Skip to content

Commit af99653

Browse files
committed
Edits and Acrolinx updates.
1 parent 3861181 commit af99653

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

azure-local/manage/manage-secure-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: o2/03/2025
8+
ms.date: 02/03/2025
99
---
1010

1111
# Manage security defaults for Azure Local

azure-local/manage/manage-syslog-forwarding.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Use syslog forwarding to integrate with security monitoring solutions and to ret
1818

1919
## Configure syslog forwarding
2020

21-
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each of the agents will forward security events in syslog format from the host to the customer-configured syslog server.
21+
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each agent forwards security events in syslog format from the host to the customer-configured syslog server.
2222

2323
Syslog forwarding agents work independently from each other but can be managed all together on any one of the hosts. Use PowerShell cmdlets with administrative privileges on any host to control the behavior of all forwarder agents.
2424

@@ -35,9 +35,9 @@ The syslog forwarder in Azure Local supports the following configurations:
3535
3636
### Cmdlets to configure syslog forwarding
3737

38-
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets has been added to all Azure Local hosts to control behavior of the syslog forwarder.
38+
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets is added to all Azure Local hosts to control behavior of the syslog forwarder.
3939

40-
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance will be started to config the syslog forwarder agents across all hosts. The action plan instance ID will be returned.
40+
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance is started to config the syslog forwarder agents across all hosts. The action plan instance ID is returned.
4141

4242
Use the following cmdlet to pass the syslog server information to the forwarder and to configure the transport protocol, the encryption, the authentication, and the optional certificate used between the client and the server:
4343

@@ -108,7 +108,7 @@ If you want to test the integration of your syslog server with the Azure Local s
108108
```
109109

110110
> [!IMPORTANT]
111-
> Microsoft recommends that you do not use the `-SkipServerCertificateCheck` flag in production environments.
111+
> Microsoft recommends that you don't use the `-SkipServerCertificateCheck` flag in production environments.
112112
113113
### Syslog forwarding with TCP and no encryption
114114

@@ -119,7 +119,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
119119
```
120120

121121
> [!IMPORTANT]
122-
> Microsoft recommends that you do not use this configuration in production environments.
122+
> Microsoft recommends that you don't use this configuration in production environments.
123123
124124
### Syslog forwarding with UDP and no encryption
125125

@@ -132,7 +132,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
132132
While UDP with no encryption is the easiest to configure, it doesn’t provide any protection against man-in-the-middle attacks or eavesdropping of messages.
133133

134134
> [!IMPORTANT]
135-
> Microsoft recommends that you do not use this configuration in production environments.
135+
> Microsoft recommends that you don't use this configuration in production environments.
136136
137137
## Enable syslog forwarding
138138

@@ -160,19 +160,19 @@ Parameter for `Enable-AzSSyslogForwarder` and `Disable-AzSSyslogForwarder` cmdle
160160

161161
## Verify syslog setup
162162

163-
After you successfully connect the syslog client to your syslog server, you will start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
163+
After you successfully connect the syslog client to your syslog server, you'll start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
164164

165165
```powershell
166166
Get-AzSSyslogForwarder [-Local | -PerNode | -Cluster]
167167
```
168168

169-
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They are always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
169+
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They're always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
170170

171171
```powershell
172172
Get-AzSSyslogForwarder -PerNode
173173
```
174174

175-
You can also use the following cmdlet to verify the configuration on the host you are connected to:
175+
You can also use the following cmdlet to verify the configuration on the host you're connected to:
176176

177177
```powershell
178178
Get-AzSSyslogForwarder -Local
@@ -286,7 +286,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
286286
|Process Create (4688) |query="Security!*[System[EventID=4688]]" |
287287
|Event log service events specific to Security channel |query="Security!*[System[Provider[@Name='Microsoft-Windows-Eventlog']]]" |
288288
|Special Privileges (Admin-equivalent Access) assigned to new logon, excluding LocalSystem |query="Security!*[System[(EventID=4672)] and EventData[Data[1] != 'S-1-5-18']]" |
289-
|New user added to local, global or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
289+
|New user added to local, global, or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
290290
|User removed from local Administrators group |query="Security!*[System[(EventID=4733)] and EventData[Data[@Name='TargetUserName']='Administrators']]" |
291291
|Certificate Services received certificate request (4886), Approved and Certificate issued (4887), Denied request (4888) |query="Security!*[System[(EventID=4886 or EventID=4887 or EventID=4888)]]" |
292292
|New User Account Created(4720), User Account Enabled (4722), User Account Disabled (4725), User Account Deleted (4726) |query="Security!*[System[(EventID=4720 or EventID=4722 or EventID=4725 or EventID=4726)]]" |
@@ -298,7 +298,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
298298
|Other Log cleared events (104) |query="System!*[System[(EventID=104)]]" |
299299
|EMET/Exploit protection events |query="Application!*[System[Provider[@Name='EMET']]]" |
300300
|WER events for application crashes only | query="Application!*[System[Provider[@Name='Windows Error Reporting']] and EventData[Data[3]='APPCRASH']]" |
301-
|User logging on with Temporary profile (1511), cannot create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
301+
|User logging on with Temporary profile (1511), can't create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
302302
|Application crash/hang events, similar to WER/1001. These include full path to faulting EXE/Module. |query="Application!*[System[Provider[@Name='Application Error'] and (EventID=1000)] or System[Provider[@Name='Application Hang'] and (EventID=1002)]]" |
303303
|Task scheduler Task Registered (106), Task Registration Deleted (141), Task Deleted (142) |query="Microsoft-Windows-TaskScheduler/Operational!*[System[Provider[@Name='Microsoft-Windows-TaskScheduler'] and (EventID=106 or EventID=141 or EventID=142 )]]" |
304304
|AppLocker packaged (Modern UI) app execution |query="Microsoft-Windows-AppLocker/Packaged app-Execution!*" |

0 commit comments

Comments
 (0)