Skip to content

Commit bd45c94

Browse files
committed
Fixed heading levels
1 parent b57db1d commit bd45c94

File tree

7 files changed

+60
-102
lines changed

7 files changed

+60
-102
lines changed

articles/security-center/faq-azure-monitor-logs.md

Lines changed: 5 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -16,86 +16,32 @@ ms.author: memildin
1616

1717
---
1818

19-
## FAQ for customers already using Azure Monitor logs<a name="existingloganalyticscust"></a>
19+
# FAQ for customers already using Azure Monitor logs<a name="existingloganalyticscust"></a>
2020

21-
### Does Security Center override any existing connections between VMs and workspaces?
21+
## Does Security Center override any existing connections between VMs and workspaces?
2222

2323
If a VM already has the Microsoft Monitoring Agent installed as an Azure extension, Security Center does not override the existing workspace connection. Instead, Security Center uses the existing workspace. The VM will be protected provided that the "Security" or "SecurityCenterFree" solution has been installed on the workspace to which it is reporting.
2424

2525
A Security Center solution is installed on the workspace selected in the Data Collection screen if not present already, and the solution is applied only to the relevant VMs. When you add a solution, it's automatically deployed by default to all Windows and Linux agents connected to your Log Analytics workspace. [Solution Targeting](../operations-management-suite/operations-management-suite-solution-targeting.md) allows you to apply a scope to your solutions.
2626

2727
If the Microsoft Monitoring Agent is installed directly on the VM (not as an Azure extension), Security Center does not install the Microsoft Monitoring Agent and security monitoring is limited.
2828

29-
### Does Security Center install solutions on my existing Log Analytics workspaces? What are the billing implications?
29+
## Does Security Center install solutions on my existing Log Analytics workspaces? What are the billing implications?
3030
When Security Center identifies that a VM is already connected to a workspace you created, Security Center enables solutions on this workspace according to your pricing tier. The solutions are applied only to the relevant Azure VMs, via [solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md), so the billing remains the same.
3131

3232
- **Free tier** – Security Center installs the 'SecurityCenterFree' solution on the workspace. You won't be billed for the Free tier.
3333
- **Standard tier** – Security Center installs the 'Security' solution on the workspace.
3434

3535
![Solutions on default workspace][1]
3636

37-
### I already have workspaces in my environment, can I use them to collect security data?
37+
## I already have workspaces in my environment, can I use them to collect security data?
3838
If a VM already has the Microsoft Monitoring Agent installed as an Azure extension, Security Center uses the existing connected workspace. A Security Center solution is installed on the workspace if not present already, and the solution is applied only to the relevant VMs via [solution targeting](../operations-management-suite/operations-management-suite-solution-targeting.md).
3939

4040
When Security Center installs the Microsoft Monitoring Agent on VMs, it uses the default workspace(s) created by Security Center.
4141

42-
### I already have security solution on my workspaces. What are the billing implications?
42+
## I already have security solution on my workspaces. What are the billing implications?
4343
The Security & Audit solution is used to enable Security Center Standard tier features for Azure VMs. If the Security & Audit solution is already installed on a workspace, Security Center uses the existing solution. There is no change in billing.
4444

45-
## Using Azure Security Center
46-
### What is a security policy?
47-
A security policy defines the set of controls that are recommended for resources within the specified subscription. In Azure Security Center, you define policies for your Azure subscriptions according to your company's security requirements and the type of applications or sensitivity of the data in each subscription.
48-
49-
The security policies enabled in Azure Security Center drive security recommendations and monitoring. To learn more about security policies, see [Security health monitoring in Azure Security Center](security-center-monitoring.md).
50-
51-
### Who can modify a security policy?
52-
To modify a security policy, you must be a Security Administrator or an Owner or Contributor of that subscription.
53-
54-
To learn how to configure a security policy, see [Setting security policies in Azure Security Center](tutorial-security-policy.md).
55-
56-
### What is a security recommendation?
57-
Azure Security Center analyzes the security state of your Azure resources. When potential security vulnerabilities are identified, recommendations are created. The recommendations guide you through the process of configuring the needed control. Examples are:
58-
59-
* Provisioning of anti-malware to help identify and remove malicious software
60-
* [Network security groups](../virtual-network/security-overview.md) and rules to control traffic to virtual machines
61-
* Provisioning of a web application firewall to help defend against attacks targeting your web applications
62-
* Deploying missing system updates
63-
* Addressing OS configurations that do not match the recommended baselines
64-
65-
Only recommendations that are enabled in Security Policies are shown here.
66-
67-
### How can I see the current security state of my Azure resources?
68-
The **Security Center Overview** page shows the overall security posture of your environment broken down by Compute, Networking, Storage & data, and Applications. Each resource type has an indicator showing if any potential security vulnerabilities have been identified. Clicking each tile displays a list of security issues identified by Security Center, along with an inventory of the resources in your subscription.
69-
70-
### What triggers a security alert?
71-
Azure Security Center automatically collects, analyzes, and fuses log data from your Azure resources, the network, and partner solutions like antimalware and firewalls. When threats are detected, a security alert is created. Examples include detection of:
72-
73-
* Compromised virtual machines communicating with known malicious IP addresses
74-
* Advanced malware detected using Windows error reporting
75-
* Brute force attacks against virtual machines
76-
* Security alerts from integrated partner security solutions such as Anti-Malware or Web Application Firewalls
77-
78-
### Why did secure scores values change? <a name="secure-score-faq"></a>
79-
As of February 2019, Security Center adjusted the score of a few recommendations, in order to better fit their severity. As a result of this adjustment, there may be changes in overall secure score values. For more information about secure score, see [Secure score calculation](security-center-secure-score.md).
80-
81-
### What's the difference between threats detected and alerted on by Microsoft Security Response Center versus Azure Security Center?
82-
The Microsoft Security Response Center (MSRC) performs select security monitoring of the Azure network and infrastructure and receives threat intelligence and abuse complaints from third parties. When MSRC becomes aware that customer data has been accessed by an unlawful or unauthorized party or that the customer’s use of Azure does not comply with the terms for Acceptable Use, a security incident manager notifies the customer. Notification typically occurs by sending an email to the security contacts specified in Azure Security Center or the Azure subscription owner if a security contact is not specified.
83-
84-
Security Center is an Azure service that continuously monitors the customer’s Azure environment and applies analytics to automatically detect a wide range of potentially malicious activity. These detections are surfaced as security alerts in the Security Center dashboard.
85-
86-
### Which Azure resources are monitored by Azure Security Center?
87-
Azure Security Center monitors the following Azure resources:
88-
89-
* Virtual machines (VMs) (including [Cloud Services](../cloud-services/cloud-services-choose-me.md))
90-
* Virtual machine scale sets
91-
* Azure Virtual Networks
92-
* Azure SQL service
93-
* Azure Storage account
94-
* Azure Web Apps (in [App Service Environment](../app-service/environment/intro.md))
95-
* Partner solutions integrated with your Azure subscription such as a web application firewall on VMs and on App Service Environment
96-
97-
In addition, non-Azure (including on-premises) computers can also be monitored by Azure Security Center (Both [Windows computers](./quick-onboard-windows-computer.md) and [Linux computers](./quick-onboard-linux-computer.md) are supported)
98-
9945

10046
<!--Image references-->
10147
[1]: ./media/security-center-platform-migration-faq/solutions.png

articles/security-center/faq-billing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,14 @@ ms.author: memildin
1616

1717
---
1818

19-
## Billing
19+
# Billing
2020

21-
### How does billing work for Azure Security Center?
21+
## How does billing work for Azure Security Center?
2222
Security Center is offered in two tiers:
2323

2424
The **Free tier** provides visibility into the security state of your Azure resources, basic security policy, security recommendations, and integration with security products and services from partners.
2525

2626
The **Standard tier** adds advanced threat detection capabilities, including threat intelligence, behavioral analysis, anomaly detection, security incidents, and threat attribution reports. You can start a Standard tier free trial. To upgrade, select [Pricing Tier](https://docs.microsoft.com/azure/security-center/security-center-pricing) in the security policy. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
2727

28-
### How can I track who in my organization performed pricing tier changes in Azure Security Center
28+
## How can I track who in my organization performed pricing tier changes in Azure Security Center
2929
Azure Subscriptions may have multiple administrators with permissions to change the pricing tier. To find out which user performed a pricing tier change, use the Azure Activity Log. For more information, see [here](https://techcommunity.microsoft.com/t5/Security-Identity/Tracking-Changes-in-the-Pricing-Tier-for-Azure-Security-Center/td-p/390832).

0 commit comments

Comments
 (0)