You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/plan-defender-for-servers-agents.md
+31-29Lines changed: 31 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,24 +14,20 @@ This article helps you plan your agents, extensions, and Azure Arc resources for
14
14
15
15
## Before you begin
16
16
17
-
This article is the *fifth* article in the Defender for Servers planning guide series. Before you begin, review the earlier articles:
17
+
This article is the *fifth* article in the Defender for Servers planning guide. Before you begin, review the earlier articles:
18
18
19
19
1.[Start planning your deployment](plan-defender-for-servers.md)
20
20
1.[Understand where your data is stored and Log Analytics workspace requirements](plan-defender-for-servers-data-workspace.md)
21
21
1.[Review Defender for Servers access roles](plan-defender-for-servers-roles.md)
22
22
1.[Select a Defender for Servers plan](plan-defender-for-servers-select-plan.md)
23
23
24
-
## Review agents and extensions
25
-
26
-
Defender for Servers plans use agents and extensions.
27
-
28
24
## Review Azure Arc requirements
29
25
30
26
Azure Arc helps you onboard Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises machines to Azure. Defender for Cloud uses Azure Arc to protect non-Azure machines.
For free foundational cloud security posture management (CSPM) features, Azure Arc running on AWS or GCP machines isn't required. But for full functionality, we recommend that you do have Azure Arc running on AWS or GCP machines.
30
+
For free foundational cloud security posture management (CSPM) features, Azure Arc running on AWS or GCP machines isn't required. For full functionality, we recommend that you *do* have Azure Arc running on AWS or GCP machines.
35
31
36
32
Azure Arc onboarding is required for on-premises machines.
37
33
@@ -52,31 +48,35 @@ To plan for Azure Arc deployment:
52
48
-[Network and internet access ](../azure-arc/servers/network-requirements.md) for the agent.
53
49
-[Connection options](../azure-arc/servers/deployment-options.md) for the agent.
54
50
55
-
## The Log Analytics agent and the Azure Monitor agent
51
+
## Log Analytics agent and Azure Monitor agent
56
52
57
-
Defender for Cloud uses the Log Analytics agent and Azure Monitor agent to collect information from compute resources. Then, it sends the data to a Log Analytics workspace for more analysis. Review the [differences and recommendations for both agents](../azure-monitor/agents/agents-overview.md).
53
+
Defender for Cloud uses the Log Analytics agent and the Azure Monitor agent to collect information from compute resources. Then, it sends the data to a Log Analytics workspace for more analysis. Review the [differences and recommendations for both agents](../azure-monitor/agents/agents-overview.md).
58
54
59
55
The following table describes the agents that are used in Defender for Servers:
Foundational CSPM recommendations (free) that depend on the agent: [OS baseline recommendation](apply-security-baseline.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent.":::| :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::<br/><br/> With the Azure Monitor agent, the Azure Policy [guest configuration extension](../virtual-machines/extensions/guest-configuration.md) is used.
64
60
Foundational CSPM: [System updates recommendations](recommendations-reference.md#compute-recommendations) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent"::: | Not yet available.
65
-
Foundational CSPM: [Antimalware/Endpoint protection recommendations](endpoint-protection-recommendations-technical.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
66
-
Attack detection at the OS level and network layer, including fileless attack detection).<br/><br/> Plan 1 relies on Defender for Endpoint capabilities for attack detection. | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2| :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2
61
+
Foundational CSPM: [Antimalware/endpoint protection recommendations](endpoint-protection-recommendations-technical.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
62
+
Attack detection at the OS level and network layer, including fileless attack detection<br/><br/> Plan 1 relies on Defender for Endpoint capabilities for attack detection. | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2| :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2
67
63
File integrity monitoring (Plan 2 only) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
68
64
[Adaptive application controls](adaptive-application-controls.md) (Plan 2 only) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
69
65
70
66
## Qualys extension
71
67
72
68
The Qualys extension is available in Defender for Servers Plan 2. The extension is deployed if you want to use Qualys for vulnerability assessment.
73
69
70
+
Here's more information:
71
+
74
72
- The Qualys extension sends metadata for analysis to one of two Qualys datacenter regions, depending on your Azure region.
75
-
- If you're in a European Azure geography, data is processed in the Qualys European datacenter.
76
-
- For other regions, data is processed in the US datacenter.
73
+
74
+
- If you're in a European Azure geography, data is processed in the Qualys European datacenter.
75
+
- For other regions, data is processed in the US datacenter.
76
+
77
77
- To use Qualys on a machine, the extension must be installed and the machine must be able to communicate with the relevant network endpoint:
78
-
- Europe datacenter: `https://qagpublic.qg2.apps.qualys.eu`
79
-
- US datacenter: `https://qagpublic.qg3.apps.qualys.com`
78
+
- Europe datacenter: `https://qagpublic.qg2.apps.qualys.eu`
79
+
- US datacenter: `https://qagpublic.qg3.apps.qualys.com`
80
80
81
81
## Guest configuration extension
82
82
@@ -91,18 +91,18 @@ Learn more about the Azure Policy [guest configuration extension](../virtual-mac
91
91
92
92
When you enable Defender for Servers, Defender for Cloud automatically deploys a Defender for Endpoint extension. The extension is a management interface that runs a script inside the operating system to deploy and integrate the Defender for Endpoint sensor on the machine.
93
93
94
-
- Windows machines extension: MDE.Windows
95
-
- Linux machines extension: MDE.Linux
94
+
- Windows machines extension: `MDE.Windows`
95
+
- Linux machines extension: `MDE.Linux`
96
96
- Machines must meet [minimum requirements](/microsoft-365/security/defender-endpoint/minimum-requirements).
97
-
-There are some [specific requirements](/microsoft-365/security/defender-endpoint/configure-server-endpoints) for some Windows Server versions.
97
+
-Some Windows Server versions have [specific requirements](/microsoft-365/security/defender-endpoint/configure-server-endpoints).
98
98
99
99
## Verify operating system support
100
100
101
-
Before deployment, verify operating system support for agents and extensions.
101
+
Before you deploy Defender for Servers, verify operating system support for agents and extensions:
102
102
103
103
- Verify that your [operating systems are supported](/microsoft-365/security/defender-endpoint/minimum-requirements) by Defender for Endpoint.
104
-
-[Check requirements](../azure-arc/servers/prerequisites.md) for Azure Arc Connect Machine agent.
105
-
- Check operating system support for the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md#supported-operating-systems) and [Azure Monitor agent](../azure-monitor/agents/agents-overview.md)
104
+
-[Check requirements](../azure-arc/servers/prerequisites.md) for the Azure Arc Connect Machine agent.
105
+
- Check operating system support for the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md#supported-operating-systems) and [Azure Monitor agent](../azure-monitor/agents/agents-overview.md).
106
106
107
107
## Review agent provisioning
108
108
@@ -113,28 +113,30 @@ When you enable Defender for Cloud plans, including Defender for Servers, you ca
113
113
- Qualys agent
114
114
- Guest configuration agent
115
115
116
-
Also, when you enable Defender for Servers Plan 1 or Plan 2, the Defender for Endpoint extension is automatically provisioned on all supported machines in the subscription.
116
+
When you enable Defender for Servers Plan 1 or Plan 2, the Defender for Endpoint extension is automatically provisioned on all supported machines in the subscription.
117
117
118
118
## Provisioning considerations
119
119
120
+
The following table describes provisioning considerations to be aware of:
121
+
120
122
Provisioning | Details
121
123
--- | ---
122
-
Defender for Endpoint sensor | If machines are running Microsoft Antimalware, also known as System Center Endpoint Protection (SCEP), the Windows extension automatically removes it from the machine.<br/><br/> If you deploy on a machine that already has the legacy Microsoft Monitoring agent (MMA) Defender for Endpoint sensor running, after the Defender for Cloud and Defender for Endpoint unified solution are successfully installed, the extension stops and it disables the legacy sensor. The change is transparent. The machine’s protection history is preserved.
124
+
Defender for Endpoint sensor | If machines are running Microsoft Antimalware, also known as System Center Endpoint Protection (SCEP), the Windows extension automatically removes it from the machine.<br/><br/> If you deploy on a machine that already has the legacy Microsoft Monitoring agent (MMA) Defender for Endpoint sensor running, after the Defender for Cloud and Defender for Endpoint unified solution is successfully installed, the extension stops and it disables the legacy sensor. The change is transparent and the machine’s protection history is preserved.
123
125
AWS and GCP machines | Configure automatic provisioning when you set up the AWS or GCP connector.
124
126
Manual installation | If you don't want Defender for Cloud to provision the Log Analytics agent and Azure Monitor agent, you can install agents manually.<br/><br/> You can connect the agent to the default Defender for Cloud workspace or to a custom workspace.<br/><br/> The workspace must have the *SecurityCenterFree* (for free foundational CSPM) or *Security* solution enabled (Defender for Servers Plan 2).
125
-
[Log Analytics agent running directly](faq-data-collection-agents.yml#what-if-a-log-analytics-agent-is-directly-installed-on-the-machine-but-not-as-an-extension--direct-agent--) | If a Windows VM has the Log Analytics agent running but not as a VM extension, Defender for Cloud installs the extension. The agent reports to the Defender for Cloud workspace and to the existing agent workspace. <br/><br/> On Linux VMs, multi-homing isn't supported. If an existing agent is, the agent isn't automatically provisioned.
127
+
[Log Analytics agent running directly](faq-data-collection-agents.yml#what-if-a-log-analytics-agent-is-directly-installed-on-the-machine-but-not-as-an-extension--direct-agent--) | If a Windows VM has the Log Analytics agent running but not as a VM extension, Defender for Cloud installs the extension. The agent reports to the Defender for Cloud workspace and to the existing agent workspace. <br/><br/> On Linux VMs, multi-homing isn't supported. If an existing agent exists, the Log Analytics agent isn't automatically provisioned.
126
128
[Operations Manager agent](faq-data-collection-agents.yml#what-if-a-system-center-operations-manager-agent-is-already-installed-on-my-vm-) | The Log Analytics agent can work side by side with the Operations Manager agent. The agents share common runtime libraries that are updated when the Log Analytics agent is deployed.
127
129
Removing the Log Analytics extension | If you remove the Log Analytics extension, Defender for Cloud can't collect security data and recommendations, and alerts will be missing. Within 24 hours, Defender for Cloud determines that the extension is missing and reinstalls it.
128
130
129
-
## When shouldn't I use auto provisioning?
131
+
## When to opt out of auto provisioning
130
132
131
-
You might want to opt out of automatic provisioning in the circumstances described in the following table:
133
+
You might want to opt out of automatic provisioning in the circumstances that are described in the following table:
132
134
133
135
Situation | Relevant agent | Details
134
136
--- | --- | ---
135
-
You have critical VMs that shouldn't have agents installed. | Log Analytics agent, Azure Monitor agent | Automatic provisioning is for an entire subscription. You can't opt out for specific machines.
136
-
You're running the System Center Operations Manager agent version 2012 with Operations Manager 2012. | Log Analytics agent | With this configuration, don't turn on automatic provisioning because management capabilities might be lost.
137
-
You want to configure a custom workspace. | Log Analytics agent, Azure Monitor agent | You have two options with a custom workspace:<br/><br/> - Opt out of automatic provisioning when you first set up Defender for Cloud. Then, configure provisioning on your custom workspace.<br/><br/>- Let automatic provisioning run to install the Log Analytics agents on machines. Set a custom workspace, and then reconfigure existing VMs with the new workspace setting.
137
+
You have critical VMs that shouldn't have agents installed | Log Analytics agent, Azure Monitor agent | Automatic provisioning is for an entire subscription. You can't opt out for specific machines.
138
+
You're running the System Center Operations Manager agent version 2012 with Operations Manager 2012 | Log Analytics agent | With this configuration, don't turn on automatic provisioning. Management capabilities might be lost.
139
+
You want to configure a custom workspace | Log Analytics agent, Azure Monitor agent | You have two options with a custom workspace:<br/><br/> - Opt out of automatic provisioning when you first set up Defender for Cloud. Then, configure provisioning on your custom workspace.<br/><br/>- Let automatic provisioning run to install the Log Analytics agents on machines. Set a custom workspace, and then reconfigure existing VMs with the new workspace setting.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/plan-defender-for-servers-data-workspace.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,21 +1,21 @@
1
1
---
2
-
title: Review data residency and workspace design for Defender for Servers
3
-
description: Plan data residency and review workspace design for Microsoft Defender for Servers.
2
+
title: Plan Defender for Servers data residency and workspaces
3
+
description: Review data residency and workspace design for Microsoft Defender for Servers.
4
4
ms.topic: conceptual
5
5
ms.author: benmansheim
6
6
author: bmansheim
7
7
ms.date: 11/06/2022
8
8
ms.custom: references_regions
9
9
---
10
-
# Review data residency and workspace design
10
+
# Plan data residency and workspaces for Defender for Servers
11
11
12
12
This article helps you understand how your data is stored in Microsoft Defender for Servers and how Log Analytics workspaces are used in Defender for Servers.
13
13
14
14
[Microsoft Defender for Cloud](defender-for-cloud-introduction.md) offers two paid plans for Defender for Servers.
15
15
16
16
## Before you begin
17
17
18
-
This article is the *second* article in the Defender for Servers planning guide series. Before you begin, review [Start planning your deployment](plan-defender-for-servers.md).
18
+
This article is the *second* article in the Defender for Servers planning guide series. Begin by [planning your deployment](plan-defender-for-servers.md).
19
19
20
20
## Understand data residency
21
21
@@ -28,6 +28,8 @@ Before you deploy Defender for Servers, it's important for you to understand dat
28
28
29
29
### Storage locations
30
30
31
+
Understand where Defender for Cloud stores data and how you can work with your data:
32
+
31
33
**Data** | **Location**
32
34
--- | ---
33
35
**Security alerts and recommendations** | - Stored in the Defender for Cloud back end and accessible via the Azure portal, Azure Resource Graph, and REST APIs.<br/><br/> - You can export the data to a Log Analytics workspace by using [continuous export](continuous-export.md).
@@ -37,6 +39,8 @@ Before you deploy Defender for Servers, it's important for you to understand dat
37
39
38
40
In Defender for Cloud, you can store server data in the default Log Analytics workspace for your Defender for Cloud deployment or in a custom workspace.
39
41
42
+
Here's more information:
43
+
40
44
- By default, when you first create your Defender for Cloud deployment, a new resource group and a default workspace are created in the subscription region for each subscription that has Defender for Cloud enabled.
41
45
- When you use only free foundational cloud security posture management (CSPM), Defender for Cloud sets up the default workspace with the *SecurityCenterFree* solution enabled.
42
46
- When you turn on a Defender for Cloud plan (including Defender for Servers), the plan is enabled for the default workspace, and the *Security* solution is enabled.
@@ -59,7 +63,7 @@ You can store your server information in the default workspace or you can use a
59
63
60
64
- You must enable the Defender for Servers plan in the custom workspace.
61
65
- The custom workspace must be associated with the Azure subscription in which Defender for Cloud is enabled.
62
-
- You must have read permissions for the workspace at a minimum.
66
+
- You must have at least read permissions for the workspace.
63
67
- If the *Security & Audit* solution is installed in a workspace, Defender for Cloud uses the existing solution.
64
68
65
69
Learn more about [Log Analytics workspace design strategy and criteria](../azure-monitor/logs/workspace-design.md).
0 commit comments