You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure Stack HCI is a secure-by-default product that has more than 300 security settings enabled right from the start. Default security settings provide a consistent security baseline to ensure that devices start in a known good state.
15
+
Azure Local is a secure-by-default product that has more than 300 security settings enabled right from the start. Default security settings provide a consistent security baseline to ensure that devices start in a known good state.
16
16
17
-
This article provides a brief conceptual overview of the various security features associated with your Azure Stack HCI cluster. Features include security defaults, Windows Defender for Application Control (WDAC), volume encryption via BitLocker, secret rotation, local built-in user accounts, Microsoft Defender for Cloud, and more.
17
+
This article provides a brief conceptual overview of the various security features associated with your Azure Local instance. Features include security defaults, Windows Defender for Application Control (WDAC), volume encryption via BitLocker, secret rotation, local built-in user accounts, Microsoft Defender for Cloud, and more.
18
18
19
19
## Security defaults
20
20
21
-
Your Azure Stack HCI has security settings enabled by default that provide a consistent security baseline, a baseline management system, and a drift control mechanism.
21
+
Your Azure Local has security settings enabled by default that provide a consistent security baseline, a baseline management system, and a drift control mechanism.
22
22
23
23
You can monitor the security baseline and secured-core settings during both deployment and runtime. You can also disable drift control during deployment when you configure security settings.
24
24
25
25
With drift control applied, security settings are refreshed every 90 minutes. This refresh interval ensures remediation of any changes from the desired state. Continuous monitoring and autoremediation enable a consistent and reliable security posture throughout the lifecycle of the device.
26
26
27
-
Secure baseline on Azure Stack HCI:
27
+
Secure baseline on Azure Local:
28
28
29
29
- Improves the security posture by disabling legacy protocols and ciphers.
30
30
- Reduces OPEX with a built-in drift protection mechanism that enables consistent at-scale monitoring via the Azure Arc Hybrid Edge baseline.
31
31
- Enables you to meet Center for Internet Security (CIS) benchmark and Defense Information System Agency (DISA) Security Technical Implementation Guide (STIG) requirements for the OS and recommended security baseline.
32
32
33
-
For more information, see [Manage security defaults on Azure Stack HCI](../manage/manage-secure-baseline.md).
33
+
For more information, see [Manage security defaults on Azure Local](../manage/manage-secure-baseline.md).
34
34
35
35
## Windows Defender Application Control
36
36
37
-
WDAC is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. WDAC is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Windows Defender Application Control for Azure Stack HCI, version 23H2](../manage/manage-wdac.md#manage-wdac-settings-with-powershell).
37
+
WDAC is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. WDAC is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Windows Defender Application Control for Azure Local, version 23H2](../manage/manage-wdac.md#manage-wdac-settings-with-powershell).
38
38
39
39
WDAC provides two main operation modes, Enforcement mode and Audit mode. In Enforcement mode, untrusted code is blocked and events are recorded. In Audit mode, untrusted code is allowed to run and events are recorded. To learn more about WDAC-related events, see [List of Events](/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations).
40
40
@@ -43,11 +43,11 @@ WDAC provides two main operation modes, Enforcement mode and Audit mode. In Enfo
43
43
44
44
### About WDAC policy design
45
45
46
-
Microsoft provides base signed policies on Azure Stack HCI for both Enforcement mode and Audit mode. Additionally, policies include a predefined set of platform behavior rules and block rules to apply to the application control layer.
46
+
Microsoft provides base signed policies on Azure Local for both Enforcement mode and Audit mode. Additionally, policies include a predefined set of platform behavior rules and block rules to apply to the application control layer.
47
47
48
48
#### Composition of base policies
49
49
50
-
Azure Stack HCI base policies include the following sections:
50
+
Azure Local base policies include the following sections:
51
51
52
52
-**Metadata**: The metadata defines unique properties of the policy such as the policy name, version, GUID, and more.
53
53
-**Option Rules**: These rules define policy behavior. Supplemental policies can only differ from a small set of the option rules tied to their base policy.
@@ -96,20 +96,20 @@ To learn more about Deny rules, see:
96
96
97
97
## BitLocker encryption
98
98
99
-
Data-at-rest encryption is enabled on data volumes created during deployment. These data volumes include both infrastructure volumes and workload volumes. When you deploy your cluster, you can modify security settings.
99
+
Data-at-rest encryption is enabled on data volumes created during deployment. These data volumes include both infrastructure volumes and workload volumes. When you deploy your system, you can modify security settings.
100
100
101
101
By default, data-at-rest encryption is enabled during deployment. We recommend that you accept the default setting.
102
102
103
-
Once Azure Stack HCI is successfully deployed, you can retrieve BitLocker recovery keys. You must store BitLocker recovery keys in a secure location outside of the system.
103
+
Once Azure Local is successfully deployed, you can retrieve BitLocker recovery keys. You must store BitLocker recovery keys in a secure location outside of the system.
104
104
105
105
For more information about BitLocker encryption, see:
106
106
107
107
-[Use BitLocker with Cluster Shared Volumes (CSV)](../manage/bitlocker-on-csv.md).
108
-
-[Manage BitLocker encryption on Azure Stack HCI](../manage/manage-bitlocker.md).
108
+
-[Manage BitLocker encryption on Azure Local](../manage/manage-bitlocker.md).
109
109
110
110
## Local built-in user accounts
111
111
112
-
In this release, the following local built-in users associated with `RID 500` and `RID 501` are available on your Azure Stack HCI system:
112
+
In this release, the following local built-in users associated with `RID 500` and `RID 501` are available on your Azure Local system:
113
113
114
114
|Name in initial OS image |Name after deployment |Enabled by default |Description |
115
115
|-----|-----|-----|-----|
@@ -121,47 +121,47 @@ In this release, the following local built-in users associated with `RID 500` an
121
121
122
122
## Secret creation and rotation
123
123
124
-
The orchestrator in Azure Stack HCI requires multiple components to maintain secure communications with other infrastructure resources and services. All services running on the cluster have authentication and encryption certificates associated with them.
124
+
The orchestrator in Azure Local requires multiple components to maintain secure communications with other infrastructure resources and services. All services running on the system have authentication and encryption certificates associated with them.
125
125
126
-
To ensure security, we implement internal secret creation and rotation capabilities. When you review your cluster nodes, you see several certificates created under the path LocalMachine/Personal certificate store (`Cert:\LocalMachine\My`).
126
+
To ensure security, we implement internal secret creation and rotation capabilities. When you review your system nodes, you see several certificates created under the path LocalMachine/Personal certificate store (`Cert:\LocalMachine\My`).
127
127
128
128
In this release, the following capabilities are enabled:
129
129
130
-
- The ability to create certificates during deployment and after cluster scale operations.
131
-
- Automated autorotation before certificates expire, and an option to rotate certificates during the lifetime of the cluster.
130
+
- The ability to create certificates during deployment and after system scale operations.
131
+
- Automated autorotation before certificates expire, and an option to rotate certificates during the lifetime of the system.
132
132
- The ability to monitor and alert whether certificates are still valid.
133
133
134
134
> [!NOTE]
135
-
> Secret creation and rotation operations take about ten minutes to complete, depending on the size of the cluster.
135
+
> Secret creation and rotation operations take about ten minutes to complete, depending on the size of the system.
136
136
137
137
For more information, see [Manage secrets rotation](../manage/manage-secrets-rotation.md).
138
138
139
139
## Syslog forwarding of security events
140
140
141
-
For customers and organizations that require their own local security information and event management (SIEM) system, Azure Stack HCI version 23H2 includes an integrated mechanism that enables you to forward security-related events to a SIEM.
141
+
For customers and organizations that require their own local security information and event management (SIEM) system, Azure Local, version 23H2 includes an integrated mechanism that enables you to forward security-related events to a SIEM.
142
142
143
-
Azure Stack HCI has an integrated syslog forwarder that, once configured, generates syslog messages defined in RFC3164, with the payload in Common Event Format (CEF).
143
+
Azure Local has an integrated syslog forwarder that, once configured, generates syslog messages defined in RFC3164, with the payload in Common Event Format (CEF).
144
144
145
-
The following diagram illustrates integration of Azure Stack HCI with an SIEM. All audits, security logs, and alerts are collected on each host and exposed via syslog with the CEF payload.
145
+
The following diagram illustrates integration of Azure Local with an SIEM. All audits, security logs, and alerts are collected on each host and exposed via syslog with the CEF payload.
146
146
147
-
:::image type="content" source="media/security-features/integration-of-azure-stack-hci-with-external-siem.png" alt-text="The following diagram describes the integration of Azure Stack HCI with an external security information and event management (SIEM) system." lightbox="media/security-features/integration-of-azure-stack-hci-with-external-siem.png":::
147
+
:::image type="content" source="media/security-features/integration-of-azure-stack-hci-with-external-siem.png" alt-text="The following diagram describes the integration of Azure Local with an external security information and event management (SIEM) system." lightbox="media/security-features/integration-of-azure-stack-hci-with-external-siem.png":::
148
148
149
-
Syslog forwarding agents are deployed on every Azure Stack HCI host to forward syslog messages to the customer-configured syslog server. Syslog forwarding agents work independently from each other but can be managed together on any one of the hosts.
149
+
Syslog forwarding agents are deployed on every Azure Local host to forward syslog messages to the customer-configured syslog server. Syslog forwarding agents work independently from each other but can be managed together on any one of the hosts.
150
150
151
-
The syslog forwarder in Azure Stack HCI supports various configurations based on whether syslog forwarding is with TCP or UDP, whether the encryption is enabled or not, and whether there's unidirectional or bidirectional authentication.
151
+
The syslog forwarder in Azure Local supports various configurations based on whether syslog forwarding is with TCP or UDP, whether the encryption is enabled or not, and whether there's unidirectional or bidirectional authentication.
152
152
153
153
For more information, see [Manage syslog forwarding](../manage/manage-syslog-forwarding.md).
154
154
155
155
## Microsoft Defender for Cloud (preview)
156
156
157
157
Microsoft Defender for Cloud is a security posture management solution with advanced threat protection capabilities. It provides you with tools to assess the security status of your infrastructure, protect workloads, raise security alerts, and follow specific recommendations to remediate attacks and address future threats. It performs all these services at high speed in the cloud through autoprovisioning and protection with Azure services, with no deployment overhead.
158
158
159
-
With the basic Defender for Cloud plan, you get recommendations on how to improve the security posture of your Azure Stack HCI system at no extra cost. With the paid Defender for Servers plan, you get enhanced security features including security alerts for individual servers and Arc VMs.
159
+
With the basic Defender for Cloud plan, you get recommendations on how to improve the security posture of your Azure Local system at no extra cost. With the paid Defender for Servers plan, you get enhanced security features including security alerts for individual machines and Arc VMs.
160
160
161
161
For more information, see [Manage system security with Microsoft Defender for Cloud (preview)](../manage/manage-security-with-defender-for-cloud.md).
162
162
163
163
## Next steps
164
164
165
165
-[Assess deployment readiness via the Environment Checker](../manage/use-environment-checker.md).
166
-
-[Read the Azure Stack HCI security book](https://assetsprod.microsoft.com/mpn/azure-stack-hci-security-book.pdf).
167
-
-[View the Azure Stack HCI security standards](/azure-stack/hci/assurance/azure-stack-security-standards).
166
+
-[Read the Azure Local security book](https://assetsprod.microsoft.com/mpn/azure-stack-hci-security-book.pdf).
167
+
-[View the Azure Local security standards](/azure-stack/hci/assurance/azure-stack-security-standards).
0 commit comments