Skip to content

Commit a460d4d

Browse files
authored
Merge pull request #207007 from bmansheim/auto-provision-azure-monitor-agent
Deploy Azure Monitor agent using auto provisioning
2 parents a9166b8 + 64d05b6 commit a460d4d

10 files changed

+219
-60
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -211,6 +211,8 @@
211211
- name: Apply Azure security baselines
212212
displayName: VM, guest configuration, vulnerabilities, ASB, benchmark
213213
href: apply-security-baseline.md
214+
- name: Deploy the Azure Monitor agent
215+
href: auto-deploy-azure-monitoring-agent.md
214216
- name: Vulnerability assessments
215217
items:
216218
- name: Find vulnerabilities with threat and vulnerability management
Lines changed: 127 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,127 @@
1+
---
2+
title: Deploy the Azure Monitor Agent with auto provisioning
3+
description: Learn how to deploy the Azure Monitor Agent on your Azure, multicloud, and on-premises servers with auto provisioning to support Microsoft Defender for Cloud protections.
4+
author: bmansheim
5+
ms.author: benmansheim
6+
ms.topic: how-to
7+
ms.date: 08/03/2022
8+
ms.custom: template-how-to
9+
---
10+
11+
# Auto provision the Azure Monitor Agent to protect your servers with Microsoft Defender for Cloud
12+
13+
To make sure that your server resources are secure, Microsoft Defender for Cloud uses agents installed on your servers to send information about your servers to Microsoft Defender for Cloud for analysis. You can use auto provisioning to quietly deploy the Azure Monitor Agent on your servers.
14+
15+
In this article, we're going to show you how to use auto provisioning to deploy the agent so that you can protect your servers.
16+
17+
## Availability
18+
19+
[!INCLUDE [azure-monitor-agent-availability](includes/azure-monitor-agent-availability.md)]
20+
21+
## Prerequisites
22+
23+
Before you enable auto provisioning, you must have the following prerequisites:
24+
25+
- Make sure your multicloud and on-premises machines have Azure Arc installed.
26+
- AWS and GCP machines
27+
- [Onboard your AWS connector](quickstart-onboard-aws.md) and auto provision Azure Arc.
28+
- [Onboard your GCP connector](quickstart-onboard-gcp.md) and auto provision Azure Arc.
29+
- Other clouds and on-premises machines
30+
- [Install Azure Arc](/azure/azure-arc/servers/learn/quick-enable-hybrid-vm.md).
31+
- Make sure the Defender plans that you want the Azure Monitor Agent to support are enabled:
32+
- [Enable Defender for Servers Plan 2 on Azure and on-premises VMs](enable-enhanced-security.md)
33+
- [Enable Defender plans on the subscriptions for your AWS VMs](quickstart-onboard-aws.md)
34+
- [Enable Defender plans on the subscriptions for your GCP VMs](quickstart-onboard-gcp.md)
35+
36+
## Deploy the Azure Monitor Agent with auto provisioning
37+
38+
To deploy the Azure Monitor Agent with auto provisioning:
39+
40+
1. From Defender for Cloud's menu, open **Environment settings**.
41+
1. Select the relevant subscription.
42+
1. Open the **Auto provisioning** page.
43+
44+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-auto-provisioning.png" alt-text="Screenshot of the auto provisioning menu item for enabling the Azure Monitor Agent.":::
45+
46+
1. Enable deployment of the Azure Monitor Agent:
47+
48+
1. For the **Log Analytics agent/Azure Monitor Agent**, select the **On** status.
49+
50+
In the Configuration column, you can see the enabled agent type. When you enable auto provisioning, Defender for Cloud decides which agent to provision based on your environment. In most cases, the default is the Log Analytics agent.
51+
52+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of the auto provisioning page for enabling the Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png":::
53+
54+
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
55+
56+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png " alt-text="Screenshot of editing the Azure Monitor Agent configuration." lightbox="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png":::
57+
58+
1. For the Auto-provisioning configuration agent type, select **Azure Monitor Agent**.
59+
60+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of selecting the Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png":::
61+
62+
By default:
63+
64+
- The Azure Monitor Agent is installed on all existing machines in the selected subscription, and on all new machines created in the subscription.
65+
- The Log Analytics agent isn't uninstalled from machines that already have it installed. You can [leave the Log Analytics agent](#impact-of-running-with-both-the-log-analytics-and-azure-monitor-agents) on the machine, or you can manually [remove the Log Analytics agent](/azure/azure-monitor/agents/azure-monitor-agent-migration.md) if you don't require it for other protections.
66+
- The agent sends data to the default workspace for the subscription. You can also [configure a custom workspace](#configure-custom-destination-log-analytics-workspace) to send data to.
67+
- You can't enable [collection of additional security events](#additional-security-events-collection).
68+
69+
## Impact of running with both the Log Analytics and Azure Monitor Agents
70+
71+
You can run both the Log Analytics and Azure Monitor Agents on the same machine, but you should be aware of these considerations:
72+
73+
- Certain recommendations or alerts are reported by both agents and appear twice in Defender for Cloud.
74+
- Each machine is billed once in Defender for Cloud, but make sure you track billing of other services connected to the Log Analytics and Azure Monitor, such as the Log Analytics workspace data ingestion.
75+
- Both agents have performance impact on the machine.
76+
77+
When you enable auto provisioning, Defender for Cloud decides which agent to provision. In most cases, the default is the Log Analytics agent.
78+
79+
Learn more about [migrating to the Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-migration.md).
80+
81+
## Custom configurations
82+
83+
### Configure custom destination Log Analytics workspace
84+
85+
When you install the Azure Monitor Agent with auto-provisioning, you can define the destination workspace of the installed extensions. By default, the destination is the “default workspace” that Defender for Cloud creates for each region in the subscription: `defaultWorkspace-<subscriptionId>-<regionShortName>`. Defender for Cloud automatically configures the data collection rules, workspace solution, and additional extensions for that workspace.
86+
87+
If you configure a custom Log Analytics workspace:
88+
89+
- Defender for Cloud only configures the data collection rules and additional extensions for the custom workspace. You'll have to configure the workspace solution on the custom workspace.
90+
- Machines with Log Analytics agent that report to a Log Analytics workspace with the security solution are billed even when the Defender for Servers plan isn't enabled. Machines with the Azure Monitor Agent are billed only when the plan is enabled on the subscription. The security solution is still required on the workspace to work with the plans features and to be eligible for the 500-MB benefit.
91+
92+
To configure a custom destination workspace for the Azure Monitor Agent:
93+
94+
1. From Defender for Cloud's menu, open **Environment settings**.
95+
1. Select the relevant subscription.
96+
1. Open the **Auto provisioning** page.
97+
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
98+
1. Select **Custom workspace**, and select the workspace that you want to send data to.
99+
100+
### Log analytics workspace solutions
101+
102+
The Azure Monitor Agent requires Log analytics workspace solutions. These solutions are automatically installed when you auto-provision the Azure Monitor Agent with the default workspace.
103+
104+
The required [Log Analytics workspace solutions](/azure/azure-monitor/insights/solutions.md) for the data that you're collecting are:
105+
106+
- Security posture management (CSPM) – **SecurityCenterFree solution**
107+
- Defender for Servers Plan 2 – **Security solution**
108+
109+
### Additional extensions for Defender for Cloud
110+
111+
The Azure Monitor Agent requires additional extensions. The ASA extension, which supports endpoint protection recommendations and fileless attack detection, is automatically installed when you auto-provision the Azure Monitor Agent.
112+
113+
### Additional security events collection
114+
115+
When you auto-provision the Log Analytics agent in Defender for Cloud, you can choose to collect additional security events to the workspace. When you auto-provision the Log Analytics agent in Defender for Cloud, the option to collect additional security events to the workspace isn't available. Defender for Cloud doesn't rely on these security events, but they can be helpful for investigations through Microsoft Sentinel.
116+
117+
If you want to collect security events when you auto-provision the Azure Monitor Agent, you can create a [Data Collection Rule](/azure-monitor/essentials/data-collection-rule-overview.md) to collect the required events.
118+
119+
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](enhanced-security-features-overview.md#faq---pricing-and-billing) daily on defined data types that include security events.
120+
121+
## Next steps
122+
123+
Now that you enabled the Azure Monitor Agent, check out the features that are supported by the agent:
124+
125+
- [Endpoint protection assessment](endpoint-protection-recommendations-technical.md)
126+
- [Adaptive application controls](adaptive-application-controls.md)
127+
- [Fileless attack detection](defender-for-servers-introduction.md#plan-features)

articles/defender-for-cloud/enable-data-collection.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
---
22
title: Configure auto provisioning of agents for Microsoft Defender for Cloud
33
description: This article describes how to set up auto provisioning of the Log Analytics agent and other agents and extensions used by Microsoft Defender for Cloud
4+
author: bmansheim
5+
ms.author: benmansheim
46
ms.topic: quickstart
5-
ms.date: 07/06/2022
7+
ms.date: 08/14/2022
68
ms.custom: mode-other
79
---
810
# Quickstart: Configure auto provisioning for agents and extensions from Microsoft Defender for Cloud
911

1012
Microsoft Defender for Cloud collects data from your resources using the relevant agent or extensions for that resource and the type of data collection you've enabled. Use the procedures below to auto-provision the necessary agents and extensions used by Defender for Cloud to your resources.
1113

12-
:::image type="content" source="media/enable-data-collection/auto-provisioning-list-of-extensions.png" alt-text="Screenshot of Microsoft Defender for Cloud's extensions that can be auto provisioned.":::
14+
When you enable auto provisioning of any of the supported extensions, the extensions are installed on existing and future machines in the subscription. When you **disable** auto provisioning for an extension, the extension is not installed on future machines, but it is also not uninstalled from existing machines.
1315

14-
> [!NOTE]
15-
> When you enable auto provisioning of any of the supported extensions, you'll potentially impact *existing* and *future* machines. But when you **disable** auto provisioning for an extension, you'll only affect the *future* machines: nothing is uninstalled by disabling auto provisioning.
16+
:::image type="content" source="media/enable-data-collection/auto-provisioning-list-of-extensions.png" alt-text="Screenshot of Microsoft Defender for Cloud's extensions that can be auto provisioned.":::
1617

1718
## Prerequisites
1819

@@ -44,6 +45,12 @@ This table shows the availability details for the auto provisioning **feature**
4445
| Policy-based: | :::image type="icon" source="./media/icons/no-icon.png"::: No | :::image type="icon" source="./media/icons/yes-icon.png"::: Yes |
4546
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government, Azure China 21Vianet | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Azure China 21Vianet |
4647

48+
### [**Azure Monitor Agent**](#tab/autoprovision-ama)
49+
50+
[!INCLUDE [azure-monitor-agent-availability](includes/azure-monitor-agent-availability.md)]
51+
52+
Learn more about [using the Azure Monitor Agent with Defender for Cloud](auto-deploy-azure-monitoring-agent.md).
53+
4754
### [**Vulnerability assessment**](#tab/autoprovision-va)
4855

4956
| Aspect | Details |
@@ -94,8 +101,7 @@ By default, auto provisioning is enabled when you enable Defender for Containers
94101

95102
---
96103

97-
> [!TIP]
98-
> For items marked in preview: [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]
104+
[!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]
99105

100106
## How does Defender for Cloud collect data?
101107

@@ -110,9 +116,6 @@ Data is collected using:
110116
- The **Log Analytics agent**, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, and logged in user.
111117
- **Security extensions**, such as the [Azure Policy Add-on for Kubernetes](../governance/policy/concepts/policy-for-kubernetes.md), which can also provide data to Defender for Cloud regarding specialized resource types.
112118

113-
> [!TIP]
114-
> As Defender for Cloud has grown, the types of resources that can be monitored has also grown. The number of extensions has also grown. Auto provisioning has expanded to support additional resource types by leveraging the capabilities of Azure Policy.
115-
116119
## Why use auto provisioning?
117120

118121
Any of the agents and extensions described on this page *can* be installed manually (see [Manual installation of the Log Analytics agent](#manual-agent)). However, **auto provisioning** reduces management overhead by installing all required agents and extensions on existing - and new - machines to ensure faster security coverage for all supported resources.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
author: bmansheim
3+
ms.author: benmansheim
4+
ms.service: defender-for-cloud
5+
ms.topic: include
6+
ms.date: 08/14/2022
7+
---
8+
9+
| Aspect | Details |
10+
|------------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
11+
| Release state: | Preview |
12+
| Relevant Defender plan: | - For [Endpoint protection assessment](../endpoint-protection-recommendations-technical.md): [Security posture management (CSPM)](../overview-page.md) (Free and enabled by default)<br>- For [Adaptive application controls](../adaptive-application-controls.md): [Defender for Servers Plan 2](../defender-for-servers-introduction.md)<br>- For [File Integrity Monitoring](../file-integrity-monitoring-overview.md): [Defender for Servers Plan 2](../defender-for-servers-introduction.md)<br>- For [Fileless attack detection](../defender-for-servers-introduction.md#plan-features): [Defender for Servers Plan 2](../defender-for-servers-introduction.md) |
13+
| Supported destinations: | :::image type="icon" source="../media/icons/yes-icon.png"::: Azure virtual machines<br> :::image type="icon" source="../media/icons/yes-icon.png"::: Azure Arc-enabled machines |
14+
| Policy-based: | :::image type="icon" source="../media/icons/no-icon.png"::: No |
15+
| Clouds: | :::image type="icon" source="../media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="../media/icons/no-icon.png"::: Azure Government, Azure China 21Vianet |
Loading
20.5 KB
Loading
Loading
Loading

0 commit comments

Comments
 (0)