Skip to content

Commit d4cd123

Browse files
committed
Further tweaks to this page
1 parent 38689a1 commit d4cd123

File tree

1 file changed

+27
-32
lines changed

1 file changed

+27
-32
lines changed

articles/security-center/security-center-just-in-time.md

Lines changed: 27 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ If you're on Security Center's standard pricing tier (see [pricing](/azure/secur
2525
There are three ways to configure a JIT policy on a VM:
2626

2727
- [Configure JIT access in Azure Security Center](#jit-asc)
28-
- [Configure JIT access in an Azure VM blade](#jit-vm)
28+
- [Configure JIT access in an Azure VM page](#jit-vm)
2929
- [Configure a JIT policy on a VM programmatically](#jit-program)
3030

3131
## Configure JIT in Security Center
@@ -36,15 +36,11 @@ From Security Center, you can configure a JIT policy and request access to a VM
3636

3737
1. Open the **Security Center** dashboard.
3838

39-
2. In the left pane, select **Just-in-time VM access**.
39+
1. In the left pane, select **Just-in-time VM access**.
4040

4141
![Just-in-time VM access tile](./media/security-center-just-in-time/just-in-time.png)
4242

43-
The **Just-in-time VM access** window opens.
44-
45-
![Enable just-in-time access](./media/security-center-just-in-time/enable-just-in-time.png)
46-
47-
**Just-in-time VM access** provides information on the state of your VMs:
43+
The **Just-in-time VM access** window opens and shows information on the state of your VMs:
4844

4945
- **Configured** - VMs that have been configured to support just-in-time VM access. The data presented is for the last week and includes for each VM the number of approved requests, last access date and time, and last user.
5046
- **Recommended** - VMs that can support just-in-time VM access but haven't been configured to. We recommend that you enable just-in-time VM access control for these VMs.
@@ -53,26 +49,26 @@ From Security Center, you can configure a JIT policy and request access to a VM
5349
- Classic VM - Security Center just-in-time VM access currently supports only VMs deployed through Azure Resource Manager. A classic deployment is not supported by the just-in-time solution.
5450
- Other - A VM is in this category if the just-in-time solution is turned off in the security policy of the subscription or the resource group, or if the VM is missing a public IP and doesn't have an NSG in place.
5551

56-
3. Select the **Recommended** tab.
52+
1. Select the **Recommended** tab.
5753

58-
4. Under **VIRTUAL MACHINE**, click the VMs that you want to enable. This puts a checkmark next to a VM.
54+
1. Under **VIRTUAL MACHINE**, click the VMs that you want to enable. This puts a checkmark next to a VM.
5955

60-
5. Click **Enable JIT on VMs**.
61-
-. This blade displays the default ports recommended by Azure Security Center:
62-
- 22 - SSH
63-
- 3389 - RDP
64-
- 5985 - WinRM
65-
- 5986 - WinRM
66-
6. You can also configure custom ports:
56+
![Enable just-in-time access](./media/security-center-just-in-time/enable-just-in-time.png)
6757

68-
1. Click **Add**. The **Add port configuration** window opens.
69-
2. For each port you choose to configure, both default and custom, you can customize the following settings:
58+
1. Click **Enable JIT on VMs**. A pane opens displaying the default ports recommended by Azure Security Center:
59+
- 22 - SSH
60+
- 3389 - RDP
61+
- 5985 - WinRM
62+
- 5986 - WinRM
63+
1. Optionally, you can add custom ports to the list:
7064

71-
- **Protocol type**- The protocol that is allowed on this port when a request is approved.
72-
- **Allowed source IP addresses**- The IP ranges that are allowed on this port when a request is approved.
73-
- **Maximum request time**- The maximum time window during which a specific port can be opened.
65+
1. Click **Add**. The **Add port configuration** window opens.
66+
1. For each port you choose to configure, both default and custom, you can customize the following settings:
67+
- **Protocol type**- The protocol that is allowed on this port when a request is approved.
68+
- **Allowed source IP addresses**- The IP ranges that are allowed on this port when a request is approved.
69+
- **Maximum request time**- The maximum time window during which a specific port can be opened.
7470

75-
3. Click **OK**.
71+
1. Click **OK**.
7672

7773
1. Click **Save**.
7874

@@ -121,7 +117,7 @@ To edit an existing just-in-time policy of a VM:
121117
You can gain insights into VM activities using log search. To view logs:
122118

123119
1. Under **Just-in-time VM access**, select the **Configured** tab.
124-
2. Under **VMs**, select a VM to view information about by clicking on the three dots within the row for that VM and select **Activity Log** in the menu. The **Activity log** opens.
120+
2. Under **VMs**, select a VM to view information about by clicking on the three dots within the row for that VM and select **Activity Log** from the menu. The **Activity log** opens.
125121

126122
![Select activity log](./media/security-center-just-in-time/select-activity-log.png)
127123

@@ -144,7 +140,7 @@ To make it easy to roll out just-in-time access across your VMs, you can set a V
144140
1. From the [Azure portal](https://ms.portal.azure.com), search for and select **Virtual machines**.
145141
2. Select the virtual machine you want to limit to just-in-time access.
146142
3. In the menu, select **Configuration**.
147-
4. Under **Just-in-time-access**, select **Enable just-in-time**.
143+
4. Under **Just-in-time access**, select **Enable just-in-time**.
148144

149145
This enables just-in-time access for the VM using the following settings:
150146

@@ -161,11 +157,11 @@ If a VM already has just-in-time enabled, when you go to its configuration page
161157

162158
![jit config in vm](./media/security-center-just-in-time/jit-vm-config.png)
163159

164-
### Request JIT access to a VM via the Azure VM blade
160+
### Request JIT access to a VM via an Azure VM's page
165161

166162
In the Azure portal, when you try to connect to a VM, Azure checks to see if you have a just-in-time access policy configured on that VM.
167163

168-
- If you do have a JIT policy configured on the VM, you can click **Request access** to enable you to have access in accordance with the JIT policy set for the VM.
164+
- If you have a JIT policy configured on the VM, you can click **Request access** to enable you to have access in accordance with the JIT policy set for the VM.
169165

170166
>![jit request](./media/security-center-just-in-time/jit-request.png)
171167
@@ -186,11 +182,11 @@ In the Azure portal, when you try to connect to a VM, Azure checks to see if you
186182

187183
You can set up and use just-in-time via REST APIs and via PowerShell.
188184

189-
## JIT VM access via REST APIs
185+
### JIT VM access via REST APIs
190186

191187
The just-in-time VM access feature can be used via the Azure Security Center API. You can get information about configured VMs, add new ones, request access to a VM, and more, via this API. See [Jit Network Access Policies](https://docs.microsoft.com/rest/api/securitycenter/jitnetworkaccesspolicies), to learn more about the just-in-time REST API.
192188

193-
## JIT VM access via PowerShell
189+
### JIT VM access via PowerShell
194190

195191
To use the just-in-time VM access solution via PowerShell, use the official Azure Security Center PowerShell cmdlets, and specifically `Set-AzJitNetworkAccessPolicy`.
196192

@@ -226,7 +222,7 @@ Run the following in PowerShell to accomplish this:
226222

227223
Set-AzJitNetworkAccessPolicy -Kind "Basic" -Location "LOCATION" -Name "default" -ResourceGroupName "RESOURCEGROUP" -VirtualMachine $JitPolicyArr
228224

229-
#### Request access to a VM via PowerShell
225+
### Request access to a VM via PowerShell
230226

231227
In the following example, you can see a just-in-time VM access request to a specific VM in which port 22 is requested to be opened for a specific IP address and for a specific amount of time:
232228

@@ -251,14 +247,13 @@ For more information, see the PowerShell cmdlet documentation.
251247

252248
## Automatic cleanup of redundant JIT rules
253249

254-
Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. If it finds a mismatch between a rule in your policy and a rule in the NSG, it determines the cause and removes the rule when safe to do so.
250+
Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. The tool looks for mismatches between rules in your policy and rules in the NSG. If the cleanup tool finds a mismatch, it determines the cause and, when it's safe to do so, removes built-in rules that aren't needed any more. The cleaner never deletes rules that you've created.
255251

256-
Examples scenarios when the cleaner might remove a rule:
252+
Examples scenarios when the cleaner might remove a built-in rule:
257253

258254
- When two rules with identical definitions exist and one has a higher priority than the other (meaning, the lower priority rule will never be used)
259255
- When a rule description includes the name of a VM which doesn't match the destination IP in the rule
260256

261-
262257
## Next steps
263258
In this article, you learned how just-in-time VM access in Security Center helps you control access to your Azure virtual machines.
264259

0 commit comments

Comments
 (0)