You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Log Analytics workspace is used by the Defender profile/extension as a data pipeline to send data from the cluster to Defender for Cloud without retaining any data in the Log Analytics workspace itself. As a result, users will not be billed in this use case.
12
+
13
+
The Defender profile/extension uses a default Log Analytics workspace. If you do not already have a default Log Analytics workspace, Defender for Cloud will create a new resource group and default workspace when the Defender profile/extension is installed. The default workspace is created based on your [region](../faq-data-collection-agents.yml).
14
+
15
+
The naming convention for the default Log Analytics workspace and resource group is:
Once the Defender profile/extension has been deployed, a default workspace will be automatically assigned. You can assign a custom workspace through Azure Policy.
22
+
23
+
**To assign custom workspace**:
24
+
25
+
1. Sign in to the [Azure portal](https://portal.azure.com).
26
+
27
+
1. Search for, and select **Policy**.
28
+
29
+
:::image type="content" source="../media/defender-for-containers/find-policy.png" alt-text="Screenshot that shows how to locate the policy page." lightbox="../media/defender-for-containers/find-policy.png":::
30
+
31
+
1. Select **Definitions**.
32
+
33
+
1. Search for policy ID `64def556-fbad-4622-930e-72d1d5589bf5`.
34
+
35
+
:::image type="content" source="../media/defender-for-containers/policy-search.png" alt-text="Screenshot that shows where to search for the policy by I D number." lightbox="../media/defender-for-containers/policy-search.png":::
36
+
37
+
1. Select **\[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profile**.
38
+
39
+
1. Select **Assign**.
40
+
41
+
1. In the **Parameters** tab, deselect the **Only show parameters that need input or review** option.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-containers-enable-plan-aks.md
+12-5Lines changed: 12 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,15 @@
1
1
---
2
-
author: bmansheim
3
-
ms.author: benmansheim
2
+
author: ElazarK
3
+
ms.author: elkrieger
4
4
ms.service: defender-for-cloud
5
5
ms.topic: include
6
-
ms.date: 04/28/2022
6
+
ms.date: 05/10/2022
7
7
---
8
+
8
9
## Enable the plan
9
10
11
+
**To enable the plan**:
12
+
10
13
1. From Defender for Cloud's menu, open the [Environment settings page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/EnvironmentSettings) and select the relevant subscription.
11
14
12
15
1. In the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier), enable **Defender for Containers**
@@ -16,7 +19,7 @@ ms.date: 04/28/2022
16
19
>
17
20
> :::image type="content" source="../media/release-notes/defender-plans-deprecated-indicator.png" alt-text="Defender for container registries and Defender for Kubernetes plans showing 'Deprecated' and upgrade information.":::
18
21
19
-
1. By default, when enabling the plan through the Azure Portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan.
22
+
1. By default, when enabling the plan through the Azure portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan, including the assignment of a default workspace.
20
23
21
24
Optionally, you can modify this configuration from the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier) or from the [Auto provisioning page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/dataCollection) on the **Microsoft Defender for Containers components (preview)** row:
22
25
@@ -25,6 +28,8 @@ ms.date: 04/28/2022
25
28
> [!NOTE]
26
29
> If you choose to **disable the plan** at any time after enabling it through the portal as shown above, you'll need to manually remove Defender for Containers components deployed on your clusters.
27
30
31
+
You can assign a custom workspace through Azure Policy.
32
+
28
33
1. If you disable the auto provisioning of any component, you can easily deploy the component to one or more clusters using the appropriate recommendation:
29
34
30
35
- Policy Add-on for Kubernetes - [Azure Kubernetes Service clusters should have the Azure Policy Add-on for Kubernetes installed](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/08e628db-e2ed-4793-bc91-d13e684401c3)
@@ -40,6 +45,8 @@ ms.date: 04/28/2022
40
45
41
46
You can enable the Defender for Containers plan and deploy all of the relevant components from the Azure portal, the REST API, or with a Resource Manager template. For detailed steps, select the relevant tab.
42
47
48
+
Once the Defender profile has been deployed, a default workspace will be automatically assigned. You can override the default workspace and make a change through Azure Policy by assigning a custom workspace
49
+
43
50
The Defender security profile is a preview feature. [!INCLUDE [Legalese](../../../includes/defender-for-cloud-preview-legal-text.md)]
44
51
45
52
### [**Azure portal**](#tab/aks-deploy-portal)
@@ -142,4 +149,4 @@ To install the 'SecurityProfile' on an existing cluster with Resource Manager:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-containers-enable-plan-arc.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,15 @@
1
1
---
2
-
author: bmansheim
3
-
ms.author: benmansheim
2
+
author: ElazarK
3
+
ms.author: elkrieger
4
4
ms.service: defender-for-cloud
5
5
ms.topic: include
6
-
ms.date: 04/28/2022
6
+
ms.date: 05/10/2022
7
7
8
8
---
9
9
## Enable the plan
10
10
11
+
**To enable the plan**:
12
+
11
13
1. From Defender for Cloud's menu, open the [Environment settings page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/EnvironmentSettings) and select the relevant subscription.
12
14
13
15
1. In the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier), enable **Defender for Containers**
@@ -17,7 +19,7 @@ ms.date: 04/28/2022
17
19
>
18
20
> :::image type="content" source="../media/release-notes/defender-plans-deprecated-indicator.png" alt-text="Defender for container registries and Defender for Kubernetes plans showing 'Deprecated' and upgrade information.":::
19
21
20
-
1. By default, when enabling the plan through the Azure Portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan.
22
+
1. By default, when enabling the plan through the Azure portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan, including the assignment of a default workspace.
21
23
22
24
Optionally, you can modify this configuration from the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier) or from the [Auto provisioning page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/dataCollection) on the **Microsoft Defender for Containers components (preview)** row:
23
25
@@ -26,6 +28,8 @@ ms.date: 04/28/2022
26
28
> [!NOTE]
27
29
> If you choose to **disable the plan** at any time after enabling it through the portal as shown above, you'll need to manually remove Defender for Containers components deployed on your clusters.
28
30
31
+
You can assign a custom workspace through Azure Policy.
32
+
29
33
1. If you disable the auto provisioning of any component, you can easily deploy the component to one or more clusters using the appropriate recommendation:
30
34
31
35
- Policy Add-on for Kubernetes - [Azure Kubernetes Service clusters should have the Azure Policy Add-on for Kubernetes installed](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/08e628db-e2ed-4793-bc91-d13e684401c3)
-[How can I use my existing Log Analytics workspace?](#how-can-i-use-my-existing-log-analytics-workspace)
12
+
-[Can I delete the default workspaces created by Defender for Cloud?](#can-i-delete-the-default-workspaces-created-by-defender-for-cloud)
13
+
-[I deleted my default workspace, how can I get it back?](#i-deleted-my-default-workspace-how-can-i-get-it-back)
14
+
-[Where is the default Log Analytics workspace located?](#where-is-the-default-log-analytics-workspace-located)
15
+
16
+
### How can I use my existing Log Analytics workspace?
17
+
18
+
You can use your existing Log Analytics workspace by following the steps in the Assign a custom workspace section of this article.
19
+
20
+
### Can I delete the default workspaces created by Defender for Cloud?
21
+
22
+
We do not recommend deleting the default workspace. Defender for Containers uses the default workspaces to collect security data from your clusters. Defender for Containers will be unable to collect data, and some security recommendations and alerts, will become unavailable if you delete the default workspace.
23
+
24
+
### I deleted my default workspace, how can I get it back?
25
+
26
+
To recover your default workspace, you need to remove the Defender profile/extension, and reinstall the agent. Reinstalling the Defender profile/extension creates a new default workspace.
27
+
28
+
### Where is the default Log Analytics workspace located?
29
+
30
+
Depending on your region the default Log Analytics workspace located will be located in various locations. To check your region see [Where is the default Log Analytics workspace created?](../faq-data-collection-agents.yml)
0 commit comments