Skip to content

Commit 9d64e4e

Browse files
author
Jill Grant
authored
Merge pull request #277474 from johnmarco/jm-arc-new-security-docs
Arc servers: New security section
2 parents 82d8e00 + 91fc47d commit 9d64e4e

14 files changed

+578
-191
lines changed

articles/azure-arc/servers/agent-release-notes-archive.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The Windows Admin Center in Azure feature is incompatible with Azure Connected M
7575

7676
- The Linux installation script now downloads supporting assets with either wget or curl, depending on which tool is available on the system
7777
- [azcmagent connect](azcmagent-connect.md) and [azcmagent disconnect](azcmagent-disconnect.md) now accept the `--user-tenant-id` parameter to enable Lighthouse users to use a credential from their tenant and onboard a server to a different tenant.
78-
- You can configure the extension manager to run, without allowing any extensions to be installed, by configuring the allowlist to `Allow/None`. This supports Windows Server 2012 ESU scenarios where the extension manager is required for billing purposes but doesn't need to allow any extensions to be installed. Learn more about [local security controls](security-overview.md#local-agent-security-controls).
78+
- You can configure the extension manager to run, without allowing any extensions to be installed, by configuring the allowlist to `Allow/None`. This supports Windows Server 2012 ESU scenarios where the extension manager is required for billing purposes but doesn't need to allow any extensions to be installed. Learn more about [local security controls](security-extensions.md#local-agent-security-controls).
7979

8080
### Fixed
8181

@@ -119,7 +119,7 @@ This endpoint will be removed from `azcmagent check` in a future release.
119119
### Fixed
120120

121121
- Fixed an issue that could cause a VM extension to disappear in Azure Resource Manager if it's installed with the same settings twice. After upgrading to agent version 1.33 or later, reinstall any missing extensions to restore the information in Azure Resource Manager.
122-
- You can now set the [agent mode](security-overview.md#agent-modes) before connecting the agent to Azure.
122+
- You can now set the [agent mode](security-extensions.md#agent-modes) before connecting the agent to Azure.
123123
- The agent now responds to instance metadata service (IMDS) requests even when the connection to Azure is temporarily unavailable.
124124

125125
## Version 1.32 - July 2023
@@ -221,7 +221,7 @@ Download for [Windows](https://download.microsoft.com/download/8/4/5/845d5e04-bb
221221
- The extension service now correctly restarts when the Azure Connected Machine agent is upgraded by Update Manager
222222
- Resolved issues with the hybrid connectivity component that could result in the "himds" service crashing, the server showing as "disconnected" in Azure, and connectivity issues with Windows Admin Center and SSH
223223
- Improved handling of resource move scenarios that could impact Windows Admin Center and SSH connectivity
224-
- Improved reliability when changing the [agent configuration mode](security-overview.md#local-agent-security-controls) from "monitor" mode to "full" mode.
224+
- Improved reliability when changing the [agent configuration mode](security-extensions.md#local-agent-security-controls) from "monitor" mode to "full" mode.
225225
- Increased the [resource limits](agent-overview.md#agent-resource-governance) for the Microsoft Sentinel DNS extension to improve log collection reliability
226226
- Tenant IDs are better validated when connecting the server
227227

@@ -379,7 +379,7 @@ Download for [Windows](https://download.microsoft.com/download/2/5/6/25685d0f-28
379379

380380
### New features
381381

382-
- You can configure the agent to operate in [monitoring mode](security-overview.md#agent-modes), which simplifies configuration of the agent for scenarios where you only want to use Arc for monitoring and security scenarios. This mode disables other agent functionality and prevents use of extensions that could make changes to the system (for example, the Custom Script Extension).
382+
- You can configure the agent to operate in [monitoring mode](security-extensions.md#agent-modes), which simplifies configuration of the agent for scenarios where you only want to use Arc for monitoring and security scenarios. This mode disables other agent functionality and prevents use of extensions that could make changes to the system (for example, the Custom Script Extension).
383383
- VMs and hosts running on Azure Stack HCI now report the cloud provider as "HCI" when [Azure benefits are enabled](/azure-stack/hci/manage/azure-benefits#enable-azure-benefits).
384384

385385
### Fixed
@@ -397,7 +397,7 @@ Download for [Windows](https://download.microsoft.com/download/a/3/4/a34bb824-d5
397397

398398
- The default resource name for AWS EC2 instances is now the instance ID instead of the hostname. To override this behavior, use the `--resource-name PreferredResourceName` parameter to specify your own resource name when connecting a server to Azure Arc.
399399
- The network connectivity check during onboarding now verifies private endpoint configuration if you specify a private link scope. You can run the same check anytime by running [azcmagent check](azcmagent-check.md) with the new `--use-private-link` parameter.
400-
- You can now disable the extension manager with the [local agent security controls](security-overview.md#local-agent-security-controls).
400+
- You can now disable the extension manager with the [local agent security controls](security-extensions.md#local-agent-security-controls).
401401

402402
### Fixed
403403

@@ -417,7 +417,7 @@ Download for [Windows](https://download.microsoft.com/download/e/a/4/ea4ea4a9-a9
417417

418418
### New features
419419

420-
- You can now granularly control allowed and blocked extensions on your server and disable the Guest Configuration agent. See [local agent controls to enable or disable capabilities](security-overview.md#local-agent-security-controls) for more information.
420+
- You can now granularly control allowed and blocked extensions on your server and disable the Guest Configuration agent. See [local agent controls to enable or disable capabilities](security-extensions.md#local-agent-security-controls) for more information.
421421

422422
### Fixed
423423

articles/azure-arc/servers/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ landingContent:
2121
url: agent-overview.md
2222
- text: VMware FAQ
2323
url: vmware-faq.md
24+
- text: Security overview
25+
url: security-overview.md
2426

2527
- linkListType: architecture
2628
links:
57.7 KB
Loading

articles/azure-arc/servers/run-command.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ You can use one of the [built-in roles](/azure/role-based-access-control/built-i
3434

3535
## Blocking run commands locally
3636

37-
The Connected Machine agent supports local configurations that allow you to set an allowlist or a blocklist. See [Extension allowlists and blocklists](security-overview.md#extension-allowlists-and-blocklists) to learn more.
37+
The Connected Machine agent supports local configurations that allow you to set an allowlist or a blocklist. See [Extension allowlists and blocklists](security-extensions.md#allowlists-and-blocklists) to learn more.
3838

3939
For Windows:
4040

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
---
2+
title: Data and privacy
3+
description: Data and privacy for Arc-enabled servers.
4+
ms.topic: conceptual
5+
ms.date: 06/06/2024
6+
---
7+
8+
# Data and privacy for Arc-enabled servers
9+
10+
This article explains the data collection process by the Azure Connected Machine agent for Azure Arc-enabled servers, detailing how system metadata is gathered and sent to Azure. This article also describes the logging mechanisms available for Azure Arc-enabled servers, including the Azure Activity log for tracking server actions.
11+
12+
## Information collected by Azure Arc
13+
14+
As part of its normal operation, the Azure Connected Machine agent collects system metadata and sends it to Azure as part of its regular heartbeat. This metadata is populated in the Azure Arc-enabled server resource so you can identify and query your servers as part of your Azure inventory. Azure Arc collects no end user-identifiable data.
15+
16+
See [instance metadata](/azure/azure-arc/servers/agent-overview#instance-metadata) for a complete list of metadata collected by Azure Arc. This list is regularly updated to reflect the data collected by the most recent release of the Azure Connected Machine agent. It's not possible to opt out of this data collection because it's used across Azure experiences to help filter and identify your servers.
17+
18+
To collect cloud metadata, the Azure Connected Machine agent queries the instance metadata endpoints for AWS, GCP, Oracle Cloud, Azure Stack HCI and Azure. The agent checks if it’s in a cloud once, each time the "himds" service is started. Your security software may notice the agent reaching out to the following endpoints as part of that process: 169.254.169.254, 169.254.169.253, and metadata.google.internal.
19+
20+
All data is handled according to [Microsoft’s privacy standards](https://www.microsoft.com/en-us/trust-center/privacy).
21+
22+
## Data replication and disaster recovery
23+
24+
Azure Arc-enabled servers is a software-as-a-service offering and handles data replication and disaster recovery preparation on your behalf. When you select the region to store your data, that data is automatically replicated to another region in that same geography to protect against a regional outage. In the event a region becomes unavailable, DNS records are automatically changed to point to the failover region. No action is required from you and your agents will automatically reconnect when the failover is complete.
25+
26+
In some geographies, only one region supports Azure Arc-enabled servers. In these situations, data is still replicated for backup purposes to another region in that geography but won't be able to fail over to another region during an outage. You continue to see metadata in Azure from the last time your servers sent a heartbeat but can't make changes or connect new servers until region functionality is restored. The Azure Arc team regularly considers region expansion opportunities to minimize the number of geographies in this configuration.
27+
28+
## Compliance with regulatory standards
29+
30+
Azure Arc is regularly audited for compliance with many global, regional, and industry-specific regulatory standards. A summary table of the compliance offerings is available at [https://aka.ms/AzureCompliance](https://aka.ms/AzureCompliance).
31+
32+
For more information on a particular standard and to download audit documents, see [Azure and other Microsoft cloud services compliance offerings](/azure/compliance/offerings/).
33+
34+
## Azure Activity log
35+
36+
You can use the Azure Activity log to track actions taken on an Azure Arc-enabled server. Actions like installing extensions on an Arc server have unique operation identifiers (all starting with “Microsoft.HybridCompute”) that you can use to filter the log. Learn more about the [Azure Activity Log](/azure/azure-monitor/essentials/activity-log-insights) and how to retain activity logs for more than 30 days by [sending activity log data](/azure/azure-monitor/essentials/activity-log?tabs=powershell) to Log Analytics.
37+
38+
## Local logs
39+
40+
The Azure Connected Machine agent keeps a set of local logs on each server that may be useful for troubleshooting or auditing when the Arc agent made a change to the system. The fastest way to get a copy of all logs from a server is to run [azcmagent logs](/azure/azure-arc/servers/azcmagent-logs), which generates a compressed folder of all the latest logs for you.
41+
42+
## HIMDS log
43+
44+
The HIMDS log file contains all log data from the HIMDS service. This data includes heartbeat information, connection and disconnection attempts, and a history of REST API requests for IMDS metadata and managed identity tokens from other apps on the system.
45+
46+
|OS |Log location |
47+
|---------|---------|
48+
|Windows |%PROGRAMDATA%\AzureConnectedMachineAgent\Log\himds.log |
49+
|Linux |/var/opt/azcmagent/log/himds.log |
50+
51+
## azcmagent CLI log
52+
53+
The azcmagent log file contains a history of commands run using the local “azcmagent” command line interface. This log provides the parameters used when connecting, disconnecting, or modifying the configuration of the agent.
54+
55+
|OS |Log location |
56+
|---------|---------|
57+
|Windows |%PROGRAMDATA%\AzureConnectedMachineAgent\Log\azcmagent.log |
58+
|Linux |/var/opt/azcmagent/log/azcmagent.log |
59+
60+
## Extension Manager log
61+
62+
The extension manager log contains information about attempts to install, upgrade, reconfigure, and uninstall extensions on the machine.
63+
64+
|OS |Log location |
65+
|---------|---------|
66+
|Windows |%PROGRAMDATA%\GuestConfig\ext_mgr_logs\gc_ext.log |
67+
|Linux |/var/lib/GuestConfig/ext_mgr_logs/gc_ext.log |
68+
69+
Other logs may be generated by individual extensions. Logs for individual extensions aren't guaranteed to follow any standard log format.
70+
71+
|OS |Log location |
72+
|---------|---------|
73+
|Windows |%PROGRAMDATA%\GuestConfig\extension_logs\* |
74+
|Linux |/var/lib/GuestConfig/extension_logs/* |
75+
76+
## Machine Configuration log
77+
78+
The machine configuration policy engine generates logs for the audit and enforcement of settings on the system.
79+
80+
|OS |Log location |
81+
|---------|---------|
82+
|Windows |%PROGRAMDATA%\GuestConfig\arc_policy_logs\gc_agent.log |
83+
|Linux |/var/lib/GuestConfig/arc_policy_logs/gc_agent.log |
84+

0 commit comments

Comments
 (0)