Skip to content

Commit baad0ae

Browse files
Added info on how to enable AMA agent
1 parent ca14267 commit baad0ae

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/automanage/virtual-machines-custom-profile.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,7 @@ The following ARM template creates an Automanage custom profile. Details on the
122122
"LogAnalytics/Enable": true,
123123
"LogAnalytics/Reprovision": "[parameters('LogAnalyticsBehavior')]",
124124
"LogAnalytics/Workspace": "[parameters('logAnalyticsWorkspace')]",
125+
"LogAnalytics/UseAma": true,
125126
"UpdateManagement/Enable": true,
126127
"VMInsights/Enable": true,
127128
"WindowsAdminCenter/Enable": true,
@@ -157,6 +158,8 @@ The `azureSecurityBaselineAssignmentType` is the audit mode that you can choose
157158
* ApplyAndMonitor : This setting applies the Azure security baseline through the Guest Configuration extention when you first assign this profile to each machine. After it's applied, the Guest Configuration service will monitor the server baseline and report any drift from the desired state. However, it will not auto-remdiate.
158159
* Audit : This setting installs the Azure security baseline using the Guest Configuration extension. You're able to see where your machine is out of compliance with the baseline, but noncompliance isn't automatically remediated.
159160

161+
The `LogAnalytics/UseAma` value is where you can specify to use Azure Monitor Agent or not.
162+
160163
You can also specify an existing log analytics workspace by adding this setting to the configuration section of properties below:
161164
* "LogAnalytics/Workspace": "/subscriptions/**subscriptionId**/resourceGroups/**resourceGroupName**/providers/Microsoft.OperationalInsights/workspaces/**workspaceName**"
162165
* "LogAnalytics/Reprovision": false

0 commit comments

Comments
 (0)