|
| 1 | +--- |
| 2 | +title: Deploy the Azure Monitor Agent with auto provisioning |
| 3 | +description: Learn how to deploy the Azure Monitor Agent on your Azure, multicloud, and on-premises servers with auto provisioning to support Microsoft Defender for Cloud protections. |
| 4 | +author: bmansheim |
| 5 | +ms.author: benmansheim |
| 6 | +ms.topic: how-to |
| 7 | +ms.date: 08/03/2022 |
| 8 | +ms.custom: template-how-to |
| 9 | +--- |
| 10 | + |
| 11 | +# Auto provision the Azure Monitor Agent to protect your servers with Microsoft Defender for Cloud |
| 12 | + |
| 13 | +To make sure that your server resources are secure, Microsoft Defender for Cloud uses agents installed on your servers to send information about your servers to Microsoft Defender for Cloud for analysis. You can use auto provisioning to quietly deploy the Azure Monitor Agent on your servers. |
| 14 | + |
| 15 | +In this article, we're going to show you how to use auto provisioning to deploy the agent so that you can protect your servers. |
| 16 | + |
| 17 | +## Availability |
| 18 | + |
| 19 | +[!INCLUDE [azure-monitor-agent-availability](includes/azure-monitor-agent-availability.md)] |
| 20 | + |
| 21 | +## Prerequisites |
| 22 | + |
| 23 | +Before you enable auto provisioning, you must have the following prerequisites: |
| 24 | + |
| 25 | +- Make sure your multicloud and on-premises machines have Azure Arc installed. |
| 26 | + - AWS and GCP machines |
| 27 | + - [Onboard your AWS connector](quickstart-onboard-aws.md) and auto provision Azure Arc. |
| 28 | + - [Onboard your GCP connector](quickstart-onboard-gcp.md) and auto provision Azure Arc. |
| 29 | + - Other clouds and on-premises machines |
| 30 | + - [Install Azure Arc](/azure/azure-arc/servers/learn/quick-enable-hybrid-vm.md). |
| 31 | +- Make sure the Defender plans that you want the Azure Monitor Agent to support are enabled: |
| 32 | + - [Enable Defender for Servers Plan 2 on Azure and on-premises VMs](enable-enhanced-security.md) |
| 33 | + - [Enable Defender plans on the subscriptions for your AWS VMs](quickstart-onboard-aws.md) |
| 34 | + - [Enable Defender plans on the subscriptions for your GCP VMs](quickstart-onboard-gcp.md) |
| 35 | + |
| 36 | +## Deploy the Azure Monitor Agent with auto provisioning |
| 37 | + |
| 38 | +To deploy the Azure Monitor Agent with auto provisioning: |
| 39 | + |
| 40 | +1. From Defender for Cloud's menu, open **Environment settings**. |
| 41 | +1. Select the relevant subscription. |
| 42 | +1. Open the **Auto provisioning** page. |
| 43 | + |
| 44 | + :::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-auto-provisioning.png" alt-text="Screenshot of the auto provisioning menu item for enabling the Azure Monitor Agent."::: |
| 45 | + |
| 46 | +1. Enable deployment of the Azure Monitor Agent: |
| 47 | + |
| 48 | + 1. For the **Log Analytics agent/Azure Monitor Agent**, select the **On** status. |
| 49 | + |
| 50 | + In the Configuration column, you can see the enabled agent type. When you enable auto provisioning, Defender for Cloud decides which agent to provision based on your environment. In most cases, the default is the Log Analytics agent. |
| 51 | + |
| 52 | + :::image type="content" source="./media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of the auto provisioning page for enabling the Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png"::: |
| 53 | + |
| 54 | + 1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**. |
| 55 | + |
| 56 | + :::image type="content" source="./media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png " alt-text="Screenshot of editing the Azure Monitor Agent configuration." lightbox="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png"::: |
| 57 | + |
| 58 | + 1. For the Auto-provisioning configuration agent type, select **Azure Monitor Agent**. |
| 59 | + |
| 60 | + :::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of selecting the Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png"::: |
| 61 | + |
| 62 | + By default: |
| 63 | + |
| 64 | + - The Azure Monitor Agent is installed on all existing machines in the selected subscription, and on all new machines created in the subscription. |
| 65 | + - The Log Analytics agent isn't uninstalled from machines that already have it installed. You can [leave the Log Analytics agent](#impact-of-running-with-both-the-log-analytics-and-azure-monitor-agents) on the machine, or you can manually [remove the Log Analytics agent](/azure/azure-monitor/agents/azure-monitor-agent-migration.md) if you don't require it for other protections. |
| 66 | + - The agent sends data to the default workspace for the subscription. You can also [configure a custom workspace](#configure-custom-destination-log-analytics-workspace) to send data to. |
| 67 | + - You can't enable [collection of additional security events](#additional-security-events-collection). |
| 68 | + |
| 69 | +## Impact of running with both the Log Analytics and Azure Monitor Agents |
| 70 | + |
| 71 | +You can run both the Log Analytics and Azure Monitor Agents on the same machine, but you should be aware of these considerations: |
| 72 | + |
| 73 | +- Certain recommendations or alerts are reported by both agents and appear twice in Defender for Cloud. |
| 74 | +- Each machine is billed once in Defender for Cloud, but make sure you track billing of other services connected to the Log Analytics and Azure Monitor, such as the Log Analytics workspace data ingestion. |
| 75 | +- Both agents have performance impact on the machine. |
| 76 | + |
| 77 | +When you enable auto provisioning, Defender for Cloud decides which agent to provision. In most cases, the default is the Log Analytics agent. |
| 78 | + |
| 79 | +Learn more about [migrating to the Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-migration.md). |
| 80 | + |
| 81 | +## Custom configurations |
| 82 | + |
| 83 | +### Configure custom destination Log Analytics workspace |
| 84 | + |
| 85 | +When you install the Azure Monitor Agent with auto-provisioning, you can define the destination workspace of the installed extensions. By default, the destination is the “default workspace” that Defender for Cloud creates for each region in the subscription: `defaultWorkspace-<subscriptionId>-<regionShortName>`. Defender for Cloud automatically configures the data collection rules, workspace solution, and additional extensions for that workspace. |
| 86 | + |
| 87 | +If you configure a custom Log Analytics workspace: |
| 88 | + |
| 89 | +- Defender for Cloud only configures the data collection rules and additional extensions for the custom workspace. You'll have to configure the workspace solution on the custom workspace. |
| 90 | +- Machines with Log Analytics agent that report to a Log Analytics workspace with the security solution are billed even when the Defender for Servers plan isn't enabled. Machines with the Azure Monitor Agent are billed only when the plan is enabled on the subscription. The security solution is still required on the workspace to work with the plans features and to be eligible for the 500-MB benefit. |
| 91 | + |
| 92 | +To configure a custom destination workspace for the Azure Monitor Agent: |
| 93 | + |
| 94 | +1. From Defender for Cloud's menu, open **Environment settings**. |
| 95 | +1. Select the relevant subscription. |
| 96 | +1. Open the **Auto provisioning** page. |
| 97 | +1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**. |
| 98 | +1. Select **Custom workspace**, and select the workspace that you want to send data to. |
| 99 | + |
| 100 | +### Log analytics workspace solutions |
| 101 | + |
| 102 | +The Azure Monitor Agent requires Log analytics workspace solutions. These solutions are automatically installed when you auto-provision the Azure Monitor Agent with the default workspace. |
| 103 | + |
| 104 | +The required [Log Analytics workspace solutions](/azure/azure-monitor/insights/solutions.md) for the data that you're collecting are: |
| 105 | + |
| 106 | + - Security posture management (CSPM) – **SecurityCenterFree solution** |
| 107 | + - Defender for Servers Plan 2 – **Security solution** |
| 108 | + |
| 109 | +### Additional extensions for Defender for Cloud |
| 110 | + |
| 111 | +The Azure Monitor Agent requires additional extensions. The ASA extension, which supports endpoint protection recommendations and fileless attack detection, is automatically installed when you auto-provision the Azure Monitor Agent. |
| 112 | + |
| 113 | +### Additional security events collection |
| 114 | + |
| 115 | +When you auto-provision the Log Analytics agent in Defender for Cloud, you can choose to collect additional security events to the workspace. When you auto-provision the Log Analytics agent in Defender for Cloud, the option to collect additional security events to the workspace isn't available. Defender for Cloud doesn't rely on these security events, but they can be helpful for investigations through Microsoft Sentinel. |
| 116 | + |
| 117 | +If you want to collect security events when you auto-provision the Azure Monitor Agent, you can create a [Data Collection Rule](/azure-monitor/essentials/data-collection-rule-overview.md) to collect the required events. |
| 118 | + |
| 119 | +Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](enhanced-security-features-overview.md#faq---pricing-and-billing) daily on defined data types that include security events. |
| 120 | + |
| 121 | +## Next steps |
| 122 | + |
| 123 | +Now that you enabled the Azure Monitor Agent, check out the features that are supported by the agent: |
| 124 | + |
| 125 | +- [Endpoint protection assessment](endpoint-protection-recommendations-technical.md) |
| 126 | +- [Adaptive application controls](adaptive-application-controls.md) |
| 127 | +- [Fileless attack detection](defender-for-servers-introduction.md#plan-features) |
0 commit comments