You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[Machines Insights Monitoring](../azure-monitor/vm/vminsights-overview.md)|Azure Monitor for machines monitors the performance and health of your virtual machines, including their running processes and dependencies on other resources. |Production |
34
32
|[Update Management](../automation/update-management/overview.md)|You can use Update Management in Azure Automation to manage operating system updates for your machines. You can quickly assess the status of available updates on all agent machines and manage the process of installing required updates for servers. |Production, Dev/Test |
33
+
|[Microsoft Antimalware](../security/fundamentals/antimalware.md)|Microsoft Antimalware for Azure is a free real-time protection that helps identify and remove viruses, spyware, and other malicious software. It generates alerts when known malicious or unwanted software tries to install itself or run on your Azure systems. **Note:** Microsoft Antimalware requires that there be no other antimalware software installed, or it may fail to work. This is also only supported for Windows Server 2016 and above. |Production, Dev/Test |
35
34
|[Change Tracking & Inventory](../automation/change-tracking/overview.md)|Change Tracking and Inventory combines change tracking and inventory functions to allow you to track virtual machine and server infrastructure changes. The service supports change tracking across services, daemons software, registry, and files in your environment to help you diagnose unwanted changes and raise alerts. Inventory support allows you to query in-guest resources for visibility into installed applications and other configuration items. |Production, Dev/Test |
36
35
|[Azure Guest Configuration](../governance/policy/concepts/guest-configuration.md)| Guest Configuration policy is used to monitor the configuration and report on the compliance of the machine. The Automanage service will install the Azure security baseline using the Guest Configuration extension. For Arc machines, the guest configuration service will install the baseline in audit-only mode. You will be able to see where your VM is out of compliance with the baseline, but noncompliance won't be automatically remediated. |Production, Dev/Test |
37
36
|[Azure Automation Account](../automation/automation-create-standalone-account.md)|Azure Automation supports management throughout the lifecycle of your infrastructure and applications. |Production, Dev/Test |
Copy file name to clipboardExpand all lines: articles/automanage/automanage-virtual-machines.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mmccrory
5
5
ms.service: automanage
6
6
ms.workload: infrastructure
7
7
ms.topic: conceptual
8
-
ms.date: 10/19/2021
8
+
ms.date: 5/12/2022
9
9
ms.author: memccror
10
10
ms.custom: references_regions
11
11
---
@@ -109,7 +109,7 @@ The only time you might need to interact with this machine to manage these servi
109
109
## Enabling Automanage for VMs using Azure Policy
110
110
You can also enable Automanage on VMs at scale using the built-in Azure Policy. The policy has a DeployIfNotExists effect, which means that all eligible VMs located within the scope of the policy will be automatically onboarded to Automanage VM Best Practices.
111
111
112
-
A direct link to the policy is [here](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F270610db-8c04-438a-a739-e8e6745b22d3).
112
+
A direct link to the policy is [here](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff889cab7-da27-4c41-a3b0-de1f6f87c55).
113
113
114
114
For more information, check out how to enable the [Automanage built-in policy](virtual-machines-policy-enable.md).
Copy file name to clipboardExpand all lines: articles/automanage/automanage-windows-server.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,21 +9,22 @@ ms.date: 03/22/2022
9
9
ms.author: memccror
10
10
---
11
11
12
-
# Azure Automanage for Machines Best Practices - Windows Server
12
+
# Azure Automanage for Machines Best Practices - Windows
13
13
14
14
These Azure services are automatically onboarded for you when you use Automanage Machine Best Practices on a Windows Server VM. They are essential to our best practices white paper, which you can find in our [Cloud Adoption Framework](/azure/cloud-adoption-framework/manage/azure-server-management).
15
15
16
16
For all of these services, we will auto-onboard, auto-configure, monitor for drift, and remediate if drift is detected. To learn more, go to [Azure Automanage for virtual machines](automanage-virtual-machines.md).
17
17
18
18
## Supported Windows Server versions
19
19
20
-
Automanage supports the following Windows Server versions:
20
+
Automanage supports the following Windows versions:
|**Deploy**| 1. Deploy the Resource Manager template. |
32
32
33
33
## Generate deployment credentials
34
34
35
+
# [Service principal](#tab/userlevel)
36
+
35
37
You can create a [service principal](../../active-directory/develop/app-objects-and-service-principals.md#service-principal-object) with the [az ad sp create-for-rbac](/cli/azure/ad/sp#az-ad-sp-create-for-rbac) command in the [Azure CLI](/cli/azure/). Run this command with [Azure Cloud Shell](https://shell.azure.com/) in the Azure portal or by selecting the **Try it** button.
36
38
37
39
Create a resource group if you do not already have one.
@@ -61,8 +63,29 @@ In the example above, replace the placeholders with your subscription ID and res
61
63
> [!IMPORTANT]
62
64
> It is always a good practice to grant minimum access. The scope in the previous example is limited to the resource group.
63
65
66
+
# [OpenID Connect](#tab/openid)
67
+
68
+
You need to provide your application's **Client ID**, **Tenant ID**, and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
69
+
70
+
1. Open your GitHub repository and go to **Settings**.
71
+
72
+
1. Select **Settings > Secrets > New secret**.
73
+
74
+
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
75
+
76
+
|GitHub Secret | Active Directory Application |
77
+
|---------|---------|
78
+
|AZURE_CLIENT_ID | Application (client) ID |
79
+
|AZURE_TENANT_ID | Directory (tenant) ID |
80
+
|AZURE_SUBSCRIPTION_ID | Subscription ID |
81
+
82
+
1. Save each secret by selecting **Add secret**.
83
+
84
+
---
64
85
## Configure the GitHub secrets
65
86
87
+
# [Service principal](#tab/userlevel)
88
+
66
89
You need to create secrets for your Azure credentials, resource group, and subscriptions.
67
90
68
91
1. In [GitHub](https://github.com/), browse your repository.
@@ -75,6 +98,25 @@ You need to create secrets for your Azure credentials, resource group, and subsc
75
98
76
99
1. Create an additional secret named `AZURE_SUBSCRIPTION`. Add your subscription ID to the secret's value field (example: `90fd3f9d-4c61-432d-99ba-1273f236afa2`).
77
100
101
+
# [OpenID Connect](#tab/openid)
102
+
103
+
You need to provide your application's **Client ID**, **Tenant ID**, and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
104
+
105
+
1. Open your GitHub repository and go to **Settings**.
106
+
107
+
1. Select **Settings > Secrets > New secret**.
108
+
109
+
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
110
+
111
+
|GitHub Secret | Active Directory Application |
112
+
|---------|---------|
113
+
|AZURE_CLIENT_ID | Application (client) ID |
114
+
|AZURE_TENANT_ID | Directory (tenant) ID |
115
+
|AZURE_SUBSCRIPTION_ID | Subscription ID |
116
+
117
+
1. Save each secret by selecting **Add secret**.
118
+
119
+
---
78
120
## Add Resource Manager template
79
121
80
122
Add a Resource Manager template to your GitHub repository. This template creates a storage account.
@@ -94,8 +136,9 @@ The workflow file must be stored in the **.github/workflows** folder at the root
94
136
1. Select **set up a workflow yourself**.
95
137
1. Rename the workflow file if you prefer a different name other than **main.yml**. For example: **deployStorageAccount.yml**.
96
138
1. Replace the content of the yml file with the following:
139
+
# [Service principal](#tab/userlevel)
97
140
98
-
```yml
141
+
```yml
99
142
on: [push]
100
143
name: Azure ARM
101
144
jobs:
@@ -122,15 +165,57 @@ The workflow file must be stored in the **.github/workflows** folder at the root
> You can specify a JSON format parameters file instead in the ARM Deploy action (example: `.azuredeploy.parameters.json`).
172
+
173
+
The first section of the workflow file includes:
174
+
175
+
- **name**: The name of the workflow.
176
+
- **on**: The name of the GitHub events that triggers the workflow. The workflow is trigger when there is a push event on the main branch, which modifies at least one of the two files specified. The two files are the workflow file and the template file.
> You can specify a JSON format parameters file instead in the ARM Deploy action (example: `.azuredeploy.parameters.json`).
211
+
> [!NOTE]
212
+
> You can specify a JSON format parameters file instead in the ARM Deploy action (example: `.azuredeploy.parameters.json`).
129
213
130
-
The first section of the workflow file includes:
214
+
The first section of the workflow file includes:
131
215
132
-
- **name**: The name of the workflow.
133
-
- **on**: The name of the GitHub events that triggers the workflow. The workflow is trigger when there is a push event on the main branch, which modifies at least one of the two files specified. The two files are the workflow file and the template file.
216
+
- **name**: The name of the workflow.
217
+
- **on**: The name of the GitHub events that triggers the workflow. The workflow is trigger when there is a push event on the main branch, which modifies at least one of the two files specified. The two files are the workflow file and the template file.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-vms-troubleshoot.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ This section covers backup operation failure of Azure Virtual machine.
28
28
* If Azure Backup is working, then the issue is likely with another backup solution.
29
29
* Here is an example of an Event Viewer error 517 where Azure Backup was working fine but "Windows Server Backup" was failing:
30
30

31
-
* If Azure Backup is failing, then look for the corresponding error code in the section Common VM backup errors in this article.
31
+
* If Azure Backup is failing, then look for the corresponding error code in the [Common issues](#common-issues) section.
32
32
* If you see Azure Backup option greyed out on an Azure VM, hover over the disabled menu to find the reason. The reasons could be "Not available with EphemeralDisk" or "Not available with Ultra Disk".
33
33

| Azure VM | Supported for Azure VMs (including encrypted Azure VMs) with both managed and unmanaged disks. Not supported for classic VMs. | Available in all Azure public regions and sovereign regions, except for UG IOWA and UG Virginia. |
150
-
| SQL /SAP HANA | Available | Available in all Azure public regions and sovereign regions, except for France Central, UG IOWA, and UG Virginia. |
149
+
| Azure VM | Supported for Azure VMs (including encrypted Azure VMs) with both managed and unmanaged disks. Not supported for classic VMs. | Available in all Azure public regions and sovereign regions, except for UG IOWA. |
150
+
| SQL /SAP HANA | Available | Available in all Azure public regions and sovereign regions, except for France Centraland UG IOWA. |
0 commit comments