Skip to content

Commit f1ad5db

Browse files
authored
Merge pull request #108106 from bwren/am-agent-sha
Azure Monitor agent SHA-2 enforcement
2 parents c4b0a54 + 587e071 commit f1ad5db

File tree

2 files changed

+76
-61
lines changed

2 files changed

+76
-61
lines changed

articles/azure-monitor/platform/log-analytics-agent.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -124,8 +124,8 @@ The following table highlights the packages required for supported Linux distros
124124

125125
|Required package |Description |Minimum version |
126126
|-----------------|------------|----------------|
127-
|Glibc | GNU C Library | 2.5-12
128-
|Openssl | OpenSSL Libraries | 1.0.x or 1.1.x |
127+
|Glibc | GNU C Library | 2.5-12
128+
|Openssl | OpenSSL Libraries | 1.0.x or 1.1.x |
129129
|Curl | cURL web client | 7.15.5 |
130130
|Python-ctypes | |
131131
|PAM | Pluggable Authentication Modules | |
@@ -138,6 +138,19 @@ The following table highlights the packages required for supported Linux distros
138138
To ensure the security of data in transit to Azure Monitor logs, we strongly encourage you to configure the agent to use at least Transport Layer Security (TLS) 1.2. Older versions of TLS/Secure Sockets Layer (SSL) have been found to be vulnerable and while they still currently work to allow backwards compatibility, they are **not recommended**. For additional information, review [Sending data securely using TLS 1.2](data-security.md#sending-data-securely-using-tls-12).
139139

140140

141+
## SHA-2 Code Signing Support Requirement for Windows
142+
The Windows agent will begin to exclusively use SHA-2 signing on May 18, 2020. This change will impact customers using the Log Analytics agent on a legacy OS as part of any Azure service (Azure Monitor, Azure Automation, Azure Update Management, Azure Change Tracking, Azure Security Center, Azure Sentinel, Windows Defender ATP). The change does not require any customer action unless you are running the agent on a legacy OS version (Windows 7, Windows Server 2008 R2 and Windows Server 2008). Customers running on a legacy OS version are required to take the following actions on their machines before May 18, 2020 or their agents will stop sending data to their Log Analytics workspaces:
143+
144+
1. Install the latest Service Pack for your OS. The required service pack versions are:
145+
- Windows 7 SP1
146+
- Windows Server 2008 SP2
147+
- Windows Server 2008 R2 SP1
148+
149+
2. Install the SHA-2 signing Windows updates for your OS as described in [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus)
150+
3. Update to the latest version of the Windows agent (version 10.20.18029).
151+
4. Recommended to configure the agent to [use TLS 1.2](agent-windows.md#configure-agent-to-use-tls-12).
152+
153+
141154
## Network requirements
142155
The agent for Linux and Windows communicates outbound to the Azure Monitor service over TCP port 443, and if the machine connects through a firewall or proxy server to communicate over the Internet, review requirements below to understand the network configuration required. If your IT security policies do not allow computers on the network to connect to the Internet, you can set up a [Log Analytics gateway](gateway.md) and then configure the agent to connect through the gateway to Azure Monitor logs. The agent can then receive configuration information and send data collected depending on what data collection rules and monitoring solutions you have enabled in your workspace.
143156

@@ -178,7 +191,7 @@ For example:
178191
`https://user01:[email protected]:30443`
179192

180193
> [!NOTE]
181-
> If you use special characters such as \@ in your password, you receive a proxy connection error because value is parsed incorrectly. To work around this issue, encode the password in the URL using a tool such as [URLDecode](https://www.urldecoder.org/).
194+
> If you use special characters such as "\@" in your password, you receive a proxy connection error because value is parsed incorrectly. To work around this issue, encode the password in the URL using a tool such as [URLDecode](https://www.urldecoder.org/).
182195
183196

184197

articles/virtual-machines/extensions/oms-windows.md

Lines changed: 60 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ The following table provides a mapping of the version of the Windows Log Analyti
3232

3333
| Log Analytics Windows agent bundle version | Log Analytics Windows VM extension version | Release Date | Release Notes |
3434
|--------------------------------|--------------------------|--------------------------|--------------------------|
35+
| 10.20.18029 | 1.0.18029 | March 2020 | <ul><li>Adds SHA-2 code signing support</li><li>Improves VM extension installation and management</li><li>Resolves a bug in Azure Arc for Servers integration</li><li>Adds a built-in troubleshooting tool for customer support</li><li>Adds support for additional Azure Government regions</li> |
3536
| 10.20.18018 | 1.0.18018 | October 2019 | <ul><li> Minor bug fixes and stabilization improvements </li></ul> |
3637
| 10.20.18011 | 1.0.18011 | July 2019 | <ul><li> Minor bug fixes and stabilization improvements </li><li> Increased MaxExpressionDepth to 10000 </li></ul> |
3738
| 10.20.18001 | 1.0.18001 | June 2019 | <ul><li> Minor bug fixes and stabilization improvements </li><li> Added ability to disable default credentials when making proxy connection (support for WINHTTP_AUTOLOGON_SECURITY_LEVEL_HIGH) </li></ul>|
@@ -43,6 +44,7 @@ The following table provides a mapping of the version of the Windows Log Analyti
4344
| 8.0.11072 | 1.0.11072 | Sept 2017 | |
4445
| 8.0.11049 | 1.0.11049 | Feb 2017 | |
4546

47+
4648
### Azure Security Center
4749

4850
Azure Security Center automatically provisions the Log Analytics agent and connects it with the default Log Analytics workspace of the Azure subscription. If you are using Azure Security Center, do not run through the steps in this document. Doing so overwrites the configured workspace and break the connection with Azure Security Center.
@@ -56,25 +58,25 @@ The following JSON shows the schema for the Log Analytics agent extension. The e
5658

5759
```json
5860
{
59-
"type": "extensions",
60-
"name": "OMSExtension",
61-
"apiVersion": "[variables('apiVersion')]",
62-
"location": "[resourceGroup().location]",
63-
"dependsOn": [
64-
"[concat('Microsoft.Compute/virtualMachines/', variables('vmName'))]"
65-
],
66-
"properties": {
67-
"publisher": "Microsoft.EnterpriseCloud.Monitoring",
68-
"type": "MicrosoftMonitoringAgent",
69-
"typeHandlerVersion": "1.0",
70-
"autoUpgradeMinorVersion": true,
71-
"settings": {
72-
"workspaceId": "myWorkSpaceId"
73-
},
74-
"protectedSettings": {
75-
"workspaceKey": "myWorkspaceKey"
76-
}
77-
}
61+
"type": "extensions",
62+
"name": "OMSExtension",
63+
"apiVersion": "[variables('apiVersion')]",
64+
"location": "[resourceGroup().location]",
65+
"dependsOn": [
66+
"[concat('Microsoft.Compute/virtualMachines/', variables('vmName'))]"
67+
],
68+
"properties": {
69+
"publisher": "Microsoft.EnterpriseCloud.Monitoring",
70+
"type": "MicrosoftMonitoringAgent",
71+
"typeHandlerVersion": "1.0",
72+
"autoUpgradeMinorVersion": true,
73+
"settings": {
74+
"workspaceId": "myWorkSpaceId"
75+
},
76+
"protectedSettings": {
77+
"workspaceKey": "myWorkspaceKey"
78+
}
79+
}
7880
}
7981
```
8082
### Property values
@@ -95,7 +97,7 @@ The following JSON shows the schema for the Log Analytics agent extension. The e
9597
9698
## Template deployment
9799

98-
Azure VM extensions can be deployed with Azure Resource Manager templates. The JSON schema detailed in the previous section can be used in an Azure Resource Manager template to run the Log Analytics agent extension during an Azure Resource Manager template deployment. A sample template that includes the Log Analytics agent VM extension can be found on the [Azure Quick Start Gallery](https://github.com/Azure/azure-quickstart-templates/tree/master/201-oms-extension-windows-vm).
100+
Azure VM extensions can be deployed with Azure Resource Manager templates. The JSON schema detailed in the previous section can be used in an Azure Resource Manager template to run the Log Analytics agent extension during an Azure Resource Manager template deployment. A sample template that includes the Log Analytics agent VM extension can be found on the [Azure Quickstart Gallery](https://github.com/Azure/azure-quickstart-templates/tree/master/201-oms-extension-windows-vm).
99101

100102
>[!NOTE]
101103
>The template does not support specifying more than one workspace ID and workspace key when you want to configure the agent to report to multiple workspaces. To configure the agent to report to multiple workspaces, see [Adding or removing a workspace](../../azure-monitor/platform/agent-manage.md#adding-or-removing-a-workspace).
@@ -107,51 +109,51 @@ The following example assumes the Log Analytics extension is nested inside the v
107109

108110
```json
109111
{
110-
"type": "extensions",
111-
"name": "OMSExtension",
112-
"apiVersion": "[variables('apiVersion')]",
113-
"location": "[resourceGroup().location]",
114-
"dependsOn": [
115-
"[concat('Microsoft.Compute/virtualMachines/', variables('vmName'))]"
116-
],
117-
"properties": {
118-
"publisher": "Microsoft.EnterpriseCloud.Monitoring",
119-
"type": "MicrosoftMonitoringAgent",
120-
"typeHandlerVersion": "1.0",
121-
"autoUpgradeMinorVersion": true,
122-
"settings": {
123-
"workspaceId": "myWorkSpaceId"
124-
},
125-
"protectedSettings": {
126-
"workspaceKey": "myWorkspaceKey"
127-
}
128-
}
112+
"type": "extensions",
113+
"name": "OMSExtension",
114+
"apiVersion": "[variables('apiVersion')]",
115+
"location": "[resourceGroup().location]",
116+
"dependsOn": [
117+
"[concat('Microsoft.Compute/virtualMachines/', variables('vmName'))]"
118+
],
119+
"properties": {
120+
"publisher": "Microsoft.EnterpriseCloud.Monitoring",
121+
"type": "MicrosoftMonitoringAgent",
122+
"typeHandlerVersion": "1.0",
123+
"autoUpgradeMinorVersion": true,
124+
"settings": {
125+
"workspaceId": "myWorkSpaceId"
126+
},
127+
"protectedSettings": {
128+
"workspaceKey": "myWorkspaceKey"
129+
}
130+
}
129131
}
130132
```
131133

132134
When placing the extension JSON at the root of the template, the resource name includes a reference to the parent virtual machine, and the type reflects the nested configuration.
133135

134136
```json
135137
{
136-
"type": "Microsoft.Compute/virtualMachines/extensions",
137-
"name": "<parentVmResource>/OMSExtension",
138-
"apiVersion": "[variables('apiVersion')]",
139-
"location": "[resourceGroup().location]",
140-
"dependsOn": [
141-
"[concat('Microsoft.Compute/virtualMachines/', variables('vmName'))]"
142-
],
143-
"properties": {
144-
"publisher": "Microsoft.EnterpriseCloud.Monitoring",
145-
"type": "MicrosoftMonitoringAgent",
146-
"typeHandlerVersion": "1.0",
147-
"autoUpgradeMinorVersion": true,
148-
"settings": {
149-
"workspaceId": "myWorkSpaceId"
150-
},
151-
"protectedSettings": {
152-
"workspaceKey": "myWorkspaceKey"
153-
}
154-
}
138+
"type": "Microsoft.Compute/virtualMachines/extensions",
139+
"name": "<parentVmResource>/OMSExtension",
140+
"apiVersion": "[variables('apiVersion')]",
141+
"location": "[resourceGroup().location]",
142+
"dependsOn": [
143+
"[concat('Microsoft.Compute/virtualMachines/', variables('vmName'))]"
144+
],
145+
"properties": {
146+
"publisher": "Microsoft.EnterpriseCloud.Monitoring",
147+
"type": "MicrosoftMonitoringAgent",
148+
"typeHandlerVersion": "1.0",
149+
"autoUpgradeMinorVersion": true,
150+
"settings": {
151+
"workspaceId": "myWorkSpaceId"
152+
},
153+
"protectedSettings": {
154+
"workspaceKey": "myWorkspaceKey"
155+
}
156+
}
155157
}
156158
```
157159

0 commit comments

Comments
 (0)