Skip to content

Commit 7cb913d

Browse files
committed
Changed files are requested by reviewer
1 parent 3ddeda4 commit 7cb913d

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/security-center/security-center-faq.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Security Center assesses the configuration of your resources to identify securit
4949
See [Permissions in Azure Security Center](security-center-permissions.md) to learn more about roles and allowed actions in Security Center.
5050

5151
## Data collection, agents, and workspaces
52-
Security Center collects data from your Azure virtual machines (VMs), Virtual machine scale sets (VMSS), IaaS containers, and non-Azure computers (including on-premises) to monitor for security vulnerabilities and threats. Data is collected using the Microsoft Monitoring Agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis.
52+
Security Center collects data from your Azure virtual machines (VMs), Virtual machine scale sets, IaaS containers, and non-Azure computers (including on-premises) to monitor for security vulnerabilities and threats. Data is collected using the Microsoft Monitoring Agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis.
5353

5454
### Am I billed for Azure Monitor logs on the workspaces created by Security Center?
5555
No. Workspaces created by Security Center, while configured for Azure Monitor logs per node billing, do not incur Azure Monitor logs charges. Security Center billing is always based on your Security Center security policy and the solutions installed on a workspace:
@@ -129,8 +129,8 @@ For existing machines on subscriptions onboarded to Security Center before 2019-
129129

130130
For more information, see the next section [What happens if a System Center Operations Manager or OMS direct agent is already installed on my VM?](#scomomsinstalled)
131131

132-
### What happens if a System Center Operations Manager (SCOM) agent is already installed on my VM?<a name="scomomsinstalled"></a>
133-
Security center will install the Microsoft Monitoring Agent extension side-by-side to the existing System Center Operations Manager agent. The existing SCOM agent will continue to report to the System Center Operations Manager server normally. Please note that the System Center Operations Manager agent and Microsoft Monitoring Agent share common run-time libraries, which will be updated to the latest version during this process. Note - If System Center Operations Manager agent version 2012 is installed, do not turn automatic provisioning On (manageability capabilities can be lost when the System Center Operations Manager server is also version 2012).
132+
### What happens if a System Center Operations Manager agent is already installed on my VM?<a name="scomomsinstalled"></a>
133+
Security center will install the Microsoft Monitoring Agent extension side by side to the existing System Center Operations Manager agent. The existing agent will continue to report to the System Center Operations Manager server normally. Please note that the Operations Manager agent and Microsoft Monitoring Agent share common run-time libraries, which will be updated to the latest version during this process. Note - If version 2012 of the Operations Manager agent is installed, do not turn automatic provisioning On (manageability capabilities can be lost when the Operations Manager server is also version 2012).
134134

135135
### What is the impact of removing these extensions?
136136
If you remove the Microsoft Monitoring Extension, Security Center is not able to collect security data from the VM and some security recommendations and alerts are unavailable. Within 24 hours, Security Center determines that the VM is missing the extension and reinstalls the extension.
@@ -154,8 +154,8 @@ You can turn off automatic provisioning for your subscriptions in the security p
154154
155155
You may want to opt out of automatic provisioning if the following applies to you:
156156

157-
- Automatic agent installation by Security Center applies to the entire subscription. You cannot apply automatic installation to a subset of VMs. If there are critical VMs that cannot be installed with the Microsoft Monitoring Agent, then you should opt out of automatic provisioning.
158-
- Installation of the Microsoft Monitoring Agent (MMA) extension updates the agent’s version. This applies to a direct agent and a SCOM agent (in the latter, the SCOM and MMA share common runtime libraries - which will be updated in the process). If the installed SCOM agent is version 2012 and is upgraded, manageability capabilities can be lost when the SCOM server is also version 2012. Consider opting out of automatic provisioning if the installed SCOM agent is version 2012.
157+
- Automatic agent installation by Security Center applies to the entire subscription. You cannot apply automatic installation to a subset of VMs. If there are critical VMs that cannot be installed with the Microsoft Monitoring Agent, then you should opt out of automatic provisioning.
158+
- Installation of the Microsoft Monitoring Agent (MMA) extension updates the agent’s version. This applies to a direct agent and a System Center Operations Manager agent (in the latter, the Operations Manager and MMA share common runtime libraries - which will be updated in the process). If the installed Operations Manager agent is version 2012 and is upgraded, manageability capabilities can be lost when the Operations Manager server is also version 2012. Consider opting out of automatic provisioning if the installed Operations Manager agent is version 2012.
159159
- If you have a custom workspace external to the subscription (a centralized workspace) then you should opt out of automatic provisioning. You can manually install the Microsoft Monitoring Agent extension and connect it your workspace without Security Center overriding the connection.
160160
- If you want to avoid creation of multiple workspaces per subscription and you have your own custom workspace within the subscription, then you have two options:
161161

@@ -292,7 +292,7 @@ Security Center is an Azure service that continuously monitors the customer’s
292292
Azure Security Center monitors the following Azure resources:
293293

294294
* Virtual machines (VMs) (including [Cloud Services](../cloud-services/cloud-services-choose-me.md))
295-
* Virtual machine scale sets (VMSSs)
295+
* Virtual machine scale sets
296296
* Azure Virtual Networks
297297
* Azure SQL service
298298
* Azure Storage account

articles/security-center/security-center-info-protection-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.author: memildin
1919

2020
A SQL information protection policy can be defined and customized for your entire Azure tenant, in Azure Security Center.
2121

22-
Information protection is an advanced security capability for discovering, classifying, labeling and protecting sensitive data in your Azure data resources. Discovering and classifying your most sensitive data (business, financial, healthcare, personally identifiable information, etc.) can play a pivotal role in your organizational information protection stature. It can serve as infrastructure for:
22+
Information protection is an advanced security capability for discovering, classifying, labeling and protecting sensitive data in your Azure data resources. Discovering and classifying your most sensitive data (business, financial, healthcare, personal data, etc.) can play a pivotal role in your organizational information protection stature. It can serve as infrastructure for:
2323
- Helping meet data privacy standards and regulatory compliance requirements
2424
- Various security scenarios, such as monitoring (auditing) and alerting on anomalous access to sensitive data
2525
- Controlling access to and hardening the security of data stores containing highly sensitive data

0 commit comments

Comments
 (0)