You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/azure-security-integration.md
+31-49Lines changed: 31 additions & 49 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,25 +3,26 @@ title: Integrate Microsoft Defender for Cloud with Azure VMware Solution
3
3
description: Learn how to protect your Azure VMware Solution VMs with Azure's native security tools from the workload protection dashboard.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 06/14/2021
6
+
ms.date: 10/18/2022
7
7
---
8
8
9
9
# Integrate Microsoft Defender for Cloud with Azure VMware Solution
10
10
11
-
Microsoft Defender for Cloud provides advanced threat protection across your Azure VMware Solution and on-premises virtual machines (VMs). It assesses the vulnerability of Azure VMware Solution VMs and raises alerts as needed. These security alerts can be forwarded to Azure Monitor for resolution. You can define security policies in Microsoft Defender for Cloud. For more information, see [Working with security policies](../security-center/tutorial-security-policy.md).
11
+
Microsoft Defender for Cloud provides advanced threat protection across your Azure VMware Solution and on-premises virtual machines (VMs). It assesses the vulnerability of Azure VMware Solution VMs and raises alerts as needed. These security alerts can be forwarded to Azure Monitor for resolution. You can define security policies in Microsoft Defender for Cloud. For more information, see [Working with security policies](../security-center/tutorial-security-policy.md).
12
12
13
13
Microsoft Defender for Cloud offers many features, including:
14
+
14
15
- File integrity monitoring
15
16
- Fileless attack detection
16
-
- Operating system patch assessment
17
+
- Operating system patch assessment
17
18
- Security misconfigurations assessment
18
19
- Endpoint protection assessment
19
20
20
21
The diagram shows the integrated monitoring architecture of integrated security for Azure VMware Solution VMs.
21
-
22
+
22
23
:::image type="content" source="media/azure-security-integration/azure-integrated-security-architecture.png" alt-text="Diagram showing the architecture of Azure Integrated Security." border="false":::
23
24
24
-
**Log Analytics agent** collects log data from Azure, Azure VMware Solution, and on-premises VMs. The log data is sent to Azure Monitor Logs and stored in a **Log Analytics Workspace**. Each workspace has its own data repository and configuration to store data. Once the logs are collected, **Microsoft Defender for Cloud** assesses the vulnerability status of Azure VMware Solution VMs and raises an alert for any critical vulnerability. Once assessed, Microsoft Defender for Cloud forwards the vulnerability status to Microsoft Sentinel to create an incident and map with other threats. Microsoft Defender for Cloud is connected to Microsoft Sentinel using Microsoft Defender for Cloud Connector.
25
+
**Log Analytics agent** collects log data from Azure, Azure VMware Solution, and on-premises VMs. The log data is sent to Azure Monitor Logs and stored in a **Log Analytics Workspace**. Each workspace has its own data repository and configuration to store data. Once the logs are collected, **Microsoft Defender for Cloud** assesses the vulnerability status of Azure VMware Solution VMs and raises an alert for any critical vulnerability. Once assessed, Microsoft Defender for Cloud forwards the vulnerability status to Microsoft Sentinel to create an incident and map with other threats. Microsoft Defender for Cloud is connected to Microsoft Sentinel using Microsoft Defender for Cloud Connector.
25
26
26
27
## Prerequisites
27
28
@@ -31,40 +32,35 @@ The diagram shows the integrated monitoring architecture of integrated security
31
32
32
33
-[Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) to collect data from various sources.
33
34
34
-
-[Enable Microsoft Defender for Cloud in your subscription](../security-center/security-center-get-started.md).
35
+
-[Enable Microsoft Defender for Cloud in your subscription](../security-center/security-center-get-started.md).
35
36
36
37
>[!NOTE]
37
38
>Microsoft Defender for Cloud is a pre-configured tool that doesn't require deployment, but you'll need to enable it.
38
39
39
-
-[Enable Microsoft Defender for Cloud](../security-center/enable-azure-defender.md).
40
-
40
+
-[Enable Microsoft Defender for Cloud](../security-center/enable-azure-defender.md).
41
41
42
42
## Add Azure VMware Solution VMs to Defender for Cloud
43
43
44
44
1. In the Azure portal, search on **Azure Arc** and select it.
45
45
46
46
2. Under Resources, select **Servers** and then **+Add**.
47
47
48
-
:::image type="content" source="media/azure-security-integration/add-server-to-azure-arc.png" alt-text="Screenshot showing Azure Arc Servers page for adding an Azure VMware Solution VM to Azure.":::
48
+
:::image type="content" source="media/azure-security-integration/add-server-to-azure-arc.png" alt-text="Screenshot showing Azure Arc Servers page for adding an Azure VMware Solution VM to Azure."lightbox="media/azure-security-integration/add-server-to-azure-arc.png":::
49
49
50
50
3. Select **Generate script**.
51
-
52
-
:::image type="content" source="media/azure-security-integration/add-server-using-script.png" alt-text="Screenshot of Azure Arc page showing option for adding a server using interactive script.":::
53
-
51
+
52
+
:::image type="content" source="media/azure-security-integration/add-server-using-script.png" alt-text="Screenshot of Azure Arc page showing option for adding a server using interactive script."lightbox="media/azure-security-integration/add-server-using-script.png":::
53
+
54
54
4. On the **Prerequisites** tab, select **Next**.
55
55
56
-
5. On the **Resource details** tab, fill in the following details and then select **Next: Tags**.
56
+
5. On the **Resource details** tab, fill in the following details and then select **Next. Tags**:
57
57
58
58
- Subscription
59
-
60
59
- Resource group
61
-
62
-
- Region
63
-
60
+
- Region
64
61
- Operating system
65
-
66
62
- Proxy Server details
67
-
63
+
68
64
6. On the **Tags** tab, select **Next**.
69
65
70
66
7. On the **Download and run script** tab, select **Download**.
@@ -73,23 +69,23 @@ The diagram shows the integrated monitoring architecture of integrated security
73
69
74
70
## View recommendations and passed assessments
75
71
76
-
Recommendations and assessments provide you with the security health details of your resource.
72
+
Recommendations and assessments provide you with the security health details of your resource.
77
73
78
74
1. In Microsoft Defender for Cloud, select **Inventory** from the left pane.
79
75
80
76
2. For Resource type, select **Servers - Azure Arc**.
81
-
82
-
:::image type="content" source="media/azure-security-integration/select-resource-in-security-center.png" alt-text="Screenshot showing the Microsoft Defender for Cloud Inventory page with the Servers - Azure Arc selected under Resource type.":::
77
+
78
+
:::image type="content" source="media/azure-security-integration/select-resource-in-security-center.png" alt-text="Screenshot showing the Microsoft Defender for Cloud Inventory page with the Servers - Azure Arc selected under Resource type."lightbox="media/azure-security-integration/select-resource-in-security-center.png":::
83
79
84
80
3. Select the name of your resource. A page opens showing the security health details of your resource.
85
81
86
82
4. Under **Recommendation list**, select the **Recommendations**, **Passed assessments**, and **Unavailable assessments** tabs to view these details.
87
83
88
-
:::image type="content" source="media/azure-security-integration/view-recommendations-assessments.png" alt-text="Screenshot showing the Microsoft Defender for Cloud security recommendations and assessments.":::
84
+
:::image type="content" source="media/azure-security-integration/view-recommendations-assessments.png" alt-text="Screenshot showing the Microsoft Defender for Cloud security recommendations and assessments."lightbox="media/azure-security-integration/view-recommendations-assessments.png":::
89
85
90
86
## Deploy a Microsoft Sentinel workspace
91
87
92
-
Microsoft Sentinel provides security analytics, alert detection, and automated threat response across an environment. It's a cloud-native, security information event management (SIEM) solution that's built on top of a Log Analytics Workspace.
88
+
Microsoft Sentinel provides security analytics, alert detection, and automated threat response across an environment. It's a cloud-native, security information event management (SIEM) solution that's built on top of a Log Analytics workspace.
93
89
94
90
Since Microsoft Sentinel is built on top of a Log Analytics workspace, you'll only need to select the workspace you want to use.
95
91
@@ -105,32 +101,29 @@ Since Microsoft Sentinel is built on top of a Log Analytics workspace, you'll on
105
101
106
102
2. Under Configuration, select **Data connectors**.
107
103
108
-
3. Under the Connector Name column, select **Security Events** from the list, and then select **Open connector page**.
109
-
110
-
4. On the connector page, select the events you wish to stream and then select **Apply Changes**.
111
-
112
-
:::image type="content" source="media/azure-security-integration/select-events-you-want-to-stream.png" alt-text="Screenshot of Security Events page in Microsoft Sentinel where you can select which events to stream.":::
113
-
104
+
3. Under the Connector Name column, select **Security Events** from the list, then select **Open connector page**.
114
105
106
+
4. On the connector page, select the events you wish to stream, then select **Apply Changes**.
115
107
108
+
:::image type="content" source="media/azure-security-integration/select-events-you-want-to-stream.png" alt-text="Screenshot of Security Events page in Microsoft Sentinel where you can select which events to stream."lightbox="media/azure-security-integration/select-events-you-want-to-stream.png":::
116
109
117
110
## Connect Microsoft Sentinel with Microsoft Defender for Cloud
118
111
119
112
1. On the Microsoft Sentinel workspace page, select the configured workspace.
120
113
121
114
2. Under Configuration, select **Data connectors**.
122
115
123
-
3. Select **Microsoft Defender for Cloud** from the list and then select **Open connector page**.
116
+
3. Select **Microsoft Defender for Cloud** from the list, then select **Open connector page**.
124
117
125
-
:::image type="content" source="media/azure-security-integration/connect-security-center-with-azure-sentinel.png" alt-text="Screenshot of Data connectors page in Microsoft Sentinel showing selection to connect Microsoft Defender for Cloud with Microsoft Sentinel.":::
118
+
:::image type="content" source="media/azure-security-integration/connect-security-center-with-azure-sentinel.png" alt-text="Screenshot of Data connectors page in Microsoft Sentinel showing selection to connect Microsoft Defender for Cloud with Microsoft Sentinel."lightbox="media/azure-security-integration/connect-security-center-with-azure-sentinel.png":::
126
119
127
120
4. Select **Connect** to connect the Microsoft Defender for Cloud with Microsoft Sentinel.
128
121
129
122
5. Enable **Create incident** to generate an incident for Microsoft Defender for Cloud.
130
123
131
124
## Create rules to identify security threats
132
125
133
-
After connecting data sources to Microsoft Sentinel, you can create rules to generate alerts for detected threats. In the following example, we'll create a rule for attempts to sign in to Windows server with the wrong password.
126
+
After connecting data sources to Microsoft Sentinel, you can create rules to generate alerts for detected threats. In the following example, we'll create a rule for attempts to sign into Windows server with the wrong password.
134
127
135
128
1. On the Microsoft Sentinel overview page, under Configurations, select **Analytics**.
136
129
@@ -141,16 +134,12 @@ After connecting data sources to Microsoft Sentinel, you can create rules to gen
141
134
4. On the **General** tab, enter the required information and then select **Next: Set rule logic**.
142
135
143
136
- Name
144
-
145
137
- Description
146
-
147
138
- Tactics
148
-
149
139
- Severity
150
-
151
140
- Status
152
141
153
-
5. On the **Set rule logic** tab, enter the required information, and then select **Next**.
142
+
5. On the **Set rule logic** tab, enter the required information, then select **Next**.
154
143
155
144
- Rule query (here showing our example query)
156
145
@@ -160,18 +149,13 @@ After connecting data sources to Microsoft Sentinel, you can create rules to gen
160
149
|summarize count () by IpAddress,Computer
161
150
|where count_ > 3
162
151
```
163
-
164
-
- Map entities
165
152
153
+
- Map entities
166
154
- Query scheduling
167
-
168
155
- Alert threshold
169
-
170
156
- Event grouping
171
-
172
157
- Suppression
173
158
174
-
175
159
6. On the **Incident settings** tab, enable **Create incidents from alerts triggered by this analytics rule** and select **Next: Automated response**.
176
160
177
161
:::image type="content" source="../sentinel/media/tutorial-detect-threats-custom/general-tab.png" alt-text="Screenshot showing the Analytic rule wizard for creating a new rule in Microsoft Sentinel.":::
@@ -181,7 +165,7 @@ After connecting data sources to Microsoft Sentinel, you can create rules to gen
181
165
8. On the **Review and create** tab, review the information, and select **Create**.
182
166
183
167
>[!TIP]
184
-
>After the third failed attempt to sign in to Windows server, the created rule triggers an incident for every unsuccessful attempt.
168
+
>After the third failed attempt to sign into Windows server, the created rule triggers an incident for every unsuccessful attempt.
185
169
186
170
## View alerts
187
171
@@ -193,7 +177,7 @@ You can view generated incidents with Microsoft Sentinel. You can also assign in
193
177
194
178
3. Select an incident and then assign it to a team for resolution.
195
179
196
-
:::image type="content" source="media/azure-security-integration/assign-incident.png" alt-text="Screenshot of Microsoft Sentinel Incidents page with incident selected and option to assign the incident for resolution.":::
180
+
:::image type="content" source="media/azure-security-integration/assign-incident.png" alt-text="Screenshot of Microsoft Sentinel Incidents page with incident selected and option to assign the incident for resolution."lightbox="media/azure-security-integration/assign-incident.png":::
197
181
198
182
>[!TIP]
199
183
>After resolving the issue, you can close it.
@@ -205,16 +189,14 @@ You can create queries or use the available pre-defined query in Microsoft Senti
205
189
1. On the Microsoft Sentinel overview page, under Threat management, select **Hunting**. A list of pre-defined queries is displayed.
206
190
207
191
>[!TIP]
208
-
>You can also create a new query by selecting **New Query**.
192
+
>You can also create a new query by selecting **New Query**.
209
193
>
210
194
>:::image type="content" source="../sentinel/media/hunting/save-query.png" alt-text="Screenshot of Microsoft Sentinel Hunting page with + New Query highlighted.":::
211
195
212
196
3. Select a query and then select **Run Query**.
213
197
214
198
4. Select **View Results** to check the results.
215
199
216
-
217
-
218
200
## Next steps
219
201
220
202
Now that you've covered how to protect your Azure VMware Solution VMs, you may want to learn about:
0 commit comments