Skip to content

Commit aa0c913

Browse files
Update data-sources-firewall-logs.md
1 parent f1736b8 commit aa0c913

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/azure-monitor/agents/data-sources-firewall-logs.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To complete this procedure, you need:
2626
## Add Firewall table to Log Analytics Workspace
2727
Unlike other tables that are created by default in LAW, the Windows Firewall table must be manually created. Search for the Security and Audit solution and create it. See screen shot below. If the table isn't present you'll get a DCR deployment error stating that the table isn't present in LAW. The schema for the firewall table that gets created is located here: [Windows Firewall Schema](../../reference/tables/windowsfirewall.md)
2828

29-
[ ![Screenshot that shows how to add the security and audit solution.](media/data-collection-firewall-logs/security-and-audit-solution.png) ](media/data-collection-firewall-logs/security-and-audit-solution.png#lightbox)
29+
[ ![Screenshot that shows how to add the security and audit solution.](media/data-collection-firewall-log/security-and-audit-solution.png) ](./media/data-collection-firewall-log/security-and-audit-solution.png#lightbox)
3030

3131
## Create a data collection rule to collect firewall logs
3232
The [data collection rule](../essentials/data-collection-rule-overview.md) defines:
@@ -43,14 +43,14 @@ To create the data collection rule in the Azure portal:
4343
1. On the **Monitor** menu, select **Data Collection Rules**.
4444
1. Select **Create** to create a new data collection rule and associations.
4545

46-
[ ![Screenshot that shows the Create button on the Data Collection Rules screen.](media/data-collection-firewall-logs/data-collection-rules-updated.png) ](media/data-collection-firewall-logs/data-collection-rules-updated.png#lightbox)
46+
[ ![Screenshot that shows the Create button on the Data Collection Rules screen.](media/data-collection-firewall-log/data-collection-rules-updated.png) ](media/data-collection-firewall-log/data-collection-rules-updated.png#lightbox)
4747

4848
1. Enter a **Rule name** and specify a **Subscription**, **Resource Group**, **Region**, and **Platform Type**:
4949
- **Region** specifies where the DCR will be created. The virtual machines and their associations can be in any subscription or resource group in the tenant.
5050
- **Platform Type** specifies the type of resources this rule can apply to. The **Custom** option allows for both Windows and Linux types.
5151
-**Data Collection End Point** select a previously created data [collection end point](../essentials/data-collection-endpoint-overview.md).
5252

53-
[ ![Screenshot that shows the Basics tab of the Data Collection Rule screen.](media/data-collection-firewall-logs/data-collection-rule-basics-updated.png) ](media/data-collection-firewall-logs/data-collection-rule-basics-updated.png#lightbox)
53+
[ ![Screenshot that shows the Basics tab of the Data Collection Rule screen.](media/data-collection-firewall-log/data-collection-rule-basics-updated.png) ](media/data-collection-firewall-log/data-collection-rule-basics-updated.png#lightbox)
5454
1. On the **Resources** tab: Select **+ Add resources** and associate resources with the data collection rule. Resources can be Virtual Machines, Virtual Machine Scale Sets, and Azure Arc for servers. The Azure portal installs Azure Monitor Agent on resources that don't already have it installed.
5555

5656
> [!IMPORTANT]
@@ -62,11 +62,11 @@ To create the data collection rule in the Azure portal:
6262
1. On the **Collect and deliver** tab, select **Add data source** to add a data source and set a destination.
6363
1. Select **Firewall Logs**.
6464

65-
[ ![Screenshot that shows the Azure portal form to select firewall logs in a data collection rule.](media/data-collection-firewall-logs/firewall-data-collection-rule.png)](media/data-collection-firewall-logs/firewall-data-collection-rule.png#lightbox)
65+
[ ![Screenshot that shows the Azure portal form to select firewall logs in a data collection rule.](media/data-collection-firewall-log/firewall-data-collection-rule.png)](media/data-collection-firewall-log/firewall-data-collection-rule.png#lightbox)
6666

6767
1. On the **Destination** tab, add one or more destinations for the data source. You can select multiple destinations of the same or different types. For instance, you can select multiple Log Analytics workspaces, which is also known as multihoming.
6868

69-
[ ![Screenshot that shows the Azure portal form to add a data source in a data collection rule.](media/data-collection-firewall-logs/data-collection-rule-destination.png) ](media/data-collection-firewall-logs/data-collection-rule-destination.png#lightbox)
69+
[ ![Screenshot that shows the Azure portal form to add a data source in a data collection rule.](media/data-collection-firewall-log/data-collection-rule-destination.png) ](media/data-collection-firewall-log/data-collection-rule-destination.png#lightbox)
7070

7171
1. Select **Review + create** to review the details of the data collection rule and association with the set of virtual machines.
7272
1. Select **Create** to create the data collection rule.
@@ -84,7 +84,7 @@ Count the firewall log entries by URL for the host www.contoso.com.
8484
| take 10
8585
```
8686

87-
[ ![Screenshot that shows the results of a Firewall log query.](media/data-collection-firewall-logs/law-query-results.png) ](media/data-collection-firewall-logs/law-query-results.png#lightbox)
87+
[ ![Screenshot that shows the results of a Firewall log query.](media/data-collection-firewall-log/law-query-results.png) ](media/data-collection-firewall-log/law-query-results.png#lightbox)
8888

8989
## Troubleshoot
9090
Use the following steps to troubleshoot the collection of firewall logs.
@@ -104,14 +104,14 @@ WindowsFirewall
104104
### Verify that firewall logs are being created
105105
Look at the timestamps of the log files and open the latest to see that latest timestamps are present in the log files. The default location for firewall log files is C:\windows\system32\logfiles\firewall\pfirewall.log.
106106

107-
[ ![Screenshot that shows firewall logs on a local disk.](media/data-collection-firewall-logs/firewall-files-on-disk.png) ](media/data-collection-firewall-logs/firewall-files-on-disk.png#lightbox)
107+
[ ![Screenshot that shows firewall logs on a local disk.](media/data-collection-firewall-log/firewall-files-on-disk.png) ](media/data-collection-firewall-log/firewall-files-on-disk.png#lightbox)
108108

109109
To turn on logging follow these steps.
110110
1. gpedit {follow the picture}​
111111
2. netsh advfirewall>set allprofiles logging allowedconnections enable​
112112
3. netsh advfirewall>set allprofiles logging droppedconnections enable​
113113

114-
[ ![Screenshot that show all the steps to turn on logging.](media/data-collection-firewall-logs/turn-on-firewall-logging.png) ](media/data-collection-firewall-logs/turn-on-firewall-logging.png#lightbox)
114+
[ ![Screenshot that show all the steps to turn on logging.](media/data-collection-firewall-log/turn-on-firewall-logging.png) ](media/data-collection-firewall-log/turn-on-firewall-logging.png#lightbox)
115115

116116
## Next steps
117117
Learn more about:

0 commit comments

Comments
 (0)