You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article describes how to manage default security settings for your Azure Local instance. You can also modify drift control and protected security settings defined during deployment so your device starts in a known good state.
16
16
17
17
## Prerequisites
18
18
19
-
Before you begin, make sure that you have access to an Azure Local, version 23H2 system that is deployed, registered, and connected to Azure.
19
+
Before you begin, make sure that you have access to an Azure Local system that is deployed, registered, and connected to Azure.
20
20
21
21
## View security default settings in the Azure portal
Copy file name to clipboardExpand all lines: azure-local/manage/manage-security-with-defender-for-cloud.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes how to use Microsoft Defender for Cloud to s
4
4
author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: how-to
7
-
ms.date: 12/11/2024
7
+
ms.date: 02/04/2025
8
8
ms.service: azure-local
9
9
---
10
10
@@ -24,7 +24,7 @@ For more information about Microsoft Defender for Cloud, see [Microsoft Defender
24
24
25
25
Before you begin, make sure that the following prerequisites are completed:
26
26
27
-
- You have access to Azure Local, version 23H2 or Azure Local, version 22H2 that is deployed, registered, and connected to Azure.
27
+
- You have access to Azure Local that is deployed, registered, and connected to Azure.
28
28
- You have at least **Owner** or **Contributor** roles in your Azure subscription to turn on Foundational cloud security posture management (CSPM).
29
29
30
30
## Enable Defender for Cloud for Azure Local
@@ -96,7 +96,7 @@ After you've [enabled Defender for Cloud for Azure Local](#enable-defender-for-c
96
96
:::image type="content" source="./media/manage-security-with-defender-for-cloud/recommendations-defender-for-cloud.png" alt-text="Screenshot of the Recommendations page in the Defender for Cloud portal." lightbox="./media/manage-security-with-defender-for-cloud/recommendations-defender-for-cloud.png" :::
97
97
98
98
> [!NOTE]
99
-
> Azure Local-exclusive recommendations are available only on Azure Local, version 23H2. Azure Local, version 22H2 shows recommendations that are also available on Windows Server.
99
+
> Azure Local-exclusive recommendations are available only on Azure Local 2311 or later. Azure Stack HCI, version 22H2 shows recommendations that are also available on Windows Server.
100
100
101
101
To learn more about the security recommendations specific to Azure Local, refer to the [Azure compute recommendations](/azure/defender-for-cloud/recommendations-reference-compute#azure-compute-recommendations) section in the [Compute security recommendations](/azure/defender-for-cloud/recommendations-reference-compute) article.
102
102
@@ -116,4 +116,4 @@ Follow these steps to access the Microsoft Defender for Cloud portal's pages to
116
116
117
117
## Next steps
118
118
119
-
-[Review the deployment checklist and install Azure Local, version 23H2](../deploy/deployment-checklist.md).
119
+
-[Review the deployment checklist and install Azure Local](../deploy/deployment-checklist.md).
Copy file name to clipboardExpand all lines: azure-local/manage/manage-syslog-forwarding.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,20 +5,20 @@ author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: how-to
7
7
ms.service: azure-local
8
-
ms.date: 11/16/2024
8
+
ms.date: 02/03/2025
9
9
---
10
10
11
11
# Manage syslog forwarding for Azure Local
12
12
13
13
[!Include [Applies to: Azure Stack HCI, version 23H2](../includes/hci-applies-to-23h2.md)]
14
14
15
-
This article describes how to configure security events to be forwarded to a customer-managed security information and event management (SIEM) system using syslog protocol for Azure Local, version 23H2.
15
+
This article describes how to configure security events to be forwarded to a customer-managed security information and event management (SIEM) system using syslog protocol for Azure Local.
16
16
17
-
Use syslog forwarding to integrate with security monitoring solutions and to retrieve relevant security event logs to store them for retention on your own SIEM platform. For more information about security features in this release, see [Security features for Azure Local, version 23H2](../concepts/security-features.md).
17
+
Use syslog forwarding to integrate with security monitoring solutions and to retrieve relevant security event logs to store them for retention on your own SIEM platform. For more information about security features in this release, see [Security features for Azure Local](../concepts/security-features.md).
18
18
19
19
## Configure syslog forwarding
20
20
21
-
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each of the agents will forward security events in syslog format from the host to the customer-configured syslog server.
21
+
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each agent forwards security events in syslog format from the host to the customer-configured syslog server.
22
22
23
23
Syslog forwarding agents work independently from each other but can be managed all together on any one of the hosts. Use PowerShell cmdlets with administrative privileges on any host to control the behavior of all forwarder agents.
24
24
@@ -35,9 +35,9 @@ The syslog forwarder in Azure Local supports the following configurations:
35
35
36
36
### Cmdlets to configure syslog forwarding
37
37
38
-
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets has been added to all Azure Local hosts to control behavior of the syslog forwarder.
38
+
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets is added to all Azure Local hosts to control behavior of the syslog forwarder.
39
39
40
-
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance will be started to config the syslog forwarder agents across all hosts. The action plan instance ID will be returned.
40
+
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance is started to config the syslog forwarder agents across all hosts. The action plan instance ID is returned.
41
41
42
42
Use the following cmdlet to pass the syslog server information to the forwarder and to configure the transport protocol, the encryption, the authentication, and the optional certificate used between the client and the server:
43
43
@@ -108,7 +108,7 @@ If you want to test the integration of your syslog server with the Azure Local s
108
108
```
109
109
110
110
> [!IMPORTANT]
111
-
> Microsoft recommends that you do not use the `-SkipServerCertificateCheck` flag in production environments.
111
+
> Microsoft recommends that you don't use the `-SkipServerCertificateCheck` flag in production environments.
112
112
113
113
### Syslog forwarding with TCP and no encryption
114
114
@@ -119,7 +119,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
119
119
```
120
120
121
121
> [!IMPORTANT]
122
-
> Microsoft recommends that you do not use this configuration in production environments.
122
+
> Microsoft recommends that you don't use this configuration in production environments.
123
123
124
124
### Syslog forwarding with UDP and no encryption
125
125
@@ -132,7 +132,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
132
132
While UDP with no encryption is the easiest to configure, it doesn’t provide any protection against man-in-the-middle attacks or eavesdropping of messages.
133
133
134
134
> [!IMPORTANT]
135
-
> Microsoft recommends that you do not use this configuration in production environments.
135
+
> Microsoft recommends that you don't use this configuration in production environments.
136
136
137
137
## Enable syslog forwarding
138
138
@@ -160,19 +160,19 @@ Parameter for `Enable-AzSSyslogForwarder` and `Disable-AzSSyslogForwarder` cmdle
160
160
161
161
## Verify syslog setup
162
162
163
-
After you successfully connect the syslog client to your syslog server, you will start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
163
+
After you successfully connect the syslog client to your syslog server, you'll start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They are always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
169
+
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They're always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
170
170
171
171
```powershell
172
172
Get-AzSSyslogForwarder -PerNode
173
173
```
174
174
175
-
You can also use the following cmdlet to verify the configuration on the host you are connected to:
175
+
You can also use the following cmdlet to verify the configuration on the host you're connected to:
176
176
177
177
```powershell
178
178
Get-AzSSyslogForwarder -Local
@@ -286,7 +286,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
|Event log service events specific to Security channel |query="Security!*[System[Provider[@Name='Microsoft-Windows-Eventlog']]]" |
288
288
|Special Privileges (Admin-equivalent Access) assigned to new logon, excluding LocalSystem |query="Security!*[System[(EventID=4672)] and EventData[Data[1] != 'S-1-5-18']]" |
289
-
|New user added to local, global or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
289
+
|New user added to local, global, or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
290
290
|User removed from local Administrators group |query="Security!*[System[(EventID=4733)] and EventData[Data[@Name='TargetUserName']='Administrators']]" |
291
291
|Certificate Services received certificate request (4886), Approved and Certificate issued (4887), Denied request (4888) |query="Security!*[System[(EventID=4886 or EventID=4887 or EventID=4888)]]" |
292
292
|New User Account Created(4720), User Account Enabled (4722), User Account Disabled (4725), User Account Deleted (4726) |query="Security!*[System[(EventID=4720 or EventID=4722 or EventID=4725 or EventID=4726)]]" |
@@ -298,7 +298,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
|WER events for application crashes only | query="Application!*[System[Provider[@Name='Windows Error Reporting']] and EventData[Data[3]='APPCRASH']]" |
301
-
|User logging on with Temporary profile (1511), cannot create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
301
+
|User logging on with Temporary profile (1511), can't create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
302
302
|Application crash/hang events, similar to WER/1001. These include full path to faulting EXE/Module. |query="Application!*[System[Provider[@Name='Application Error'] and (EventID=1000)] or System[Provider[@Name='Application Hang'] and (EventID=1002)]]" |
303
303
|Task scheduler Task Registered (106), Task Registration Deleted (141), Task Deleted (142) |query="Microsoft-Windows-TaskScheduler/Operational!*[System[Provider[@Name='Microsoft-Windows-TaskScheduler'] and (EventID=106 or EventID=141 or EventID=142 )]]" |
This article describes how to use Application Control to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local, version 23H2](../whats-new.md).
15
+
This article describes how to use Application Control to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local](../whats-new.md).
16
16
17
17
## Prerequisites
18
18
19
-
Before you begin, make sure that you have access to an Azure Local, version 23H2 instance that is deployed, registered, and connected to Azure.
19
+
Before you begin, make sure that you have access to an Azure Local instance that is deployed, registered, and connected to Azure.
20
20
21
21
## View Application Control settings via Azure portal
22
22
@@ -133,4 +133,4 @@ Use the following steps to create a supplemental policy:
133
133
134
134
## Next steps
135
135
136
-
-[Complete the prerequisites and deployment checklist and install Azure Local, version 23H2](../deploy/deployment-prerequisites.md).
136
+
-[Complete the prerequisites and deployment checklist and install Azure Local](../deploy/deployment-prerequisites.md).
0 commit comments