Skip to content

Commit 6a51c3e

Browse files
authored
Merge pull request #89791 from memildin/asc-melvyn-test
Minor grammatical fixes
2 parents 44a5024 + 14e7cbe commit 6a51c3e

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

articles/security-center/security-center-partner-integration.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -24,14 +24,14 @@ This document helps you to manage security solutions already connected to Azure
2424
## Integrated Azure security solutions
2525
Security Center makes it easy to enable integrated security solutions in Azure. Benefits include:
2626

27-
- **Simplified deployment**: Security Center offers streamlined provisioning of integrated partner solutions. For solutions like antimalware and vulnerability assessment, Security Center can provision the needed agent on your virtual machines, and for firewall appliances, Security Center can take care of much of the network configuration required.
27+
- **Simplified deployment**: Security Center offers streamlined provisioning of integrated partner solutions. For solutions like antimalware and vulnerability assessment, Security Center can provision the agent on your virtual machines. For firewall appliances, Security Center can take care of much of the network configuration required.
2828
- **Integrated detections**: Security events from partner solutions are automatically collected, aggregated, and displayed as part of Security Center alerts and incidents. These events also are fused with detections from other sources to provide advanced threat-detection capabilities.
2929
- **Unified health monitoring and management**: Customers can use integrated health events to monitor all partner solutions at a glance. Basic management is available, with easy access to advanced setup by using the partner solution.
3030

31-
Currently, integrated security solutions include Vulnerability assessment by [Qualys](https://www.qualys.com/public-cloud/#azure) and [Rapid7](https://www.rapid7.com/products/insightvm/) and Microsoft Application Gateway Web application firewall.
31+
Currently, integrated security solutions include vulnerability assessment by [Qualys](https://www.qualys.com/public-cloud/#azure) and [Rapid7](https://www.rapid7.com/products/insightvm/) and Microsoft Application Gateway Web application firewall.
3232

3333
> [!NOTE]
34-
> Security Center does not install the Microsoft Monitoring Agent on partner virtual appliances because most security vendors prohibit external agents running on their appliance.
34+
> Security Center does not install the Microsoft Monitoring Agent on partner virtual appliances because most security vendors prohibit external agents running on their appliances.
3535
>
3636
>
3737
@@ -50,45 +50,45 @@ Azure security solutions that are deployed from Security Center are automaticall
5050

5151
![Security Center Overview](./media/security-center-partner-integration/overview.png)
5252

53-
Under **Security solutions**, you can view information about the health of integrated Azure security solutions and perform basic management tasks.
53+
In **Security solutions**, you can see the health of integrated Azure security solutions and run basic management tasks.
5454

5555
### Connected solutions
5656

57-
The **Connected solutions** section includes security solutions that are currently connected to Security Center and information about the health status of each solution.
57+
The **Connected solutions** section includes security solutions that are currently connected to Security Center. It also shows the health status of each solution.
5858

5959
![Connected solutions](./media/security-center-partner-integration/security-center-partner-integration-fig4.png)
6060

6161
The status of a partner solution can be:
6262

63-
* Healthy (green) - there is no health issue.
64-
* Unhealthy (red) - there is a health issue that requires immediate attention.
63+
* Healthy (green) - no health issues.
64+
* Unhealthy (red) - there's a health issue that requires immediate attention.
6565
* Health issues (orange) - the solution has stopped reporting its health.
66-
* Not reported (gray) - the solution has not reported anything yet, a solution's status may be unreported if it has recently been connected and is still deploying, or no health data is available.
66+
* Not reported (gray) - the solution hasn't reported anything yet and no health data is available. A solution's status may be unreported if it was connected recently and is still deploying.
6767

6868
> [!NOTE]
69-
> If health status data is not available, Security Center shows the date and time of the last event received to indicate whether the solution is reporting or not. If no health data is available and no alerts are received within the last 14 days, Security Center indicates that the solution is unhealthy or not reporting.
69+
> If health status data is not available, Security Center shows the date and time of the last event received to indicate whether the solution is reporting or not. If no health data is available and no alerts were received within the last 14 days, Security Center indicates that the solution is unhealthy or not reporting.
7070
>
7171
>
7272
73-
1. Select **VIEW** for additional information and options, which includes:
73+
1. Select **VIEW** for additional information and options such as:
7474

7575
- **Solution console**. Opens the management experience for this solution.
76-
- **Link VM**. Opens the Link Applications blade. Here you can connect resources to the partner solution.
76+
- **Link VM**. Opens the Link Applications page. Here you can connect resources to the partner solution.
7777
- **Delete solution**.
7878
- **Configure**.
7979

8080
![Partner solution detail](./media/security-center-partner-solutions/partner-solutions-detail.png)
8181

8282
### Discovered solutions
8383

84-
Security Center automatically discovers security solutions running in Azure but are not connected to Security Center and displays the solutions in the **Discovered solutions** section. This includes Azure solutions, such as [Azure AD Identity Protection](https://docs.microsoft.com/azure/active-directory/active-directory-identityprotection), as well as partner solutions.
84+
Security Center automatically discovers security solutions running in Azure but not connected to Security Center and displays the solutions in the **Discovered solutions** section. These solutions include Azure solutions, like [Azure AD Identity Protection](https://docs.microsoft.com/azure/active-directory/active-directory-identityprotection), and partner solutions.
8585

8686
> [!NOTE]
87-
> The Standard tier of Security Center is required at the subscription level for the discovered solutions feature. See [Pricing](security-center-pricing.md) to learn more about Security's pricing tiers.
87+
> The Standard tier of Security Center is required at the subscription level for the discovered solutions feature. See [Pricing](security-center-pricing.md) to learn more about the pricing tiers.
8888
>
8989
>
9090
91-
Select **CONNECT** under a solution to integrate with Security Center and be notified on security alerts.
91+
Select **CONNECT** under a solution to integrate with Security Center and be notified of security alerts.
9292

9393
![Discovered solutions](./media/security-center-partner-integration/security-center-partner-integration-fig5.png)
9494

@@ -100,39 +100,39 @@ The **Add data sources** section includes other available data sources that can
100100

101101
## Exporting data to a SIEM
102102

103-
Processed events produced by Azure Security Center are published to the Azure [Activity log](../monitoring-and-diagnostics/monitoring-overview-activity-logs.md), one of the log types available through Azure Monitor. Azure Monitor offers a consolidated pipeline for routing any of your monitoring data into a SIEM tool. This is done by streaming that data to an Event Hub where it can then be pulled into a partner tool.
103+
You can configure your SIEMs or other monitoring tools to receive Azure Security Center events.
104104

105-
This pipe uses the [Azure Monitoring single pipeline](../azure-monitor/platform/stream-monitoring-data-event-hubs.md) for getting access to the monitoring data from your Azure environment. This enables you to easily set up SIEMs and monitoring tools to consume the data.
105+
All events from Azure Security Center are published to Azure Monitor's Azure [Activity log](../monitoring-and-diagnostics/monitoring-overview-activity-logs.md). Azure Monitor uses [a consolidated pipeline](../azure-monitor/platform/stream-monitoring-data-event-hubs.md) to stream the data to an Event Hub where it can then be pulled into your monitoring tool.
106106

107107
The next sections describe how you can configure data to be streamed to an event hub. The steps assume that you already have Azure Security Center configured in your Azure subscription.
108108

109-
High-level overview
109+
### High-level overview
110110

111111
![High-Level overview](media/security-center-export-data-to-siem/overview.png)
112112

113113
### What is the Azure security data exposed to SIEM?
114114

115-
In this version we expose the [security alerts.](../security-center/security-center-managing-and-responding-alerts.md) In upcoming releases, we will enrich the data set with security recommendations.
115+
In this version, we expose the [security alerts.](../security-center/security-center-managing-and-responding-alerts.md) In upcoming releases, we will enrich the data set with security recommendations.
116116

117-
### How to setup the pipeline
117+
### How to set up the pipeline
118118

119119
#### Create an Event Hub
120120

121-
Before you begin, you need to [create an Event Hubs namespace](../event-hubs/event-hubs-create.md). This namespace and Event Hub is the destination for all your monitoring data.
121+
Before you begin, [create an Event Hubs namespace](../event-hubs/event-hubs-create.md) - the destination for all your monitoring data.
122122

123123
#### Stream the Azure Activity Log to Event Hubs
124124

125-
Please refer to the following article [stream activity log to Event Hubs](../azure-monitor/platform/activity-logs-stream-event-hubs.md)
125+
See the following article [stream activity log to Event Hubs](../azure-monitor/platform/activity-logs-stream-event-hubs.md)
126126

127127
#### Install a partner SIEM connector
128128

129129
Routing your monitoring data to an Event Hub with Azure Monitor enables you to easily integrate with partner SIEM and monitoring tools.
130130

131-
Refer to the following link to see the list of [supported SIEMs](../azure-monitor/platform/resource-logs-stream-event-hubs.md#what-you-can-do-with-resource-logs-sent-to-an-event-hub)
131+
See the following article for the list of [supported SIEMs](../azure-monitor/platform/resource-logs-stream-event-hubs.md#what-you-can-do-with-resource-logs-sent-to-an-event-hub)
132132

133133
### Example for Querying data
134134

135-
Here is a couple of Splunk queries that you can use to pull alert data:
135+
Here are some Splunk queries you can use to pull alert data:
136136

137137
| **Description of Query** | **Query** |
138138
|----|----|

0 commit comments

Comments
 (0)