|
| 1 | +--- |
| 2 | +title: Azure Security Center FAQ - questions about existing MMAs |
| 3 | +description: This FAQ answers questions for customers already using the Microsoft Monitoring Agent and considering Azure Security Center, a product that helps you prevent, detect, and respond to threats. |
| 4 | +services: security-center |
| 5 | +documentationcenter: na |
| 6 | +author: memildin |
| 7 | +manager: rkarlin |
| 8 | +ms.assetid: be2ab6d5-72a8-411f-878e-98dac21bc5cb |
| 9 | +ms.service: security-center |
| 10 | +ms.devlang: na |
| 11 | +ms.topic: conceptual |
| 12 | +ms.tgt_pltfrm: na |
| 13 | +ms.workload: na |
| 14 | +ms.date: 02/25/2020 |
| 15 | +ms.author: memildin |
| 16 | + |
| 17 | +--- |
| 18 | + |
| 19 | +## FAQ for customers already using Azure Monitor logs<a name="existingloganalyticscust"></a> |
| 20 | + |
| 21 | +### Does Security Center override any existing connections between VMs and workspaces? |
| 22 | + |
| 23 | +If a VM already has the Microsoft Monitoring Agent installed as an Azure extension, Security Center does not override the existing workspace connection. Instead, Security Center uses the existing workspace. The VM will be protected provided that the "Security" or "SecurityCenterFree" solution has been installed on the workspace to which it is reporting. |
| 24 | + |
| 25 | +A Security Center solution is installed on the workspace selected in the Data Collection screen if not present already, and the solution is applied only to the relevant VMs. When you add a solution, it's automatically deployed by default to all Windows and Linux agents connected to your Log Analytics workspace. [Solution Targeting](../operations-management-suite/operations-management-suite-solution-targeting.md) allows you to apply a scope to your solutions. |
| 26 | + |
| 27 | +If the Microsoft Monitoring Agent is installed directly on the VM (not as an Azure extension), Security Center does not install the Microsoft Monitoring Agent and security monitoring is limited. |
| 28 | + |
| 29 | +### Does Security Center install solutions on my existing Log Analytics workspaces? What are the billing implications? |
| 30 | +When Security Center identifies that a VM is already connected to a workspace you created, Security Center enables solutions on this workspace according to your pricing tier. The solutions are applied only to the relevant Azure VMs, via [solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md), so the billing remains the same. |
| 31 | + |
| 32 | +- **Free tier** – Security Center installs the 'SecurityCenterFree' solution on the workspace. You won't be billed for the Free tier. |
| 33 | +- **Standard tier** – Security Center installs the 'Security' solution on the workspace. |
| 34 | + |
| 35 | + ![Solutions on default workspace][1] |
| 36 | + |
| 37 | +### I already have workspaces in my environment, can I use them to collect security data? |
| 38 | +If a VM already has the Microsoft Monitoring Agent installed as an Azure extension, Security Center uses the existing connected workspace. A Security Center solution is installed on the workspace if not present already, and the solution is applied only to the relevant VMs via [solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md). |
| 39 | + |
| 40 | +When Security Center installs the Microsoft Monitoring Agent on VMs, it uses the default workspace(s) created by Security Center. |
| 41 | + |
| 42 | +### I already have security solution on my workspaces. What are the billing implications? |
| 43 | +The Security & Audit solution is used to enable Security Center Standard tier features for Azure VMs. If the Security & Audit solution is already installed on a workspace, Security Center uses the existing solution. There is no change in billing. |
| 44 | + |
| 45 | +## Using Azure Security Center |
| 46 | +### What is a security policy? |
| 47 | +A security policy defines the set of controls that are recommended for resources within the specified subscription. In Azure Security Center, you define policies for your Azure subscriptions according to your company's security requirements and the type of applications or sensitivity of the data in each subscription. |
| 48 | + |
| 49 | +The security policies enabled in Azure Security Center drive security recommendations and monitoring. To learn more about security policies, see [Security health monitoring in Azure Security Center](security-center-monitoring.md). |
| 50 | + |
| 51 | +### Who can modify a security policy? |
| 52 | +To modify a security policy, you must be a Security Administrator or an Owner or Contributor of that subscription. |
| 53 | + |
| 54 | +To learn how to configure a security policy, see [Setting security policies in Azure Security Center](tutorial-security-policy.md). |
| 55 | + |
| 56 | +### What is a security recommendation? |
| 57 | +Azure Security Center analyzes the security state of your Azure resources. When potential security vulnerabilities are identified, recommendations are created. The recommendations guide you through the process of configuring the needed control. Examples are: |
| 58 | + |
| 59 | +* Provisioning of anti-malware to help identify and remove malicious software |
| 60 | +* [Network security groups](../virtual-network/security-overview.md) and rules to control traffic to virtual machines |
| 61 | +* Provisioning of a web application firewall to help defend against attacks targeting your web applications |
| 62 | +* Deploying missing system updates |
| 63 | +* Addressing OS configurations that do not match the recommended baselines |
| 64 | + |
| 65 | +Only recommendations that are enabled in Security Policies are shown here. |
| 66 | + |
| 67 | +### How can I see the current security state of my Azure resources? |
| 68 | +The **Security Center Overview** page shows the overall security posture of your environment broken down by Compute, Networking, Storage & data, and Applications. Each resource type has an indicator showing if any potential security vulnerabilities have been identified. Clicking each tile displays a list of security issues identified by Security Center, along with an inventory of the resources in your subscription. |
| 69 | + |
| 70 | +### What triggers a security alert? |
| 71 | +Azure Security Center automatically collects, analyzes, and fuses log data from your Azure resources, the network, and partner solutions like antimalware and firewalls. When threats are detected, a security alert is created. Examples include detection of: |
| 72 | + |
| 73 | +* Compromised virtual machines communicating with known malicious IP addresses |
| 74 | +* Advanced malware detected using Windows error reporting |
| 75 | +* Brute force attacks against virtual machines |
| 76 | +* Security alerts from integrated partner security solutions such as Anti-Malware or Web Application Firewalls |
| 77 | + |
| 78 | +### Why did secure scores values change? <a name="secure-score-faq"></a> |
| 79 | +As of February 2019, Security Center adjusted the score of a few recommendations, in order to better fit their severity. As a result of this adjustment, there may be changes in overall secure score values. For more information about secure score, see [Secure score calculation](security-center-secure-score.md). |
| 80 | + |
| 81 | +### What's the difference between threats detected and alerted on by Microsoft Security Response Center versus Azure Security Center? |
| 82 | +The Microsoft Security Response Center (MSRC) performs select security monitoring of the Azure network and infrastructure and receives threat intelligence and abuse complaints from third parties. When MSRC becomes aware that customer data has been accessed by an unlawful or unauthorized party or that the customer’s use of Azure does not comply with the terms for Acceptable Use, a security incident manager notifies the customer. Notification typically occurs by sending an email to the security contacts specified in Azure Security Center or the Azure subscription owner if a security contact is not specified. |
| 83 | + |
| 84 | +Security Center is an Azure service that continuously monitors the customer’s Azure environment and applies analytics to automatically detect a wide range of potentially malicious activity. These detections are surfaced as security alerts in the Security Center dashboard. |
| 85 | + |
| 86 | +### Which Azure resources are monitored by Azure Security Center? |
| 87 | +Azure Security Center monitors the following Azure resources: |
| 88 | + |
| 89 | +* Virtual machines (VMs) (including [Cloud Services](../cloud-services/cloud-services-choose-me.md)) |
| 90 | +* Virtual machine scale sets |
| 91 | +* Azure Virtual Networks |
| 92 | +* Azure SQL service |
| 93 | +* Azure Storage account |
| 94 | +* Azure Web Apps (in [App Service Environment](../app-service/environment/intro.md)) |
| 95 | +* Partner solutions integrated with your Azure subscription such as a web application firewall on VMs and on App Service Environment |
| 96 | + |
| 97 | +In addition, non-Azure (including on-premises) computers can also be monitored by Azure Security Center (Both [Windows computers](./quick-onboard-windows-computer.md) and [Linux computers](./quick-onboard-linux-computer.md) are supported) |
| 98 | + |
| 99 | + |
| 100 | +<!--Image references--> |
| 101 | +[1]: ./media/security-center-platform-migration-faq/solutions.png |
0 commit comments