Skip to content

Commit 91fc47d

Browse files
committed
Fixed blockers for merge
1 parent 36d2ca8 commit 91fc47d

File tree

7 files changed

+10
-205
lines changed

7 files changed

+10
-205
lines changed

articles/azure-arc/servers/security-data-privacy.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,11 @@ The Azure Connected Machine agent keeps a set of local logs on each server that
4242
## HIMDS log
4343

4444
The HIMDS log file contains all log data from the HIMDS service. This data includes heartbeat information, connection and disconnection attempts, and a history of REST API requests for IMDS metadata and managed identity tokens from other apps on the system.
45-
OS Log location
46-
Windows %PROGRAMDATA%\AzureConnectedMachineAgent\Log\himds.log
47-
Linux /var/opt/azcmagent/log/himds.log
45+
46+
|OS |Log location |
47+
|---------|---------|
48+
|Windows |%PROGRAMDATA%\AzureConnectedMachineAgent\Log\himds.log |
49+
|Linux |/var/opt/azcmagent/log/himds.log |
4850

4951
## azcmagent CLI log
5052

articles/azure-arc/servers/security-identity-authorization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Generic RBAC roles in Azure also apply to Azure Arc-enabled servers, including R
3939

4040
[Azure role-based access control](../../role-based-access-control/overview.md) is used to control which accounts can see and manage your Azure Arc-enabled server. From the [**Access Control (IAM)**](../../role-based-access-control/role-assignments-portal.yml) page in the Azure portal, you can verify who has access to your Azure Arc-enabled server.
4141

42-
:::image type="content" source="media/security-identity-authorization/access-control-page.png" alt-text="Azure Arc-enabled server access control":::
42+
:::image type="content" source="media/security-identity-authorization/access-control-page.png" alt-text="Screenshot of the Azure portal showing Azure Arc-enabled server access control.":::
4343

4444
Users and applications granted [contributor](../../role-based-access-control/built-in-roles.md#contributor) or administrator role access to the resource can make changes to the resource, including deploying or deleting [extensions](manage-vm-extensions.md) on the machine. Extensions can include arbitrary scripts that run in a privileged context, so consider any contributor on the Azure resource to be an indirect administrator of the server.
4545

articles/azure-arc/servers/security-logging-auditing.md

Lines changed: 0 additions & 64 deletions
This file was deleted.

articles/azure-arc/servers/security-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Once the Azure Connected Machine agent is installed, you can enable other Azure
4242

4343
You can use Azure Policy to limit what your organization’s users can do with Azure Arc. Cloud-based restrictions like Azure Policy are a great way to apply security controls at-scale while retaining flexibility to adjust the restrictions at any time. However, sometimes you need even stronger controls to protect against a legitimately privileged account being used to circumvent security measures (for example, disabling policies). To account for this, the Azure Connected Machine agent also has security controls of its own that take precedence over any restrictions set in the cloud.
4444

45-
:::image type="content" source="media/security-basics/connected-machine-agent-architecuture.png" alt-text="Architecure diagram describing how the Azure Connected Machine agent functions.":::
45+
:::image type="content" source="media/security-basics/connected-machine-agent-architecuture.png" alt-text="Architecure diagram describing how the Azure Connected Machine agent functions." lightbox="media/security-basics/connected-machine-agent-architecuture.png":::
4646

4747
## Agent services
4848

@@ -52,15 +52,15 @@ The Azure Connected Machine agent is a combination of four services/daemons that
5252

5353
The Hybrid Instance Metadata Service (HIMDS) is the “core” service in the agent and is responsible for registering the server with Azure, ongoing metadata synchronization (heartbeats), managed identity operations, and hosting the local REST API which other apps can query to learn about the device’s connection with Azure. This service is unprivileged and runs as a virtual account (NT SERVICE\himds with SID S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083) on Windows or a standard user account (himds) on Linux operating systems.
5454

55-
### Extension Manager
55+
### Extension manager
5656

5757
The extension manager is responsible for installing, configuring, upgrading, and removing additional software on your machine. Out of the box, Azure Arc doesn’t know how to do things like monitor or patch your machine. Instead, when you choose to use those features, the extension manager downloads and enables those capabilities. The extension manager runs as Local System on Windows and root on Linux because the software it installs may require full system access. You can limit which extensions the extension manager is allowed to install or disable it entirely if you don’t intend to use extensions.
5858

59-
### Guest Configuration
59+
### Guest configuration
6060

6161
The guest configuration service evaluates and enforces Azure machine (guest) configuration policies on your server. These are special Azure policies written in PowerShell Desired State Configuration to check software settings on a server. The guest configuration service regularly evaluates and reports on compliance with these policies and, if the policy is configured in enforce mode, will change settings on your system to bring the machine back into compliance if necessary. The guest configuration service runs as Local System on Windows and root on Linux to ensure it has access to all settings on your system. You can disable the guest configuration feature if you don't intend to use guest configuration policies.
6262

63-
### Azure Arc Proxy
63+
### Azure Arc proxy
6464

6565
The Azure Arc proxy service is responsible for aggregating network traffic from the Azure Connected Machine agent services and any extensions you’ve installed and deciding where to route that data. If you’re using the Azure Arc Gateway to simplify your network endpoints, the Azure Arc Proxy service is the local component that forwards network requests via the Azure Arc Gateway instead of the default route. The Azure Arc proxy runs as Network Service on Windows and a standard user account (arcproxy) on Linux. It's disabled by default until you configure the agent to use the Azure Arc Gateway.
6666

articles/azure-arc/servers/security-remote-access.md

Lines changed: 0 additions & 61 deletions
This file was deleted.

articles/azure-arc/servers/security-tier-zero.md

Lines changed: 0 additions & 35 deletions
This file was deleted.

0 commit comments

Comments
 (0)