You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/activity-log.md
+23-22Lines changed: 23 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ For some events, you can view the Change history, which shows what changes happe
43
43
44
44

45
45
46
-
If there are any associated changes with the event, you'll see a list of changes that you can select. This opens up the **Change history (Preview)** page. On this page you see the changes to the resource. In the following example, you can see not only that the VM changed sizes, but what the previous VM size was before the change and what it was changed to. To learn more about change history, see [Get resource changes](../../governance/resource-graph/how-to/get-resource-changes.md).
46
+
If there are any associated changes with the event, you'll see a list of changes that you can select. This opens up the **Change history (Preview)** page. On this page, you see the changes to the resource. In the following example, you can see not only that the VM changed sizes, but what the previous VM size was before the change and what it was changed to. To learn more about change history, see [Get resource changes](../../governance/resource-graph/how-to/get-resource-changes.md).
47
47
48
48

49
49
@@ -65,7 +65,8 @@ You can also access Activity log events using the following methods.
65
65
- Use log alerts with Activity entries allowing for more complex alerting logic.
66
66
- Store Activity log entries for longer than the Activity Log retention period.
67
67
- No data ingestion charges for Activity log data stored in a Log Analytics workspace.
68
-
- No data retention charges until after the Activity Log retention period expires for given entires.
68
+
- No data retention charges for the first 90 days for Activity log data stored in a Log Analytics workspace.
69
+
69
70
70
71
[Create a diagnostic setting](./diagnostic-settings.md) to send the Activity log to a Log Analytics workspace. You can send the Activity log from any single subscription to up to five workspaces.
71
72
@@ -87,7 +88,7 @@ AzureActivity
87
88
88
89
89
90
## Send to Azure Event Hubs
90
-
Send the Activity Log to Azure Event Hubs to send entries outside of Azure, for example to a third-party SIEM or other log analytics solutions. Activity log events from event hubs are consumed in JSON format with a `records` element containing the records in each payload. The schema depends on the category and is described in [Schema from storage account and event hubs](activity-log-schema.md).
91
+
Send the Activity Log to Azure Event Hubs to send entries outside of Azure, for example to a third-party SIEM or other log analytics solutions. Activity log events from Event Hubs are consumed in JSON format with a `records` element containing the records in each payload. The schema depends on the category and is described in [Schema from Storage Account and Event Hubs](activity-log-schema.md).
91
92
92
93
Following is sample output data from Event Hubs for an Activity log:
93
94
@@ -147,11 +148,10 @@ Following is sample output data from Event Hubs for an Activity log:
147
148
}
148
149
```
149
150
150
-
151
151
## Send to Azure storage
152
-
Send the Activity Log to an Azure Storage account for audit, static analysis, or backup if you want to retain your log data longer than the Activity Log retention period. There is no need to set up Azure storage unless you need to retain the entries for one of these reasons.
152
+
Send the Activity Log to an Azure Storage Account if you want to retain your log data longer than 90 days for audit, static analysis, or backup. If you only need to retain your events for 90 days or less you do not need to set up archival to a Storage Account, since Activity Log events are retained in the Azure platform for 90 days.
153
153
154
-
When you send the Activity log to Azure, a storage container is created in the storage account as soon as an event occurs. The blobs in the container use the following naming convention:
154
+
When you send the Activity log to Azure, a storage container is created in the Storage Account as soon as an event occurs. The blobs in the container use the following naming convention:
Each PT1H.json blob contains a JSON blob of events that occurred within the hour specified in the blob URL (for example, h=12). During the present hour, events are appended to the PT1H.json file as they occur. The minute value (m=00) is always 00, since resource log events are broken into individual blobs per hour.
167
167
168
-
Each event is stored in the PT1H.json file with the following format that uses a common toplevel schema but is otherwise unique for each category as described in [Activity log schema](activity-log-schema.md).
168
+
Each event is stored in the PT1H.json file with the following format that uses a common top-level schema but is otherwise unique for each category as described in [Activity log schema](activity-log-schema.md).
169
169
170
170
```JSON
171
171
{ "time": "2020-06-12T13:07:46.766Z", "resourceId": "/SUBSCRIPTIONS/00000000-0000-0000-0000-000000000000/RESOURCEGROUPS/MY-RESOURCE-GROUP/PROVIDERS/MICROSOFT.COMPUTE/VIRTUALMACHINES/MV-VM-01", "correlationId": "0f0cb6b4-804b-4129-b893-70aeeb63997e", "operationName": "Microsoft.Resourcehealth/healthevent/Updated/action", "level": "Information", "resultType": "Updated", "category": "ResourceHealth", "properties": {"eventCategory":"ResourceHealth","eventProperties":{"title":"This virtual machine is starting as requested by an authorized user or process. It will be online shortly.","details":"VirtualMachineStartInitiatedByControlPlane","currentHealthStatus":"Unknown","previousHealthStatus":"Unknown","type":"Downtime","cause":"UserInitiated"}}}
172
172
```
173
173
174
174
175
175
## Legacy collection methods
176
-
This section describes legacy methods for collecting the Activity log that were used prior to diagnostic settings. If you're using these methods, you should consider transitioning to diagnostic settings which provide better functionality and consistency with resource logs.
176
+
This section describes legacy methods for collecting the Activity log that were used prior to diagnostic settings. If you're using these methods, you should consider transitioning to diagnostic settings that provide better functionality and consistency with resource logs.
177
177
178
178
### Log profiles
179
-
Log profiles are the legacy method for sending the Activity log to Azure storage or event hubs. Use the following procedure to continue working with a log profile or to disable it in preparation for migrating to a diagnostic setting.
179
+
Log profiles are the legacy method for sending the Activity log to Azure storage or Event Hubs. Use the following procedure to continue working with a log profile or to disable it in preparation for migrating to a diagnostic setting.
180
180
181
181
1. From the **Azure Monitor** menu in the Azure portal, select **Activity log**.
182
182
3. Click **Diagnostic settings**.
@@ -188,7 +188,6 @@ Log profiles are the legacy method for sending the Activity log to Azure storage
If a log profile already exists, you first need to remove the existing log profile and then create a new one.
@@ -212,27 +211,27 @@ If a log profile already exists, you first need to remove the existing log profi
212
211
| --- | --- | --- |
213
212
| Name |Yes |Name of your log profile. |
214
213
| StorageAccountId |No |Resource ID of the Storage Account where the Activity Log should be saved. |
215
-
| serviceBusRuleId |No |Service Bus Rule ID for the Service Bus namespace you would like to have event hubs created in. This is a string with the format: `{service bus resource ID}/authorizationrules/{key name}`. |
214
+
| serviceBusRuleId |No |Service Bus Rule ID for the Service Bus namespace you would like to have Event Hubs created in. This is a string with the format: `{service bus resource ID}/authorizationrules/{key name}`. |
216
215
| Location |Yes |Comma-separated list of regions for which you would like to collect Activity Log events. |
217
-
| RetentionInDays |Yes |Number of days for which events should be retained in the storage account, between 1 and 365. A value of zero stores the logs indefinitely. |
216
+
| RetentionInDays |Yes |Number of days for which events should be retained in the Storage Account, between 1 and 365. A value of zero stores the logs indefinitely. |
218
217
| Category |No |Comma-separated list of event categories that should be collected. Possible values are _Write_, _Delete_, and _Action_. |
219
218
220
219
### Example script
221
-
Following is a sample PowerShell script to create a log profile that writes the Activity Log to both a storage account and event hub.
220
+
Following is a sample PowerShell script to create a log profile that writes the Activity Log to both a Storage Account and Event Hub.
222
221
223
222
```powershell
224
223
# Settings needed for the new log profile
225
224
$logProfileName = "default"
226
225
$locations = (Get-AzLocation).Location
227
226
$locations += "global"
228
227
$subscriptionId = "<your Azure subscription Id>"
229
-
$resourceGroupName = "<resource group name your event hub belongs to>"
230
-
$eventHubNamespace = "<event hub namespace>"
228
+
$resourceGroupName = "<resource group name your Event Hub belongs to>"
229
+
$eventHubNamespace = "<Event Hub namespace>"
231
230
232
231
# Build the service bus rule Id from the settings above
@@ -248,7 +247,7 @@ If a log profile already exists, you first need to remove the existing log profi
248
247
3. Use `az monitor log-profiles create` to create a new log profile:
249
248
250
249
```azurecli-interactive
251
-
az monitor log-profiles create --name "default" --location null --locations "global" "eastus" "westus" --categories "Delete" "Write" "Action" --enabled false --days 0 --service-bus-rule-id "/subscriptions/<YOUR SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP NAME>/providers/Microsoft.EventHub/namespaces/<EVENT HUB NAME SPACE>/authorizationrules/RootManageSharedAccessKey"
250
+
az monitor log-profiles create --name "default" --location null --locations "global" "eastus" "westus" --categories "Delete" "Write" "Action" --enabled false --days 0 --service-bus-rule-id "/subscriptions/<YOUR SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP NAME>/providers/Microsoft.EventHub/namespaces/<Event Hub NAME SPACE>/authorizationrules/RootManageSharedAccessKey"
252
251
```
253
252
| Property | Required | Description |
254
253
| --- | --- | --- |
@@ -279,7 +278,7 @@ To disable the setting, perform the same procedure and click **Disconnect** to r
279
278
### Data structure changes
280
279
Diagnostic settings send the same data as the legacy method used to send the Activity log with some changes to the structure of the *AzureActivity* table.
281
280
282
-
The columns in the following table have been deprecated in the updated schema. They still exist in *AzureActivity* but they will have no data. The replacement for these columns are not new, but they contain the same data as the deprecated column. They are in a different format, so you may need to modify log queries that use them.
281
+
The columns in the following table have been deprecated in the updated schema. They still exist in *AzureActivity* but they will have no data. The replacements for these columns are not new, but they contain the same data as the deprecated column. They are in a different format, so you may need to modify log queries that use them.
283
282
284
283
|Activity Log JSON | Log Analytics column name<br/>*(older deprecated)*| New Log Analytics column name | Notes |
285
284
|:---------|:---------|:---------|:---------|
@@ -289,7 +288,7 @@ The columns in the following table have been deprecated in the updated schema. T
289
288
|operationName | OperationName | OperationNameValue |REST API localizes operation name value. Log Analytics UI always shows English. |
> In some cases, the values in these columns may be in all uppercase. If you have a query that includes these columns, you should use the [=~ operator](/azure/kusto/query/datatypes-string-operators) to do a case insensitive comparison.
294
293
295
294
The following column have been added to *AzureActivity* in the updated schema:
@@ -299,7 +298,8 @@ The following column have been added to *AzureActivity* in the updated schema:
299
298
- Properties_d
300
299
301
300
## Activity Log Analytics monitoring solution
302
-
The Azure Log Analytics monitoring solution will be deprecated soon and replaced by a workbook using the updated schema in the Log Analytics workspace. You can still use the solution if you already have it enabled, but it can only be used if you're collecting the Activity log using legacy settings.
301
+
> [!Note]
302
+
> The Azure Log Analytics monitoring solution will be deprecated soon and replaced by a workbook using the updated schema in the Log Analytics workspace. You can still use the solution if you already have it enabled, but it can only be used if you're collecting the Activity log using legacy settings.
303
303
304
304
305
305
@@ -309,13 +309,14 @@ Monitoring solutions are accessed from the **Monitor** menu in the Azure portal.
Click the **Azure Activity Logs** tile to open the **Azure Activity Logs** view. The view includes the visualization parts in the following table. Each part lists up to 10 items matching that parts's criteria for the specified time range. You can run a log query that returns all matching records by clicking **See all** at the bottom of the part.
312
+
Click the **Azure Activity Logs** tile to open the **Azure Activity Logs** view. The view includes the visualization parts in the following table. Each part lists up to 10 items matching that part's criteria for the specified time range. You can run a log query that returns all matching records by clicking **See all** at the bottom of the part.
You will soon no longer be able to add the Activity Logs Analytics solution to your subscription using the Azure portal. You can add it using the following procedure with a Resource Manager template.
318
+
> [!NOTE]
319
+
>You will soon no longer be able to add the Activity Logs Analytics solution to your subscription using the Azure portal. You can add it using the following procedure with a Resource Manager template.
319
320
320
321
1. Copy the following json into a file called *ActivityLogTemplate*.json.
Copy file name to clipboardExpand all lines: articles/data-factory/managed-virtual-network-private-endpoint.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,6 @@ Generally, managed Virtual network is available to all Azure Data Factory region
163
163
164
164
### Outbound communications through public endpoint from ADF Managed Virtual Network
165
165
- All ports are opened for outbound communications.
166
-
- Azure Storage and Azure Data Lake Gen2 are not supported to be connected through public endpoint from ADF Managed Virtual Network.
167
166
168
167
### Linked Service creation of Azure Key Vault
169
168
- When you create a Linked Service for Azure Key Vault, there is no Azure Integration Runtime reference. So you can't create Private Endpoint during Linked Service creation of Azure Key Vault. But when you create Linked Service for data stores which references Azure Key Vault Linked Service and this Linked Service references Azure Integration Runtime with Managed Virtual Network enabled, then you are able to create a Private Endpoint for the Azure Key Vault Linked Service during the creation.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/device-builders/release-notes.md
+17-3Lines changed: 17 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What's new in Microsoft Defender for IoT for device builders
3
3
description: Learn about the latest updates for Defender for IoT device builders.
4
4
ms.topic: conceptual
5
-
ms.date: 12/28/2021
5
+
ms.date: 01/10/2022
6
6
---
7
7
8
8
# What's new
@@ -13,12 +13,26 @@ This article lists new features and feature enhancements in Microsoft Defender f
13
13
14
14
Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15
15
16
-
If you would like to be added to the Microsoft Defender for IoT device builders email distribution list, to get updates on new features, and release notes, send an email to: [[email protected]](mailto:[email protected])
17
-
18
16
## Versioning and support
19
17
20
18
Listed below are the support, breaking change policies for Defender for IoT, and the versions of Defender for IoT that are currently available.
21
19
20
+
## November 2021
21
+
22
+
**Version 3.13.1**:
23
+
24
+
- DNS network activity on managed devices is now supported. Microsoft threat intelligence security graph can now detect suspicious activity based on DNS traffic.
25
+
26
+
-[Leaf device proxying](../../iot-edge/how-to-connect-downstream-iot-edge-device.md#integrate-microsoft-defender-for-iot-with-iot-edge-gateway): There is now an enhanced integration with IoT Edge. This integration enhances the connectivity between the agent, and the cloud using leaf device proxying.
27
+
28
+
## October 2021
29
+
30
+
**Version 3.12.2**:
31
+
32
+
- More CIS benchmark checks are now supported for Debian 9: These extra checks allow you to make sure your network is compliant with the CIS best practices used to protect against pervasive cyber threats.
33
+
34
+
-**[Twin configuration](concept-micro-agent-configuration.md)**: The micro agent’s behavior is configured by a set of module twin properties. You can configure the micro agent to best suit your needs.
0 commit comments