Skip to content

Commit 68f2036

Browse files
committed
final edits
1 parent 82dd3a1 commit 68f2036

6 files changed

+64
-54
lines changed

articles/defender-for-cloud/plan-defender-for-servers-agents.md

Lines changed: 31 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -14,24 +14,20 @@ This article helps you plan your agents, extensions, and Azure Arc resources for
1414

1515
## Before you begin
1616

17-
This article is the *fifth* article in the Defender for Servers planning guide series. Before you begin, review the earlier articles:
17+
This article is the *fifth* article in the Defender for Servers planning guide. Before you begin, review the earlier articles:
1818

1919
1. [Start planning your deployment](plan-defender-for-servers.md)
2020
1. [Understand where your data is stored and Log Analytics workspace requirements](plan-defender-for-servers-data-workspace.md)
2121
1. [Review Defender for Servers access roles](plan-defender-for-servers-roles.md)
2222
1. [Select a Defender for Servers plan](plan-defender-for-servers-select-plan.md)
2323

24-
## Review agents and extensions
25-
26-
Defender for Servers plans use agents and extensions.
27-
2824
## Review Azure Arc requirements
2925

3026
Azure Arc helps you onboard Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises machines to Azure. Defender for Cloud uses Azure Arc to protect non-Azure machines.
3127

3228
### Foundational cloud security posture management
3329

34-
For free foundational cloud security posture management (CSPM) features, Azure Arc running on AWS or GCP machines isn't required. But for full functionality, we recommend that you do have Azure Arc running on AWS or GCP machines.
30+
For free foundational cloud security posture management (CSPM) features, Azure Arc running on AWS or GCP machines isn't required. For full functionality, we recommend that you *do* have Azure Arc running on AWS or GCP machines.
3531

3632
Azure Arc onboarding is required for on-premises machines.
3733

@@ -52,31 +48,35 @@ To plan for Azure Arc deployment:
5248
- [Network and internet access ](../azure-arc/servers/network-requirements.md) for the agent.
5349
- [Connection options](../azure-arc/servers/deployment-options.md) for the agent.
5450

55-
## The Log Analytics agent and the Azure Monitor agent
51+
## Log Analytics agent and Azure Monitor agent
5652

57-
Defender for Cloud uses the Log Analytics agent and Azure Monitor agent to collect information from compute resources. Then, it sends the data to a Log Analytics workspace for more analysis. Review the [differences and recommendations for both agents](../azure-monitor/agents/agents-overview.md).
53+
Defender for Cloud uses the Log Analytics agent and the Azure Monitor agent to collect information from compute resources. Then, it sends the data to a Log Analytics workspace for more analysis. Review the [differences and recommendations for both agents](../azure-monitor/agents/agents-overview.md).
5854

5955
The following table describes the agents that are used in Defender for Servers:
6056

6157
Feature | Log Analytics agent | Azure Monitor agent
62-
--- | --- | ---
58+
--- | --- | ---
6359
Foundational CSPM recommendations (free) that depend on the agent: [OS baseline recommendation](apply-security-baseline.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent.":::| :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::<br/><br/> With the Azure Monitor agent, the Azure Policy [guest configuration extension](../virtual-machines/extensions/guest-configuration.md) is used.
6460
Foundational CSPM: [System updates recommendations](recommendations-reference.md#compute-recommendations) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent"::: | Not yet available.
65-
Foundational CSPM: [Antimalware/Endpoint protection recommendations](endpoint-protection-recommendations-technical.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
66-
Attack detection at the OS level and network layer, including fileless attack detection).<br/><br/> Plan 1 relies on Defender for Endpoint capabilities for attack detection. | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2| :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2
61+
Foundational CSPM: [Antimalware/endpoint protection recommendations](endpoint-protection-recommendations-technical.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
62+
Attack detection at the OS level and network layer, including fileless attack detection<br/><br/> Plan 1 relies on Defender for Endpoint capabilities for attack detection. | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2| :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent. Plan 1 relies on Defender for Endpoint.":::<br/><br/> Plan 2
6763
File integrity monitoring (Plan 2 only) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
6864
[Adaptive application controls](adaptive-application-controls.md) (Plan 2 only) | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Log Analytics agent."::: | :::image type="icon" source="./media/icons/yes-icon.png" alt-text="Icon that shows it's supported by the Azure Monitor agent.":::
6965

7066
## Qualys extension
7167

7268
The Qualys extension is available in Defender for Servers Plan 2. The extension is deployed if you want to use Qualys for vulnerability assessment.
7369

70+
Here's more information:
71+
7472
- The Qualys extension sends metadata for analysis to one of two Qualys datacenter regions, depending on your Azure region.
75-
- If you're in a European Azure geography, data is processed in the Qualys European datacenter.
76-
- For other regions, data is processed in the US datacenter.
73+
74+
- If you're in a European Azure geography, data is processed in the Qualys European datacenter.
75+
- For other regions, data is processed in the US datacenter.
76+
7777
- To use Qualys on a machine, the extension must be installed and the machine must be able to communicate with the relevant network endpoint:
78-
- Europe datacenter: `https://qagpublic.qg2.apps.qualys.eu`
79-
- US datacenter: `https://qagpublic.qg3.apps.qualys.com`
78+
- Europe datacenter: `https://qagpublic.qg2.apps.qualys.eu`
79+
- US datacenter: `https://qagpublic.qg3.apps.qualys.com`
8080

8181
## Guest configuration extension
8282

@@ -91,18 +91,18 @@ Learn more about the Azure Policy [guest configuration extension](../virtual-mac
9191

9292
When you enable Defender for Servers, Defender for Cloud automatically deploys a Defender for Endpoint extension. The extension is a management interface that runs a script inside the operating system to deploy and integrate the Defender for Endpoint sensor on the machine.
9393

94-
- Windows machines extension: MDE.Windows
95-
- Linux machines extension: MDE.Linux
94+
- Windows machines extension: `MDE.Windows`
95+
- Linux machines extension: `MDE.Linux`
9696
- Machines must meet [minimum requirements](/microsoft-365/security/defender-endpoint/minimum-requirements).
97-
- There are some [specific requirements](/microsoft-365/security/defender-endpoint/configure-server-endpoints) for some Windows Server versions.
97+
- Some Windows Server versions have [specific requirements](/microsoft-365/security/defender-endpoint/configure-server-endpoints).
9898

9999
## Verify operating system support
100100

101-
Before deployment, verify operating system support for agents and extensions.
101+
Before you deploy Defender for Servers, verify operating system support for agents and extensions:
102102

103103
- Verify that your [operating systems are supported](/microsoft-365/security/defender-endpoint/minimum-requirements) by Defender for Endpoint.
104-
- [Check requirements](../azure-arc/servers/prerequisites.md) for Azure Arc Connect Machine agent.
105-
- Check operating system support for the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md#supported-operating-systems) and [Azure Monitor agent](../azure-monitor/agents/agents-overview.md)
104+
- [Check requirements](../azure-arc/servers/prerequisites.md) for the Azure Arc Connect Machine agent.
105+
- Check operating system support for the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md#supported-operating-systems) and [Azure Monitor agent](../azure-monitor/agents/agents-overview.md).
106106

107107
## Review agent provisioning
108108

@@ -113,28 +113,30 @@ When you enable Defender for Cloud plans, including Defender for Servers, you ca
113113
- Qualys agent
114114
- Guest configuration agent
115115

116-
Also, when you enable Defender for Servers Plan 1 or Plan 2, the Defender for Endpoint extension is automatically provisioned on all supported machines in the subscription.
116+
When you enable Defender for Servers Plan 1 or Plan 2, the Defender for Endpoint extension is automatically provisioned on all supported machines in the subscription.
117117

118118
## Provisioning considerations
119119

120+
The following table describes provisioning considerations to be aware of:
121+
120122
Provisioning | Details
121123
--- | ---
122-
Defender for Endpoint sensor | If machines are running Microsoft Antimalware, also known as System Center Endpoint Protection (SCEP), the Windows extension automatically removes it from the machine.<br/><br/> If you deploy on a machine that already has the legacy Microsoft Monitoring agent (MMA) Defender for Endpoint sensor running, after the Defender for Cloud and Defender for Endpoint unified solution are successfully installed, the extension stops and it disables the legacy sensor. The change is transparent. The machine’s protection history is preserved.
124+
Defender for Endpoint sensor | If machines are running Microsoft Antimalware, also known as System Center Endpoint Protection (SCEP), the Windows extension automatically removes it from the machine.<br/><br/> If you deploy on a machine that already has the legacy Microsoft Monitoring agent (MMA) Defender for Endpoint sensor running, after the Defender for Cloud and Defender for Endpoint unified solution is successfully installed, the extension stops and it disables the legacy sensor. The change is transparent and the machine’s protection history is preserved.
123125
AWS and GCP machines | Configure automatic provisioning when you set up the AWS or GCP connector.
124126
Manual installation | If you don't want Defender for Cloud to provision the Log Analytics agent and Azure Monitor agent, you can install agents manually.<br/><br/> You can connect the agent to the default Defender for Cloud workspace or to a custom workspace.<br/><br/> The workspace must have the *SecurityCenterFree* (for free foundational CSPM) or *Security* solution enabled (Defender for Servers Plan 2).
125-
[Log Analytics agent running directly](faq-data-collection-agents.yml#what-if-a-log-analytics-agent-is-directly-installed-on-the-machine-but-not-as-an-extension--direct-agent--) | If a Windows VM has the Log Analytics agent running but not as a VM extension, Defender for Cloud installs the extension. The agent reports to the Defender for Cloud workspace and to the existing agent workspace. <br/><br/> On Linux VMs, multi-homing isn't supported. If an existing agent is, the agent isn't automatically provisioned.
127+
[Log Analytics agent running directly](faq-data-collection-agents.yml#what-if-a-log-analytics-agent-is-directly-installed-on-the-machine-but-not-as-an-extension--direct-agent--) | If a Windows VM has the Log Analytics agent running but not as a VM extension, Defender for Cloud installs the extension. The agent reports to the Defender for Cloud workspace and to the existing agent workspace. <br/><br/> On Linux VMs, multi-homing isn't supported. If an existing agent exists, the Log Analytics agent isn't automatically provisioned.
126128
[Operations Manager agent](faq-data-collection-agents.yml#what-if-a-system-center-operations-manager-agent-is-already-installed-on-my-vm-) | The Log Analytics agent can work side by side with the Operations Manager agent. The agents share common runtime libraries that are updated when the Log Analytics agent is deployed.
127129
Removing the Log Analytics extension | If you remove the Log Analytics extension, Defender for Cloud can't collect security data and recommendations, and alerts will be missing. Within 24 hours, Defender for Cloud determines that the extension is missing and reinstalls it.
128130

129-
## When shouldn't I use auto provisioning?
131+
## When to opt out of auto provisioning
130132

131-
You might want to opt out of automatic provisioning in the circumstances described in the following table:
133+
You might want to opt out of automatic provisioning in the circumstances that are described in the following table:
132134

133135
Situation | Relevant agent | Details
134136
--- | --- | ---
135-
You have critical VMs that shouldn't have agents installed. | Log Analytics agent, Azure Monitor agent | Automatic provisioning is for an entire subscription. You can't opt out for specific machines.
136-
You're running the System Center Operations Manager agent version 2012 with Operations Manager 2012. | Log Analytics agent | With this configuration, don't turn on automatic provisioning because management capabilities might be lost.
137-
You want to configure a custom workspace. | Log Analytics agent, Azure Monitor agent | You have two options with a custom workspace:<br/><br/> - Opt out of automatic provisioning when you first set up Defender for Cloud. Then, configure provisioning on your custom workspace.<br/><br/>- Let automatic provisioning run to install the Log Analytics agents on machines. Set a custom workspace, and then reconfigure existing VMs with the new workspace setting.
137+
You have critical VMs that shouldn't have agents installed | Log Analytics agent, Azure Monitor agent | Automatic provisioning is for an entire subscription. You can't opt out for specific machines.
138+
You're running the System Center Operations Manager agent version 2012 with Operations Manager 2012 | Log Analytics agent | With this configuration, don't turn on automatic provisioning. Management capabilities might be lost.
139+
You want to configure a custom workspace | Log Analytics agent, Azure Monitor agent | You have two options with a custom workspace:<br/><br/> - Opt out of automatic provisioning when you first set up Defender for Cloud. Then, configure provisioning on your custom workspace.<br/><br/>- Let automatic provisioning run to install the Log Analytics agents on machines. Set a custom workspace, and then reconfigure existing VMs with the new workspace setting.
138140

139141
## Next steps
140142

articles/defender-for-cloud/plan-defender-for-servers-data-workspace.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
---
2-
title: Review data residency and workspace design for Defender for Servers
3-
description: Plan data residency and review workspace design for Microsoft Defender for Servers.
2+
title: Plan Defender for Servers data residency and workspaces
3+
description: Review data residency and workspace design for Microsoft Defender for Servers.
44
ms.topic: conceptual
55
ms.author: benmansheim
66
author: bmansheim
77
ms.date: 11/06/2022
88
ms.custom: references_regions
99
---
10-
# Review data residency and workspace design
10+
# Plan data residency and workspaces for Defender for Servers
1111

1212
This article helps you understand how your data is stored in Microsoft Defender for Servers and how Log Analytics workspaces are used in Defender for Servers.
1313

1414
[Microsoft Defender for Cloud](defender-for-cloud-introduction.md) offers two paid plans for Defender for Servers.
1515

1616
## Before you begin
1717

18-
This article is the *second* article in the Defender for Servers planning guide series. Before you begin, review [Start planning your deployment](plan-defender-for-servers.md).
18+
This article is the *second* article in the Defender for Servers planning guide series. Begin by [planning your deployment](plan-defender-for-servers.md).
1919

2020
## Understand data residency
2121

@@ -28,6 +28,8 @@ Before you deploy Defender for Servers, it's important for you to understand dat
2828

2929
### Storage locations
3030

31+
Understand where Defender for Cloud stores data and how you can work with your data:
32+
3133
**Data** | **Location**
3234
--- | ---
3335
**Security alerts and recommendations** | - Stored in the Defender for Cloud back end and accessible via the Azure portal, Azure Resource Graph, and REST APIs.<br/><br/> - You can export the data to a Log Analytics workspace by using [continuous export](continuous-export.md).
@@ -37,6 +39,8 @@ Before you deploy Defender for Servers, it's important for you to understand dat
3739

3840
In Defender for Cloud, you can store server data in the default Log Analytics workspace for your Defender for Cloud deployment or in a custom workspace.
3941

42+
Here's more information:
43+
4044
- By default, when you first create your Defender for Cloud deployment, a new resource group and a default workspace are created in the subscription region for each subscription that has Defender for Cloud enabled.
4145
- When you use only free foundational cloud security posture management (CSPM), Defender for Cloud sets up the default workspace with the *SecurityCenterFree* solution enabled.
4246
- When you turn on a Defender for Cloud plan (including Defender for Servers), the plan is enabled for the default workspace, and the *Security* solution is enabled.
@@ -59,7 +63,7 @@ You can store your server information in the default workspace or you can use a
5963

6064
- You must enable the Defender for Servers plan in the custom workspace.
6165
- The custom workspace must be associated with the Azure subscription in which Defender for Cloud is enabled.
62-
- You must have read permissions for the workspace at a minimum.
66+
- You must have at least read permissions for the workspace.
6367
- If the *Security & Audit* solution is installed in a workspace, Defender for Cloud uses the existing solution.
6468

6569
Learn more about [Log Analytics workspace design strategy and criteria](../azure-monitor/logs/workspace-design.md).

0 commit comments

Comments
 (0)