Skip to content

Commit aba64d1

Browse files
committed
Add reference to AMA from auto provisioning
1 parent 23a9a4c commit aba64d1

File tree

3 files changed

+54
-43
lines changed

3 files changed

+54
-43
lines changed

articles/defender-for-cloud/auto-deploy-azure-monitoring-agent.md

Lines changed: 27 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,22 @@
11
---
2-
title: Deploy the Azure Monitor agent with auto provisioning
3-
description: Learn how to deploy the Azure Monitor agent on your Azure, multicloud, and on-premises servers with auto provisioning to support Microsoft Defender for Cloud protections.
2+
title: Deploy the Azure Monitor Agent with auto provisioning
3+
description: Learn how to deploy the Azure Monitor Agent on your Azure, multicloud, and on-premises servers with auto provisioning to support Microsoft Defender for Cloud protections.
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: how-to
77
ms.date: 08/03/2022
88
ms.custom: template-how-to
99
---
1010

11-
# Auto provision the Azure Monitor agent to protect your servers with Microsoft Defender for Cloud
11+
# Auto provision the Azure Monitor Agent to protect your servers with Microsoft Defender for Cloud
1212

13-
To make sure that your server resources are secure, Microsoft Defender for Cloud uses agents installed on your servers to send information about your servers to Microsoft Defender for Cloud for analysis. You can use auto provisioning to quietly deploy the Azure Monitor agent on your servers.
13+
To make sure that your server resources are secure, Microsoft Defender for Cloud uses agents installed on your servers to send information about your servers to Microsoft Defender for Cloud for analysis. You can use auto provisioning to quietly deploy the Azure Monitor Agent on your servers.
1414

1515
In this article, we're going to show you how to use auto provisioning to deploy the agent so that you can protect your servers.
1616

1717
## Availability
1818

19-
| Aspect | Details |
20-
|------------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
21-
| Release state: | Preview |
22-
| Relevant Defender plan: | - For [Endpoint protection assessment](endpoint-protection-recommendations-technical.md): [Security posture management (CSPM)](overview-page.md) (Free and enabled by default)<br>- For [Adaptive application controls](adaptive-application-controls.md): [Defender for Servers Plan 2](defender-for-servers-introduction.md)<br>- For [File Integrity Monitoring](file-integrity-monitoring-overview.md): [Defender for Servers Plan 2](defender-for-servers-introduction.md)<br>- For [Fileless attack detection](defender-for-servers-introduction.md#plan-features): [Defender for Servers Plan 2](defender-for-servers-introduction.md) |
23-
| Supported destinations: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure virtual machines<br> :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Arc-enabled machines |
24-
| Policy-based: | :::image type="icon" source="./media/icons/no-icon.png"::: No |
25-
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Azure China 21Vianet |
26-
19+
[!INCLUDE [azure-monitor-agent-availability](includes/azure-monitor-agent-availability.md)]
2720

2821
## Prerequisites
2922

@@ -35,78 +28,78 @@ Before you enable auto provisioning, you must have the following prerequisites:
3528
- [Onboard your GCP connector](quickstart-onboard-gcp.md) and auto provision Azure Arc.
3629
- Other clouds and on-premises machines
3730
- [Install Azure Arc](/azure/azure-arc/servers/learn/quick-enable-hybrid-vm.md).
38-
- Make sure the Defender plans that you want Azure Monitor agent to support are enabled:
31+
- Make sure the Defender plans that you want the Azure Monitor Agent to support are enabled:
3932
- [Enable Defender for Servers Plan 2 on Azure and on-premises VMs](enable-enhanced-security.md)
4033
- [Enable Defender plans on the subscriptions for your AWS VMs](quickstart-onboard-aws.md)
4134
- [Enable Defender plans on the subscriptions for your GCP VMs](quickstart-onboard-gcp.md)
4235

43-
## Deploy the Azure Monitor agent with auto provisioning
36+
## Deploy the Azure Monitor Agent with auto provisioning
4437

45-
To deploy the Azure Monitor agent with auto provisioning:
38+
To deploy the Azure Monitor Agent with auto provisioning:
4639

4740
1. From Defender for Cloud's menu, open **Environment settings**.
4841
1. Select the relevant subscription.
4942
1. Open the **Auto provisioning** page.
5043

51-
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-auto-provisioning.png" alt-text="Screenshot of the auto provisioning menu item for enabling the Azure Monitor agent.":::
44+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-auto-provisioning.png" alt-text="Screenshot of the auto provisioning menu item for enabling the Azure Monitor Agent.":::
5245

53-
1. Enable deployment of the Azure Monitor agent:
46+
1. Enable deployment of the Azure Monitor Agent:
5447

55-
1. For the **Log Analytics agent/Azure Monitor agent**, select the **On** status.
48+
1. For the **Log Analytics agent/Azure Monitor Agent**, select the **On** status.
5649

5750
In the Configuration column, you can see the enabled agent type. When you enable auto provisioning, Defender for Cloud decides which agent to provision based on your environment. In most cases, the default is the Log Analytics agent.
5851

59-
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of the auto provisioning page for enabling the Azure Monitor agent." lightbox="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png":::
52+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of the auto provisioning page for enabling the Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/turn-on-azure-monitor-agent-auto-provision.png":::
6053

61-
1. For the **Log Analytics agent/Azure Monitor agent**, select **Edit configuration**.
54+
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
6255

63-
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png " alt-text="Screenshot of editing the Azure Monitor agent configuration." lightbox="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png":::
56+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png " alt-text="Screenshot of editing the Azure Monitor Agent configuration." lightbox="media/auto-deploy-azure-monitoring-agent/configure-azure-monitor-agent-auto-provision.png":::
6457

6558
1. For the Auto-provisioning configuration agent type, select **Azure Monitor Agent**.
6659

67-
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of selecting the Azure Monitor agent." lightbox="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png":::
60+
:::image type="content" source="./media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png" alt-text="Screenshot of selecting the Azure Monitor Agent." lightbox="media/auto-deploy-azure-monitoring-agent/select-azure-monitor-agent-auto-provision.png":::
6861

6962
By default:
7063

71-
- The Azure Monitor agent is installed on all existing machines in the subscription that don't already have it installed, and on all new machines created in the subscription.
64+
- The Azure Monitor Agent is installed on all existing machines in the subscription that don't already have it installed, and on all new machines created in the subscription.
7265
- The Log Analytics agent isn't uninstalled from machines that already have it installed. You can [leave the Log Analytics agent](#impact-of-running-with-both-the-log-analytics-and-azure-monitor-agents) on the machine, or you can manually [remove the Log Analytics agent](/azure/azure-monitor/agents/azure-monitor-agent-migration.md) if you don't require it for other protections.
7366
- The agent sends data to the default workspace for the subscription. You can also [configure a custom workspace](#configure-custom-destination-log-analytics-workspace) to send data to.
7467
- You can't enable [collection of additional security events](#additional-security-events-collection).
7568

76-
## Impact of running with both the Log Analytics and Azure Monitor agents
69+
## Impact of running with both the Log Analytics and Azure Monitor Agents
7770

78-
You can run both the Log Analytics and Azure Monitor agents on the same machine, but you should be aware of these considerations:
71+
You can run both the Log Analytics and Azure Monitor Agents on the same machine, but you should be aware of these considerations:
7972

8073
- Certain recommendations or alerts are reported by both agents and appear twice in Defender for Cloud.
8174
- Each machine is billed once in Defender for Cloud, but make sure you track billing of other services connected to the Log Analytics and Azure Monitor, such as the Log Analytics workspace data ingestion.
8275
- Both agents have performance impact on the machine.
8376

8477
When you enable auto provisioning, Defender for Cloud decides which agent to provision. In most cases, the default is the Log Analytics agent.
8578

86-
Learn more about [migrating to the Azure Monitor agent](/azure/azure-monitor/agents/azure-monitor-agent-migration.md).
79+
Learn more about [migrating to the Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-migration.md).
8780

8881
## Custom configurations
8982

9083
### Configure custom destination Log Analytics workspace
9184

92-
When you install the Azure Monitor agent with auto-provisioning, you can define the destination workspace of the installed extensions. By default, the destination is the “default workspace” that Defender for Cloud creates for each region in the subscription: `defaultWorkspace-<subscriptionId>-<regionShortName>`. Defender for Cloud automatically configures the data collection rules, workspace solution, and additional extensions for that workspace.
85+
When you install the Azure Monitor Agent with auto-provisioning, you can define the destination workspace of the installed extensions. By default, the destination is the “default workspace” that Defender for Cloud creates for each region in the subscription: `defaultWorkspace-<subscriptionId>-<regionShortName>`. Defender for Cloud automatically configures the data collection rules, workspace solution, and additional extensions for that workspace.
9386

9487
If you configure a custom Log Analytics workspace:
9588

9689
- Defender for Cloud only configures the data collection rules and additional extensions for the custom workspace. You'll have to configure the workspace solution on the custom workspace.
97-
- Machines with Log Analytics agent that report to a Log Analytics workspace with the security solution are billed even when the Defender for Servers plan isn't enabled. Machines with the Azure Monitor agent are billed only when the plan is enabled on the subscription. The security solution is still required on the workspace to work with the plans features and to be eligible for the 500-MB benefit.
90+
- Machines with Log Analytics agent that report to a Log Analytics workspace with the security solution are billed even when the Defender for Servers plan isn't enabled. Machines with the Azure Monitor Agent are billed only when the plan is enabled on the subscription. The security solution is still required on the workspace to work with the plans features and to be eligible for the 500-MB benefit.
9891

99-
To configure a custom destination workspace for the Azure Monitor agent:
92+
To configure a custom destination workspace for the Azure Monitor Agent:
10093

10194
1. From Defender for Cloud's menu, open **Environment settings**.
10295
1. Select the relevant subscription.
10396
1. Open the **Auto provisioning** page.
104-
1. For the **Log Analytics agent/Azure Monitor agent**, select **Edit configuration**.
97+
1. For the **Log Analytics agent/Azure Monitor Agent**, select **Edit configuration**.
10598
1. Select **Custom workspace**, and select the workspace that you want to send data to.
10699

107100
### Log analytics workspace solutions
108101

109-
The Azure Monitor agent requires Log analytics workspace solutions. These solutions are automatically installed when you auto-provision the Azure Monitor agent with the default workspace.
102+
The Azure Monitor Agent requires Log analytics workspace solutions. These solutions are automatically installed when you auto-provision the Azure Monitor Agent with the default workspace.
110103

111104
The required [Log Analytics workspace solutions](/azure/azure-monitor/insights/solutions.md) for the data that you're collecting are:
112105

@@ -115,7 +108,7 @@ The required [Log Analytics workspace solutions](/azure/azure-monitor/insights/s
115108

116109
### Additional extensions for Defender for Cloud
117110

118-
The Azure Monitor agent requires additional extensions. These extensions are automatically installed when you auto-provision the Azure Monitor agent:
111+
The Azure Monitor Agent requires additional extensions. These extensions are automatically installed when you auto-provision the Azure Monitor Agent:
119112

120113
- For fileless attack detection: ASA extension
121114
- For endpoint protection recommendations and fileless attack detection: ASA extension
@@ -124,13 +117,13 @@ The Azure Monitor agent requires additional extensions. These extensions are aut
124117

125118
When you auto-provision the Log Analytics agent in Defender for Cloud, you can choose to collect additional security events to the workspace. When you auto-provision the Log Analytics agent in Defender for Cloud, the option to collect additional security events to the workspace isn't available. Defender for Cloud doesn't rely on these security events, but they can be helpful for investigations through Microsoft Sentinel.
126119

127-
If you want to collect security events when you auto-provision the Azure Monitor agent, you can create a [Data Collection Rule](/azure-monitor/essentials/data-collection-rule-overview.md) to collect the required events.
120+
If you want to collect security events when you auto-provision the Azure Monitor Agent, you can create a [Data Collection Rule](/azure-monitor/essentials/data-collection-rule-overview.md) to collect the required events.
128121

129122
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](enhanced-security-features-overview.md#faq---pricing-and-billing) daily on defined data types that include security events.
130123

131124
## Next steps
132125

133-
Now that you enabled the Azure Monitor agent, check out the features that are supported by the agent:
126+
Now that you enabled the Azure Monitor Agent, check out the features that are supported by the agent:
134127

135128
- [Endpoint protection assessment](endpoint-protection-recommendations-technical.md)
136129
- [Adaptive application controls](adaptive-application-controls.md)

0 commit comments

Comments
 (0)