloud.
106-
107-
For more information, see [Integrate Microsoft Defender for Cloud with Azure VMware Solution](azure-security-integration.md).
108-
109-
## Onboard VMs to Azure Arc enabled servers
110-
111-
Extend Azure management to any infrastructure, including Azure VMware Solution, on-premises, or other cloud platforms. For information on enabling Azure Arc enabled servers for multiple Windows or Linux VMs, see [Connect hybrid machines to Azure at scale](../azure-arc/servers/onboard-service-principal.md).
112-
113-
## Onboard hybrid Kubernetes clusters with Azure Arc-enabled Kubernetes
114-
115-
Attach a Kubernetes cluster hosted in your Azure VMware Solution environment using Azure Arc enabled Kubernetes. For more information, see [Create an Azure Arc-enabled Kubernetes cluster](../azure-arc/kubernetes/quickstart-connect-cluster.md).
116-
117-
## Deploy the Log Analytics agent
118-
119-
Monitor Azure VMware Solution VMs through the Log Analytics agent. Machines connected to the Log Analytics workspace use the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md) to collect data about changes to installed software, Microsoft services, Windows registry and files, and Linux daemons on monitored servers. When data is available, the agent sends it to Azure Monitor Logs for processing. Azure Monitor Logs applies logic to the received data, records it, and makes it available for analysis.
120-
121-
Deploy the Log Analytics agent by using [Azure Arc-enabled servers VM extension support](../azure-arc/servers/manage-vm-extensions.md).
122-
123-
## Enable Azure Monitor
124-
125-
Can collect data from different [sources to monitor and analyze](../azure-monitor/data-sources.md) and different types of [data for analysis, visualization, and alerting](../azure-monitor/data-platform.md). You can also create alert rules to identify issues in your environment, like high use of resources, missing patches, low disk space, and heartbeat of your VMs. You can set an automated response to detected events by sending an alert to IT Service Management (ITSM) tools. Alert detection notification can also be sent via email.
126-
127-
Monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
128-
129-
1. [Design your Azure Monitor Logs deployment](../azure-monitor/logs/workspace-design.md)
130-
131-
1. [Enable Azure Monitor for VMs overview](../azure-monitor/vm/vminsights-enable-overview.md)
132-
133-
1. [Configure Log Analytics workspace for Azure Monitor for VMs](../azure-monitor/vm/vminsights-configure-workspace.md).
134-
135-
1. Create alert rules to identify issues in your environment:
136-
137-
- [Create, view, and manage metric alerts using Azure Monitor](../azure-monitor/alerts/alerts-metric.md).
138-
139-
- [Create, view, and manage log alerts using Azure Monitor](../azure-monitor/alerts/alerts-log.md).
140-
141-
- [Action rules](../azure-monitor/alerts/alerts-action-rules.md) to set automated actions and notifications.
142-
143-
- [Connect Azure to ITSM tools using IT Service Management Connector](../azure-monitor/alerts/itsmc-overview.md).
43+
> If you're new to Azure or not familiar with the services previously mentioned, see [Enable Azure Monitor for VMs overview](https://learn.microsoft.com/azure/azure-monitor/vm/vminsights-enable-overview) for guidance.
44+
45+
## Enable guest management and install extension
46+
The guest management must be enabled on the VMware vSphere virtual machine (VM) before you can install an extension. Use the following prerequisite steps to enable guest management.
47+
### Prerequisites
48+
- Navigate to Azure portal.
49+
- Locate the VMware vSphere VM you want to check for guest management and install extensions on, select the name of the VM.
50+
- Select **Configuration** from the left navigation for a VMware VM.
51+
- Verify **Enable guest management** has been checked.
52+
53+
The following conditions are necessary to enable guest management on a VM.
54+
- The machine must be running a supported operating system.
55+
- The machine needs to connect through the firewall to communicate over the internet. Make sure the URLs listed aren't blocked.
56+
- The machine can't be behind a proxy, it's not supported yet.
57+
- If you're using Linux VM, the account must not prompt to sign in on pseudo commands.
58+
- To avoid pseudo commands, follow these steps:
59+
1. Sign into Linux VM.
60+
2. Open terminal and run the following command: sudo visudo.
61+
3. Add the line `username ALL=(ALL) NOPASSWD: ALL` at the end of the file.
62+
4. Replace username with the appropriate user-name.
63+
If your VM template already has these changes incorporated, you won't need to do the steps for the VM created from that template.
64+
### Install extensions
65+
1. Go to **Azure** portal.
66+
1. Find the Arc-enabled Azure VMware Solution VM that you want to install an extension on and select the VM name.
67+
1. Navigate to **Extensions** in the left navigation, select **Add**.
68+
1. Select the extension you want to install.
69+
Based on the extension, you'll need to provide details.
70+
For example, workspace ID and key for Log Analytics extension.
71+
1. When you're done, select **Review + create**.
72+
73+
When the extension installation steps are completed, they trigger deployment and install the selected extension on the VM.
14474

14575
## Next steps
14676

147-
Now that you've covered Azure VMware Solution network and interconnectivity concepts, you may want to learn about [integrating Microsoft Defender for Cloud with Azure VMware Solution](azure-security-integration.md).
77+
Now that you've covered how to integrate services and monitor VMware Solution VMs, you may want to learn about:
78+
79+
- [Using the workload protection dashboard](../security-center/azure-defender-dashboard.md)
80+
- [Advanced multistage attack detection in Microsoft Sentinel](../azure-monitor/logs/quick-create-workspace.md)

0 commit comments

Comments
 (0)