You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-troubleshooting-guide.md
+53-23Lines changed: 53 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Azure Security Center Troubleshooting Guide | Microsoft Docs
3
3
description: This document helps troubleshoot issues in Azure Security Center.
4
4
services: security-center
5
-
author: memildin
6
-
manager: rkarlin
5
+
author: v-miegge
6
+
manager: dcscontentpm
7
7
8
8
ms.service: security-center
9
9
ms.topic: conceptual
@@ -12,14 +12,35 @@ ms.author: memildin
12
12
13
13
---
14
14
# Azure Security Center Troubleshooting Guide
15
+
15
16
This guide is for information technology (IT) professionals, information security analysts, and cloud administrators whose organizations are using Azure Security Center and need to troubleshoot Security Center related issues.
16
17
17
-
>[!NOTE]
18
-
>Security Center uses the Microsoft Monitoring Agent to collect and store data. See [Azure Security Center Platform Migration](security-center-platform-migration.md) to learn more.
19
-
>
18
+
Security Center uses the Microsoft Monitoring Agent to collect and store data. See [Azure Security Center Platform Migration](security-center-platform-migration.md) to learn more. The information in this article represents Security Center functionality after transition to the Microsoft Monitoring Agent.
20
19
21
20
## Troubleshooting guide
22
-
This guide explains how to troubleshoot Security Center related issues. Most of the troubleshooting done in Security Center takes place by first looking at the [Audit Log](../azure-monitor/platform/activity-logs-overview.md) records for the failed component. Through audit logs, you can determine:
21
+
22
+
This guide explains how to troubleshoot Security Center related issues.
23
+
24
+
Alert types:
25
+
26
+
* Virtual Machine Behavioral Analysis (VMBA)
27
+
* Network Analysis
28
+
* SQL Database and SQL Data Warehouse Analysis
29
+
* Contextual Information
30
+
31
+
Depending on the alert types, customers can gather the necessary information to investigate the alert by using the following resources:
32
+
33
+
* Security logs in the Virtual Machine (VM) event viewer in Windows
34
+
* AuditD in Linux
35
+
* The Azure activity logs, and the enable diagnostic logs on the attack resource.
36
+
37
+
For some alerts we also have a confidence score. The confidence score in **Security Center** can help your team triage and prioritize alerts. **Security Center** automatically applies industry best practices, intelligent algorithms, and processes used by analysts to determine whether a threat is legitimate and provides meaningful insights in the form of a confidence score.
38
+
39
+
Customers can share feedback for the alert description and relevance. Navigate to the alert itself, select the **Was This Useful** button, select the reason, and then enter a comment to explain which explains the feedback. We consistently monitor this feedback channel to improve our alerts.
40
+
41
+
## Audit log
42
+
43
+
Most of the troubleshooting done in Security Center takes place by first looking at the [Audit Log](../azure-monitor/platform/activity-logs-overview.md) records for the failed component. Through audit logs, you can determine:
23
44
24
45
* Which operations were taken place
25
46
* Who initiated the operation
@@ -30,6 +51,7 @@ This guide explains how to troubleshoot Security Center related issues. Most of
30
51
The audit log contains all write operations (PUT, POST, DELETE) performed on your resources, however it does not include read operations (GET).
31
52
32
53
## Microsoft Monitoring Agent
54
+
33
55
Security Center uses the Microsoft Monitoring Agent – this is the same agent used by the Azure Monitor service – to collect security data from your Azure virtual machines. After data collection is enabled and the agent is correctly installed in the target machine, the process below should be in execution:
34
56
35
57
* HealthService.exe
@@ -42,19 +64,19 @@ To see which version of the agent you have, open **Task Manager**, in the **Proc
## Microsoft Monitoring Agent installation scenarios
68
+
47
69
There are two installation scenarios that can produce different results when installing the Microsoft Monitoring Agent on your computer. The supported scenarios are:
48
70
49
71
***Agent installed automatically by Security Center**: in this scenario you will be able to view the alerts in both locations, Security Center and Log search. You will receive email notifications to the email address that was configured in the security policy for the subscription the resource belongs to.
50
-
.
72
+
51
73
***Agent manually installed on a VM located in Azure**: in this scenario, if you are using agents downloaded and installed manually prior to February 2017, you can view the alerts in the Security Center portal only if you filter on the subscription the workspace belongs to. If you filter on the subscription the resource belongs to, you won’t see any alerts. You'll receive email notifications to the email address that was configured in the security policy for the subscription the workspace belongs to.
52
74
53
-
>[!NOTE]
75
+
>[!NOTE]
54
76
> To avoid the behavior explained in the second scenario, make sure you download the latest version of the agent.
55
-
>
56
77
57
78
## Monitoring agent health issues <aname="mon-agent"></a>
79
+
58
80
**Monitoring state** defines the reason Security Center is unable to successfully monitor VMs and computers initialized for automatic provisioning. The following table shows the **Monitoring state** values, descriptions, and resolution steps.
59
81
60
82
| Monitoring state | Description | Resolution steps |
@@ -70,12 +92,12 @@ There are two installation scenarios that can produce different results when ins
70
92
| Agent not responsive or missing ID | Security Center is unable to retrieve security data scanned from the VM, even though the agent is installed. | The agent is not reporting any data, including heartbeat. The agent might be damaged or something is blocking traffic. Or, the agent is reporting data but is missing an Azure resource ID so it’s impossible to match the data to the Azure VM. To troubleshoot Linux, see [Troubleshooting Guide for Log Analytics Agent for Linux](https://github.com/Microsoft/OMS-Agent-for-Linux/blob/master/docs/Troubleshooting.md#im-not-seeing-any-linux-data-in-the-oms-portal). To troubleshoot Windows, see [Troubleshooting Windows Virtual Machines](https://github.com/MicrosoftDocs/azure-docs/blob/8c53ac4371d482eda3d85819a4fb8dac09996a89/articles/log-analytics/log-analytics-azure-vm-extension.md#troubleshooting-windows-virtual-machines). |
71
93
| Agent not installed | Data collection is disabled. | Turn on data collection in the security policy or manually install the Microsoft Monitoring Agent. |
For agents to connect to and register with Security Center, they must have access to network resources, including the port numbers and domain URLs.
76
98
77
-
- For proxy servers, you need to ensure that the appropriate proxy server resources are configured in agent settings. Read this article for more information on [how to change the proxy settings](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents).
78
-
- For firewalls that restrict access to the Internet, you need to configure your firewall to permit access to Log Analytics. No action is needed in agent settings.
99
+
* For proxy servers, you need to ensure that the appropriate proxy server resources are configured in agent settings. Read this article for more information on [how to change the proxy settings](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents).
100
+
* For firewalls that restrict access to the Internet, you need to configure your firewall to permit access to Log Analytics. No action is needed in agent settings.
79
101
80
102
The following table shows resources needed for communication.
81
103
@@ -86,20 +108,19 @@ The following table shows resources needed for communication.
86
108
|*.blob.core.windows.net | 443 | Yes |
87
109
|*.azure-automation.net | 443 | Yes |
88
110
89
-
If you encounter onboarding issues with the agent, make sure to read the article [How to troubleshoot Operations Management Suite onboarding issues](https://support.microsoft.com/en-us/help/3126513/how-to-troubleshoot-operations-management-suite-onboarding-issues).
90
-
111
+
If you encounter onboarding issues with the agent, make sure to read the article [How to troubleshoot Operations Management Suite onboarding issues](https://support.microsoft.com/help/3126513/how-to-troubleshoot-operations-management-suite-onboarding-issues).
91
112
92
113
## Troubleshooting endpoint protection not working properly
93
114
94
115
The guest agent is the parent process of everything the [Microsoft Antimalware](../security/fundamentals/antimalware.md) extension does. When the guest agent process fails, the Microsoft Antimalware that runs as a child process of the guest agent may also fail. In scenarios like that is recommended to verify the following options:
95
116
96
-
- If the target VM is a custom image and the creator of the VM never installed guest agent.
97
-
- If the target is a Linux VM instead of a Windows VM then installing the Windows version of the antimalware extension on a Linux VM will fail. The Linux guest agent has specific requirements in terms of OS version and required packages, and if those requirements are not met the VM agent will not work there either.
98
-
- If the VM was created with an old version of guest agent. If it was, you should be aware that some old agents could not auto-update itself to the newer version and this could lead to this problem. Always use the latest version of guest agent if creating your own images.
99
-
- Some third-party administration software may disable the guest agent, or block access to certain file locations. If you have third-party installed on your VM, make sure that the agent is on the exclusion list.
100
-
- Certain firewall settings or Network Security Group (NSG) may block network traffic to and from guest agent.
101
-
- Certain Access Control List (ACL) may prevent disk access.
102
-
- Lack of disk space can block the guest agent from functioning properly.
117
+
* If the target VM is a custom image and the creator of the VM never installed guest agent.
118
+
* If the target is a Linux VM instead of a Windows VM then installing the Windows version of the antimalware extension on a Linux VM will fail. The Linux guest agent has specific requirements in terms of OS version and required packages, and if those requirements are not met the VM agent will not work there either.
119
+
* If the VM was created with an old version of guest agent. If it was, you should be aware that some old agents could not auto-update itself to the newer version and this could lead to this problem. Always use the latest version of guest agent if creating your own images.
120
+
* Some third-party administration software may disable the guest agent, or block access to certain file locations. If you have third-party installed on your VM, make sure that the agent is on the exclusion list.
121
+
* Certain firewall settings or Network Security Group (NSG) may block network traffic to and from guest agent.
122
+
* Certain Access Control List (ACL) may prevent disk access.
123
+
* Lack of disk space can block the guest agent from functioning properly.
103
124
104
125
By default the Microsoft Antimalware User Interface is disabled, read [Enabling Microsoft Antimalware User Interface on Azure Resource Manager VMs Post Deployment](https://blogs.msdn.microsoft.com/azuresecurity/2016/03/09/enabling-microsoft-antimalware-user-interface-post-deployment/) for more information on how to enable it if you need.
105
126
@@ -108,17 +129,26 @@ By default the Microsoft Antimalware User Interface is disabled, read [Enabling
108
129
If you experience issues loading the Security Center dashboard, ensure that the user that registers the subscription to Security Center (i.e. the first user one who opened Security Center with the subscription) and the user who would like to turn on data collection should be *Owner* or *Contributor* on the subscription. From that moment on also users with *Reader* on the subscription can see the dashboard/alerts/recommendation/policy.
109
130
110
131
## Contacting Microsoft Support
132
+
111
133
Some issues can be identified using the guidelines provided in this article, others you can also find documented at the Security Center public [Forum](https://social.msdn.microsoft.com/Forums/en-US/home?forum=AzureSecurityCenter). However if you need further troubleshooting, you can open a new support request using **Azure portal** as shown below:
In this document, you learned how to configure security policies in Azure Security Center. To learn more about Azure Security Center, see the following:
118
140
119
141
*[Azure Security Center Planning and Operations Guide](security-center-planning-and-operations-guide.md) — Learn how to plan and understand the design considerations to adopt Azure Security Center.
120
142
*[Security health monitoring in Azure Security Center](security-center-monitoring.md) — Learn how to monitor the health of your Azure resources
121
143
*[Managing and responding to security alerts in Azure Security Center](security-center-managing-and-responding-alerts.md) — Learn how to manage and respond to security alerts
144
+
*[Understanding security alerts in Azure Security Center](security-center-alerts-type.md)
145
+
*[Tutorial: Respond to security incidents](tutorial-security-incident.md)
146
+
*[Alerts Validation in Azure Security Center](security-center-alert-validation.md)
147
+
*[Email Notifications in Azure Security Center](security-center-provide-security-contact-details.md)
148
+
*[Handling Security Incidents in Azure Security Center](security-center-incident.md)
*[Investigate Incidents and Alerts in Azure Security Center](security-center-investigation.md)
151
+
*[Azure Security Center detection capabilities](security-center-detection-capabilities.md)
122
152
*[Monitoring partner solutions with Azure Security Center](security-center-partner-solutions.md) — Learn how to monitor the health status of your partner solutions.
123
153
*[Azure Security Center FAQ](security-center-faq.md) — Find frequently asked questions about using the service
124
154
*[Azure Security Blog](https://blogs.msdn.com/b/azuresecurity/) — Find blog posts about Azure security and compliance
0 commit comments