You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-partner-integration.md
+27-68Lines changed: 27 additions & 68 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,16 +11,13 @@ ms.topic: conceptual
11
11
ms.devlang: na
12
12
ms.tgt_pltfrm: na
13
13
ms.workload: na
14
-
ms.date: 03/20/2019
14
+
ms.date: 04/19/2020
15
15
ms.author: memildin
16
16
17
17
---
18
18
# Integrate security solutions in Azure Security Center
19
19
This document helps you to manage security solutions already connected to Azure Security Center and add new ones.
20
20
21
-
> [!NOTE]
22
-
> A subset of security solutions has been retired on July 31st, 2019. For more information and alternative services, see [Retirement of Security Center features (July 2019)](security-center-features-retirement-july2019.md#menu_solutions).
23
-
24
21
## Integrated Azure security solutions
25
22
Security Center makes it easy to enable integrated security solutions in Azure. Benefits include:
26
23
@@ -32,25 +29,31 @@ Currently, integrated security solutions include vulnerability assessment by [Qu
32
29
33
30
> [!NOTE]
34
31
> Security Center does not install the Log Analytics agent on partner virtual appliances because most security vendors prohibit external agents running on their appliances.
35
-
>
36
-
>
32
+
33
+
To learn more about the integration of vulnerability scanning tools from Qualys, including a built-in scanner available to standard tier customers, see:
34
+
35
+
-[Integrated vulnerability scanner for virtual machines](built-in-vulnerability-assessment.md).
36
+
-[Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md).
37
+
38
+
Security Center also offers vulnerability analysis for your:
39
+
40
+
* SQL databases - see [Explore vulnerability assessment reports in the vulnerability assessment dashboard](security-center-iaas-advanced-data.md#explore-vulnerability-assessment-reports)
41
+
* Azure Container Registry images - see [Azure Container Registry integration with Security Center (Preview)](azure-container-registry-integration.md)
37
42
38
43
## How security solutions are integrated
39
44
Azure security solutions that are deployed from Security Center are automatically connected. You can also connect other security data sources, including computers running on-premises or in other clouds.
## Manage integrated Azure security solutions and other data sources
44
49
45
-
1.Sign in to the [Azure portal](https://azure.microsoft.com/features/azure-portal/).
50
+
1.From the [Azure portal](https://azure.microsoft.com/features/azure-portal/), open **Security Center**.
46
51
47
-
2. On the **Microsoft Azure menu**, select **Security Center**. **Security Center - Overview** opens.
48
-
49
-
3. Under the Security Center menu, select **Security solutions**.
52
+
1. From Security Center's menu, select **Security solutions**.
50
53
51
54

52
55
53
-
In **Security solutions**, you can see the health of integrated Azure security solutions and run basic management tasks.
56
+
From the **Security solutions** page, you can see the health of integrated Azure security solutions and run basic management tasks.
54
57
55
58
### Connected solutions
56
59
@@ -60,24 +63,25 @@ The **Connected solutions** section includes security solutions that are current
60
63
61
64
The status of a partner solution can be:
62
65
63
-
* Healthy (green) - no health issues.
64
-
* Unhealthy (red) - there's a health issue that requires immediate attention.
65
-
*Health issues (orange) - the solution has stopped reporting its health.
66
-
* Not reported (gray) - the solution hasn't reported anything yet and no health data is available. A solution's status may be unreported if it was connected recently and is still deploying.
66
+
***Healthy** (green) - no health issues.
67
+
***Unhealthy** (red) - there's a health issue that requires immediate attention.
68
+
***Stopped reporting** (orange) - the solution has stopped reporting its health.
69
+
***Not reported** (gray) - the solution hasn't reported anything yet and no health data is available. A solution's status may be unreported if it was connected recently and is still deploying.
67
70
68
71
> [!NOTE]
69
72
> If health status data is not available, Security Center shows the date and time of the last event received to indicate whether the solution is reporting or not. If no health data is available and no alerts were received within the last 14 days, Security Center indicates that the solution is unhealthy or not reporting.
70
73
>
71
74
>
72
75
73
-
1. Select **VIEW** for additional information and options such as:
76
+
Select **VIEW** for additional information and options such as:
77
+
78
+
-**Solution console** - Opens the management experience for this solution.
79
+
-**Link VM** - Opens the Link Applications page. Here you can connect resources to the partner solution.
80
+
-**Delete solution**
81
+
-**Configure**
74
82
75
-
-**Solution console**. Opens the management experience for this solution.
76
-
-**Link VM**. Opens the Link Applications page. Here you can connect resources to the partner solution.
@@ -86,7 +90,6 @@ Security Center automatically discovers security solutions running in Azure but
86
90
> [!NOTE]
87
91
> The Standard tier of Security Center is required at the subscription level for the discovered solutions feature. See [Pricing](security-center-pricing.md) to learn more about the pricing tiers.
88
92
>
89
-
>
90
93
91
94
Select **CONNECT** under a solution to integrate with Security Center and be notified of security alerts.
92
95
@@ -96,55 +99,11 @@ The **Add data sources** section includes other available data sources that can
> For details of a simpler method (currently in preview) for exporting data to a SIEM, see [Export security alerts and recommendations (Preview)](continuous-export.md). The new method does not use Activity Log as an intermediator and allows direct export from Security Center to Event Hubs (and then on to your SIEM), it also supports the export of Security Recommendations.
103
-
104
-
105
-
You can configure your SIEMs or other monitoring tools to receive Azure Security Center events.
106
-
107
-
All events from Azure Security Center are published to Azure Monitor's Azure [Activity log](../monitoring-and-diagnostics/monitoring-overview-activity-logs.md). Azure Monitor uses [a consolidated pipeline](../azure-monitor/platform/stream-monitoring-data-event-hubs.md) to stream the data to an Event Hub where it can then be pulled into your monitoring tool.
108
-
109
-
The next sections describe how you can configure data to be streamed to an event hub. The steps assume that you already have Azure Security Center configured in your Azure subscription.
### What is the Azure security data exposed to SIEM?
116
-
117
-
In this version, we expose the [security alerts.](../security-center/security-center-managing-and-responding-alerts.md) In upcoming releases, we will enrich the data set with security recommendations.
118
-
119
-
### How to set up the pipeline
120
-
121
-
#### Create an Event Hub
122
-
123
-
Before you begin, [create an Event Hubs namespace](../event-hubs/event-hubs-create.md) - the destination for all your monitoring data.
124
-
125
-
#### Stream the Azure Activity Log to Event Hubs
126
-
127
-
See the following article [stream activity log to Event Hubs](../azure-monitor/platform/activity-logs-stream-event-hubs.md).
128
-
129
-
#### Install a partner SIEM connector
130
-
131
-
Routing your monitoring data to an Event Hub with Azure Monitor enables you to easily integrate with partner SIEM and monitoring tools.
132
-
133
-
See the following article for the list of [supported SIEMs](../azure-monitor/platform/stream-monitoring-data-event-hubs.md#partner-tools-with-azure-monitor-integration).
134
-
135
-
### Example for Querying data
136
-
137
-
Here are some Splunk queries you can use to pull alert data:
138
-
139
-
|**Description of Query**|**Query**|
140
-
|----|----|
141
-
| All Alerts| index=main Microsoft.Security/locations/alerts|
142
-
| Summarize count of operations by their name| index=main sourcetype="amal:security" \| table operationName \| stats count by operationName|
143
-
| Get Alerts info: Time, Name, State, ID, and Subscription | index=main Microsoft.Security/locations/alerts \| table \_time, properties.eventName, State, properties.operationId, am_subscriptionId |
144
102
145
103
146
104
## Next steps
147
105
148
106
In this article, you learned how to integrate partner solutions in Security Center. To learn more about Security Center, see the following article:
149
107
108
+
*[Export security alerts and recommendations](continuous-export.md). Learn how to setup an integration with Azure Sentinel, or any other SIEM.
150
109
*[Security health monitoring in Security Center](security-center-monitoring.md). Learn how to monitor the health of your Azure resources.
0 commit comments