Skip to content

Commit f3f4ec7

Browse files
authored
Merge pull request #88259 from MicrosoftDocs/master
9/12 AM Publish
2 parents f4c09cc + 023bbfb commit f3f4ec7

File tree

84 files changed

+1163
-844
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1163
-844
lines changed

articles/asc-for-iot/concept-pricing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,10 @@ The following table provides a summary of associated costs and implications of e
6363
| **Log Analytics storage** | |
6464
| Device recommendation and alerts| Security recommendation and alerts generated by the service | Not optional |
6565
| Raw security data| Raw security data from IoT devices, collected by security agents | Disable _store raw device security events_ |
66+
|
6667

6768
>[!Important]
68-
> Opting out has severe implications to available security features.
69+
> Opting out has severe implications to Azure Security Center for IoT security feature availability.
6970
7071
| Opt out | Implications |
7172
| --- | --- |

articles/asc-for-iot/concept-security-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,8 +81,8 @@ For more details, see [Create custom alerts](quickstart-create-custom-alerts.md)
8181
| Medium | Certificate deleted from an IoT Hub | A certificate named \'%{DescCertificateName}\' was deleted from IoT Hub \'%{DescIoTHubName}\'. If this action was made by an unauthorized party, it may indicate a malicious activity.| 1. Make sure the certificate was removed by an authorized party. <br> 2. If the certificate was not removed by an authorized party, add the certificate back, and escalate the alert to the organizational security team. |
8282
| Medium | Unsuccessful attempt detected to add a certificate to an IoT Hub | There was an unsuccessful attempt to add certificate \'%{DescCertificateName}\' to IoT Hub \'%{DescIoTHubName}\'. If this action was made by an unauthorized party, it may indicate malicious activity.| Make sure permissions to change certificates are only granted to authorized parties. |
8383
| Medium | Unsuccessful attempt detected to delete a certificate from an IoT Hub | There was an unsuccessful attempt to delete certificate \'%{DescCertificateName}\' from IoT Hub \'%{DescIoTHubName}\'. If this action was made by an unauthorized party, it may indicate malicious activity. |Make sure permissions to change certificates are only granted to an authorized party.
84-
| Low | Attempt to add or edit a diagnostic setting of an IoT Hub detected | Attempt to add or edit the diagnostic settings of an IoT Hub has been detected. Diagnostic settings enable you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate malicious activity. |
85-
| Low | Attempt to delete a diagnostic setting from an IoT Hub detected | There was %{DescAttemptStatusMessage}\' attempt to add or edit diagnostic setting \'%{DescDiagnosticSettingName}\' of IoT Hub \'%{DescIoTHubName}\'. Diagnostic setting enables you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate a malicious activity. |1. Make sure the certificate was removed by an authorized party.<br> 2. If the certificate was not removed by an authorized party, add the certificate back and escalate the alert to your information security team.
84+
| Low | Attempt to add or edit a diagnostic setting of an IoT Hub detected | Attempt to add or edit the diagnostic settings of an IoT Hub has been detected. Diagnostic settings enable you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate malicious activity. |1. Make sure the certificate was removed by an authorized party.<br> 2. If the certificate was not removed by an authorized party, add the certificate back and escalate the alert to your information security team.
85+
| Low | Attempt to delete a diagnostic setting from an IoT Hub detected | There was %{DescAttemptStatusMessage}\' attempt to add or edit diagnostic setting \'%{DescDiagnosticSettingName}\' of IoT Hub \'%{DescIoTHubName}\'. Diagnostic setting enables you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. If this action was not made by an authorized party, it may indicate a malicious activity. |Make sure permissions to change diagnostics settings are granted only to an authorized party.
8686
|
8787

8888
## Next steps

articles/asc-for-iot/event-aggregation.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,7 @@ After analysis, Azure Security Center for IoT creates security alerts for suspic
5656

5757
Aggregation start time, end time and hit count for each event are logged in the event **ExtraDetails** field within Log Analytics for use during investigations.
5858

59+
Each aggregated event represents a 24 hour period of collected alerts. Using the event options menu on the upper left of each event, you can **dismiss** each individual aggregated event.
5960

6061
## Event aggregation twin configuration
6162
Make changes to the configuration of Azure Security Center for IoT event aggregation inside the [agent configuration object](how-to-agent-configuration.md) of the module twin identity of the **azureiotsecurity** module.

articles/asc-for-iot/how-to-agent-configuration.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -84,28 +84,28 @@ To use a default property value, remove the property from the configuration obje
8484

8585
1. In your IoT Hub, locate and select the device you wish to change.
8686

87-
2. Click on your device, and then on **azureiotsecurity** module.
87+
1. Click on your device, and then on **azureiotsecurity** module.
8888

89-
3. Click on **Module Identity Twin**.
89+
1. Click on **Module Identity Twin**.
9090

91-
4. Edit the properties you wish to change in the security module.
91+
1. Edit the properties you wish to change in the security module.
9292

9393
For example, to configure connection events as high priority and collect high priority events every 7 minutes, use the following configuration.
9494

95-
```json
95+
```json
9696
"desired": {
97-
"ms_iotn:urn_azureiot_Security_SecurityAgentConfiguration": {
98-
"highPriorityMessageFrequency": {
99-
"value" : "PT7M"
100-
},
101-
"eventPriorityConnectionCreate": {
102-
"value" : "High"
103-
}
104-
}
105-
},
97+
"ms_iotn:urn_azureiot_Security_SecurityAgentConfiguration": {
98+
"highPriorityMessageFrequency": {
99+
"value": "PT7M"
100+
},
101+
"eventPriorityConnectionCreate": {
102+
"value": "High"
103+
}
104+
}
105+
}
106106
```
107107

108-
5. Click **Save**.
108+
1. Click **Save**.
109109

110110
### Using a default value
111111

articles/asc-for-iot/how-to-deploy-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Answer the following questions about your IoT devices to select the correct agen
7777

7878
- Are you using a Linux distribution with x64 architecture?
7979

80-
You can use either agent flavor. <br>
80+
Both agent flavors can be used. <br>
8181
[Deploy a C-based security agent for Linux](how-to-deploy-linux-c.md) and/or
8282
[Deploy a C#-based security agent for Linux](how-to-deploy-linux-cs.md).
8383

@@ -97,7 +97,7 @@ The following list includes all currently supported platforms.
9797
|C#|Ubuntu 18.04 |x64|
9898
|C#|Debian 9 |x64|
9999
|C#|Windows Server 2016| X64|
100-
|C#|Windows 10 IoT Core build 17763 |x64|
100+
|C#|Windows 10 IoT Core, build 17763 |x64|
101101
|
102102

103103
## Next steps

articles/asc-for-iot/index.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,11 @@ sections:
6161
image:
6262
src: https://docs.microsoft.com/media/common/i_video.svg
6363
href: https://youtu.be/pq5uSp9u_x0
64+
- title: Microsoft Azure Security Center for IoT - Solution
65+
href: https://www.youtube.com/watch?time_continue=5&v=YOqkahQsKek
66+
image:
67+
src: https://docs.microsoft.com/media/common/i_video.svg
68+
href: https://www.youtube.com/watch?time_continue=5&v=YOqkahQsKek
6469
- title: Reference
6570
items:
6671
- type: list

articles/azure-monitor/app/cloudservices.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,9 @@ If you've decided to create a separate resource for each role, and perhaps a sep
7979

8080
![Application Insights pane](./media/cloudservices/01-new.png)
8181

82-
1. In the **Application Type** drop-down list, select **ASP.NET web application**.
83-
Each resource is identified by an instrumentation key. You might need this key later if you want to manually configure or verify the configuration of the SDK.
82+
1. In the **Application Type** drop-down list, select **ASP.NET web application**.
83+
84+
Each resource is identified by an instrumentation key. You might need this key later if you want to manually configure or verify the configuration of the SDK.
8485

8586

8687
## Set up Azure Diagnostics for each role
@@ -128,8 +129,9 @@ In Visual Studio, configure the Application Insights SDK for each cloud app proj
128129
* [Worker role](https://github.com/Microsoft/ApplicationInsights-Home/blob/master/Samples/AzureEmailService/WorkerRoleA/WorkerRoleA.cs#L232)
129130
* [For webpages](https://github.com/Microsoft/ApplicationInsights-Home/blob/master/Samples/AzureEmailService/MvcWebRole/Views/Shared/_Layout.cshtml#L13)
130131
131-
1. Set the *ApplicationInsights.config* file to be copied always to the output directory.
132-
A message in the *.config* file asks you to place the instrumentation key there. However, for cloud apps, it's better to set it from the *.cscfg* file. This approach ensures that the role is correctly identified in the portal.
132+
1. Set the *ApplicationInsights.config* file to be copied always to the output directory.
133+
134+
A message in the *.config* file asks you to place the instrumentation key there. However, for cloud apps, it's better to set it from the *.cscfg* file. This approach ensures that the role is correctly identified in the portal.
133135

134136
## Set up Status Monitor to collect full SQL Queries (optional)
135137

@@ -166,16 +168,19 @@ This step is only needed if you want to capture full SQL queries on .NET Framewo
166168

167169
1. Run your app, and sign in to Azure.
168170

169-
1. Open the Application Insights resources that you created.
170-
Individual data points are displayed in [Search](../../azure-monitor/app/diagnostic-search.md), and aggregated data is displayed in [Metric Explorer](../../azure-monitor/app/metrics-explorer.md).
171+
1. Open the Application Insights resources that you created.
172+
173+
Individual data points are displayed in [Search][diagnostic], and aggregated data is displayed in [Metric Explorer](../../azure-monitor/app/metrics-explorer.md).
171174

172175
1. Add more telemetry (see the next sections) and then publish your app to get live diagnostics and usage feedback.
173176

174177
If there is no data, do the following:
178+
175179
1. To view individual events, open the [Search][diagnostic] tile.
176180
1. In the app, open various pages so that it generates some telemetry.
177181
1. Wait a few seconds, and then click **Refresh**.
178-
For more information, see [Troubleshooting][qna].
182+
183+
For more information, see [Troubleshooting][qna].
179184

180185
## View Azure Diagnostics events
181186
You can find the [Azure Diagnostics](https://docs.microsoft.com/azure/monitoring-and-diagnostics/azure-diagnostics) information in Application Insights in the following locations:

articles/azure-monitor/app/javascript.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: application-insights
1010
ms.workload: tbd
1111
ms.tgt_pltfrm: ibiza
1212
ms.topic: conceptual
13-
ms.date: 08/15/2019
13+
ms.date: 09/12/2019
1414
ms.author: mbullwin
1515
---
1616
# Application Insights for web pages
@@ -137,14 +137,14 @@ Most configuration fields are named such that they can be defaulted to false. Al
137137

138138
By default, this SDK will **not** handle state-based route changing that occurs in single page applications. To enable automatic route change tracking for your single page application, you can add `enableAutoRouteTracking: true` to your setup configuration.
139139

140-
Currently, we offer a separate [React plugin](#react-extensions) which you can initialize with this SDK. It will also accomplish route change tracking for you, as well as collect [other React specific telemetry](https://github.com/microsoft/ApplicationInsights-JS/tree/master/vNext/extensions/applicationinsights-react-js).
140+
Currently, we offer a separate [React plugin](#react-extensions) which you can initialize with this SDK. It will also accomplish route change tracking for you, as well as collect [other React specific telemetry](https://github.com/microsoft/ApplicationInsights-JS/blob/17ef50442f73fd02a758fbd74134933d92607ecf/extensions/applicationinsights-react-js/README.md).
141141

142142
## React extensions
143143

144144
| Extensions |
145145
|---------------|
146-
| [React](https://github.com/microsoft/ApplicationInsights-JS/tree/master/vNext/extensions/applicationinsights-react-js)|
147-
| [React Native](https://github.com/microsoft/ApplicationInsights-JS/tree/master/vNext/extensions/applicationinsights-react-native)|
146+
| [React](https://github.com/microsoft/ApplicationInsights-JS/blob/17ef50442f73fd02a758fbd74134933d92607ecf/extensions/applicationinsights-react-js/README.md)|
147+
| [React Native](https://github.com/microsoft/ApplicationInsights-JS/blob/17ef50442f73fd02a758fbd74134933d92607ecf/extensions/applicationinsights-react-native/README.md)|
148148

149149
## Explore browser/client-side data
150150

articles/azure-monitor/insights/vminsights-health.md

Lines changed: 47 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: azure-monitor
1111
ms.topic: conceptual
1212
ms.tgt_pltfrm: na
1313
ms.workload: infrastructure-services
14-
ms.date: 07/24/2019
14+
ms.date: 09/12/2019
1515
ms.author: magoedte
1616
---
1717

@@ -31,49 +31,52 @@ For information about configuring Azure Monitor for VMs, see [Enable Azure Monit
3131

3232
This section outlines the default health criteria to monitor Azure Windows and Linux VMs. All health criteria are pre-configured to send an alert when they detect an unhealthy condition.
3333

34-
### Windows VMs
35-
36-
- Available Megabytes of Memory
37-
- Average Disk Seconds Per Write (Logical Disk)
38-
- Average Disk Seconds Per Write (Disk)
39-
- Average Logical Disk Seconds Per Read
40-
- Average Logical Disk Seconds Per Transfer
41-
- Average Disk Seconds Per Read
42-
- Average Disk Seconds Per Transfer
43-
- Current Disk Queue Length (Logical Disk)
44-
- Current Disk Queue Length (Disk)
45-
- Disk Percent Idle Time
46-
- File system error or corruption
47-
- Logical Disk Free Space (%) Low
48-
- Logical Disk Free Space (MB) Low
49-
- Logical Disk Percent Idle Time
50-
- Memory Pages Per Second
51-
- Percent Bandwidth Used Read
52-
- Percent Bandwidth Used Total
53-
- Percent Bandwidth Used Write
54-
- Percentage of Committed Memory in Use
55-
- Disk Percent Idle Time
56-
- DHCP Client Service Health
57-
- DNS Client Service Health
58-
- RPC Service Health
59-
- Server Service Health
60-
- Total CPU Utilization Percentage
61-
- Windows Event Log Service Health
62-
- Windows Firewall Service Health
63-
- Windows Remote Management Service Health
64-
65-
### Linux VMs
66-
67-
- Disk Avg. Disk sec/Transfer
68-
- Disk Avg. Disk sec/Read
69-
- Disk Avg. Disk sec/Write
70-
- Disk Health
71-
- Logical Disk Free Space
72-
- Logical Disk % Free Space
73-
- Logical Disk % Free Inodes
74-
- Network Adapter Health
75-
- Total Percent Processor Time
76-
- Operating System Available Megabytes of Memory
34+
| Monitor name | Frequency (min) | Lookback Duration (min) | Operator | Threshold | Alert on state | Severity | Workload category |
35+
|--------------|-----------|----------|----------|-----------|----------------|----------|-------------------|
36+
| Logical Disk Online | 5 | 15 | <> | 1 (true) | Critical | Sev1 | Linux |
37+
| Logical Disk Free Space | 5 | 15 | < | 200 MB (warning)<br> 100 MB (critical) | Warning | Sev1<br> Sev2 | Linux |
38+
| Logical Disk % Free Inodes | 5 | 15 | < | 5% | Critical | Sev1 | Linux |
39+
| Logical Disk % Free Space | 5 | 15 | < | 5% | Critical | Sev1 | Linux |
40+
| Network Adapter Status | 5 | 15 | <> | 1 (true) | Warning | Sev2 | Linux |
41+
| Operating System Available Megabytes Memory | 5 | 10 | < | 2.5 MB | Critical | Sev1 | Linux |
42+
| Disk Avg. Disk sec/Read | 5 | 25 | > | 0.05s | Critical | Sev1 | Linux |
43+
| Disk Avg. Disk sec/Transfer | 5 | 25 | > | 0.05s | Critical | Sev1 | Linux |
44+
| Disk Avg. Disk sec/Write | 5 | 25 | > | 0.05s | Critical | Sev1 | Linux |
45+
| Disk Status | 5 | 25 | <> | 1 (true) | Critical | Sev1 | Linux |
46+
| Operating System Total Percent Processor Time | 5 | 10 | >= | 95% | Critical | Sev1 | Linux |
47+
| Total CPU Utilization Percentage | 5 | 10 | >= | 95% | Critical | Sev1 | Windows |
48+
| File system error or corruption | 60 | 60 | <> | 4 | Critical | Sev1 | Windows |
49+
| Average Logical Disk Seconds Per Read | 1 | 15 | > | 0.04s | Warning | Sev2 | Windows |
50+
| Average Logical Disk Seconds Per Transfer | 1 | 15 | > | 0.04s | Warning | Sev2 | Windows |
51+
| Average Logical Disk Seconds Per Write (Logical Disk) | 1 | 15 | > | 0.04s | Warning | Sev2 | Windows |
52+
| Current Disk Queue Length (Logical Disk) | 5 | 60 | >= | 32 | Warning | Sev2 | Windows |
53+
| Logical Disk Free Space (MB) | 15 | 60 | > | 500 MB warning<br> 300 MB critical | Critical | Sev1<br> Sev2 | Windows |
54+
| Logical Disk Free Space (%) | 15 | 60 | > | 10% warning<br> 5% critical | Critical | Sev1<br> Sev2 | Windows |
55+
| Logical Disk Percent Idle Time | 15 | 360 | <= | 20% | Warning | Sev2 | Windows |
56+
| Percent Bandwidth Used Read | 5 | 60 | >= | 60% | Warning | Sev2 | Windows |
57+
| Percent Bandwidth Used Total | 5 | 60 | >= | 75% | Warning | Sev2 | Windows |
58+
| Percent Bandwidth Used Write | 5 | 60 | >= | 60% | Warning | Sev2 | Windows |
59+
| DHCP Client Service Health | 5 | 12 | <> | 4 (running) | Critical | Sev1 | Windows |
60+
| DNS Client Service Health | 5 | 12 | <> | 4 (running) | Critical | Sev1 | Windows |
61+
| Windows Event Log Service Health | 5 | 12 | <> | 4 (running) | Critical | Sev1 | Windows |
62+
| Windows Firewall Service Health | 5 | 12 | <> | 4 (running) | Critical | Sev1 | Windows |
63+
| RPC Service Health | 5 | 12 | <> | 4 (running) | Critical | Sev1 | Windows |
64+
| Server Service Health | 5 | 12 | <> | 4 (running) | Critical | Sev1 | Windows |
65+
| Windows Remote Management Service Health | 5 | 12 | <> | 4 (running) | Critical | Sev1 | Windows |
66+
| Available Megabytes of Memory | 5 | 10 | < | 100 MB | Critical | Sev1 | Windows |
67+
| Free System Page Table Entries | 5 | 10 | <= | 5000 | Critical | Sev1 | Windows |
68+
| Memory Pages Per Second | 5 | 10 | >= | 5000/s | Warning | Sev1 | Windows |
69+
| Percentage of Committed Memory in Use | 5 | 10 | > | 80% | Critical | Sev1 | Windows |
70+
| Average Disk Seconds Per Transfer | 1 | 15 | > | 0.04s | Warning | Sev2 | Windows |
71+
| Average Disk Seconds Per Write | 1 | 15 | > | 0.04s | Warning | Sev2 | Windows |
72+
| Current Disk Queue Length | 5 | 60 | >= | 32 | Warning | Sev2 | Windows |
73+
| Disk Percent Idle Time | 5 | 60 | >= | 20% | Warning | Sev2 | Windows |
74+
75+
>[!NOTE]
76+
>Lookback Duration represents how often the look back window checks the metric values, such as over the last five minutes.
77+
78+
>[!NOTE]
79+
>Frequency represents how often the metric alert checks if the conditions are met, such as every one minute. It is the rate at which health criterion is executed, and lookback is the duration over which health criterion is evaluated. For example, health criterion is evaluating if the condition **CPU utilization** is greater than 95 percent with a frequency of 5 minutes and remains greater than 95% for 15 minutes (3 consecutive evaluation cycles), then the state is updated to critical severity if it wasn't already.
7780
7881
## Sign in to the Azure portal
7982

0 commit comments

Comments
 (0)