You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/agents/data-sources-firewall-logs.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ To complete this procedure, you need:
26
26
## Add Firewall table to Log Analytics Workspace
27
27
Unlike other tables that are created by default in LAW, the Windows Firewall table must be manually created. Search for the Security and Audit solution and create it. See screen shot below. If the table isn't present you'll get a DCR deployment error stating that the table isn't present in LAW. The schema for the firewall table that gets created is located here: [Windows Firewall Schema](../../reference/tables/windowsfirewall.md)
28
28
29
-
[](media/data-collection-firewall-logs/security-and-audit-solution.png#lightbox)
29
+
[](./media/data-collection-firewall-log/security-and-audit-solution.png#lightbox)
30
30
31
31
## Create a data collection rule to collect firewall logs
32
32
The [data collection rule](../essentials/data-collection-rule-overview.md) defines:
@@ -43,14 +43,14 @@ To create the data collection rule in the Azure portal:
43
43
1. On the **Monitor** menu, select **Data Collection Rules**.
44
44
1. Select **Create** to create a new data collection rule and associations.
45
45
46
-
[](media/data-collection-firewall-logs/data-collection-rules-updated.png#lightbox)
46
+
[](media/data-collection-firewall-log/data-collection-rules-updated.png#lightbox)
47
47
48
48
1. Enter a **Rule name** and specify a **Subscription**, **Resource Group**, **Region**, and **Platform Type**:
49
49
-**Region** specifies where the DCR will be created. The virtual machines and their associations can be in any subscription or resource group in the tenant.
50
50
-**Platform Type** specifies the type of resources this rule can apply to. The **Custom** option allows for both Windows and Linux types.
51
51
-**Data Collection End Point** select a previously created data [collection end point](../essentials/data-collection-endpoint-overview.md).
52
52
53
-
[](media/data-collection-firewall-logs/data-collection-rule-basics-updated.png#lightbox)
53
+
[](media/data-collection-firewall-log/data-collection-rule-basics-updated.png#lightbox)
54
54
1. On the **Resources** tab: Select **+ Add resources** and associate resources with the data collection rule. Resources can be Virtual Machines, Virtual Machine Scale Sets, and Azure Arc for servers. The Azure portal installs Azure Monitor Agent on resources that don't already have it installed.
55
55
56
56
> [!IMPORTANT]
@@ -62,11 +62,11 @@ To create the data collection rule in the Azure portal:
62
62
1. On the **Collect and deliver** tab, select **Add data source** to add a data source and set a destination.
63
63
1. Select **Firewall Logs**.
64
64
65
-
[](media/data-collection-firewall-logs/firewall-data-collection-rule.png#lightbox)
65
+
[](media/data-collection-firewall-log/firewall-data-collection-rule.png#lightbox)
66
66
67
67
1. On the **Destination** tab, add one or more destinations for the data source. You can select multiple destinations of the same or different types. For instance, you can select multiple Log Analytics workspaces, which is also known as multihoming.
68
68
69
-
[](media/data-collection-firewall-logs/data-collection-rule-destination.png#lightbox)
69
+
[](media/data-collection-firewall-log/data-collection-rule-destination.png#lightbox)
70
70
71
71
1. Select **Review + create** to review the details of the data collection rule and association with the set of virtual machines.
72
72
1. Select **Create** to create the data collection rule.
@@ -84,7 +84,7 @@ Count the firewall log entries by URL for the host www.contoso.com.
84
84
| take 10
85
85
```
86
86
87
-
[  ](media/data-collection-firewall-logs/law-query-results.png#lightbox)
87
+
[  ](media/data-collection-firewall-log/law-query-results.png#lightbox)
88
88
89
89
## Troubleshoot
90
90
Use the following steps to troubleshoot the collection of firewall logs.
@@ -104,14 +104,14 @@ WindowsFirewall
104
104
### Verify that firewall logs are being created
105
105
Look at the timestamps of the log files and open the latest to see that latest timestamps are present in the log files. The default location for firewall log files is C:\windows\system32\logfiles\firewall\pfirewall.log.
106
106
107
-
[](media/data-collection-firewall-logs/firewall-files-on-disk.png#lightbox)
107
+
[](media/data-collection-firewall-log/firewall-files-on-disk.png#lightbox)
[](media/data-collection-firewall-logs/turn-on-firewall-logging.png#lightbox)
114
+
[](media/data-collection-firewall-log/turn-on-firewall-logging.png#lightbox)
0 commit comments