%3CLINGO-SUB%20id%3D%22lingo-sub-1494196%22%20slang%3D%22en-US%22%3ERe%3A%20Automating%20the%20onboarding%20on-premises%2C%20AWS%20and%20GCP%20VMs%20on%20Sentinel%20with%20Azure%20Arc%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1494196%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20article!%26nbsp%3B%20Thanks%20for%20updating%20with%20the%20latest%20Azure%20Arc%20information.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1494985%22%20slang%3D%22en-US%22%3ERe%3A%20Automating%20the%20onboarding%20on-premises%2C%20AWS%20and%20GCP%20VMs%20on%20Sentinel%20with%20Azure%20Arc%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1494985%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20incredibly%20useful%2C%20cheers!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1488267%22%20slang%3D%22en-US%22%3EAutomating%20the%20onboarding%20on-premises%2C%20AWS%20and%20GCP%20VMs%20on%20Sentinel%20with%20Azure%20Arc%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1488267%22%20slang%3D%22en-US%22%3E%3CP%3ETo%20collect%20events%20in%20Azure%20Sentinel%20from%20VMs%20and%20servers%2C%20we%20use%20the%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fplatform%2Flog-analytics-agent%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Monitoring%20Agent%3C%2FA%3E%3C%2FSPAN%3E.%20The%26nbsp%3B%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fplatform%2Flog-analytics-agent%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMMA%20%3C%2FA%3E%3C%2FSPAN%3E%26nbsp%3Bsupports%26nbsp%3Bboth%20Windows%20and%20Linux%20operating%20systems%20independently%20of%20where%20they%20run%3A%20on-premise%2C%20Azure%20or%20other%20clouds.%20The%20agent%20may%20be%20installed%20on%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fplatform%2Fagent-windows%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%3C%2FA%3E%3C%2FSPAN%3E%20or%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fplatform%2Fagent-linux%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELinux%3C%2FA%3E%3C%2FSPAN%3E%20VMs%20by%20using%20one%20of%20the%20following%20methods%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EManual%20installation%3A%20following%20a%20wizard%20or%20using%20an%20existing%20software%20distribution%20tool.%3C%2FLI%3E%0A%3CLI%3EAzure%20Automation%20Desired%20State%20Configuration%20(DSC)%3A%20you%20can%20include%20the%20MMA%20agent%20as%20part%20of%20your%20desired%20state%20configuration.%3C%2FLI%3E%0A%3CLI%3EScripting%20or%20Automation%3A%20either%20using%20PowerShell%2C%20Bash%20or%20other%20automation%20tools%20such%20as%20Ansible%2C%20Puppet%2C%20Chef%2C%20etc.%3C%2FLI%3E%0A%3CLI%3EVM%20extension%3A%20the%20Log%20Analytics%20agent%20virtual%20machine%20installs%20the%20Log%20Analytics%20agent%20on%20Azure%20virtual%20machines%2C%20and%20enrolls%20virtual%20machines%20into%20an%20existing%20Log%20Analytics%20workspace.%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThere%20is%20a%20very%20convenient%20and%20fast%20approach%20for%20making%20sure%20all%20of%20your%20Azure%20VMs%20are%20onboarded%20into%20Azure%20Sentinel%2C%20using%20an%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fpolicy%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Policy%3C%2FA%3E%3C%2FSPAN%3E%20that%20can%20audit%20settings%20inside%20the%20machine%20and%20then%20using%20the%20VM%20extensions%20installation%20as%20a%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fpolicy%2Fhow-to%2Fremediate-resources%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eremediation%20task%3C%2FA%3E%3C%2FSPAN%3E%20if%20the%20agent%20is%20not%20present.%20However%2C%20it%20was%20only%20available%20for%20Azure%20VMs%26nbsp%3B%3B%20for%20non-Azure%20deployments%2C%20we%20had%20to%20do%20a%20manual%20installation%2C%20what%20if%20we%20could%20have%20a%20similar%20experience%20for%20those%20servers%20as%20well%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-arc%2Fservers%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Arc%20for%20servers%3C%2FA%3E%20allows%20us%20to%20extend%20Azure%20Policies%20and%20extensions%20outside%20the%20boundaries%20of%20Azure%2C%20this%20makes%20non-Azure%20VMs%20first%20class%20citizens%20in%20Azure%20management%20plane.%20On%20this%20article%20we%20will%20focus%20on%20how%20you%20can%20not%20only%20automate%20the%20MMA%20installation%20using%20extensions%20but%20also%20leveraging%20Azure%20Policies%20to%20warrantee%20all%20servers%20are%20reporting%20events%20to%20Azure%20Sentinel.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-474719836%22%20id%3D%22toc-hId-474719836%22%20id%3D%22toc-hId-474719836%22%20id%3D%22toc-hId-474719836%22%3EAzure%20Arc%20agent%20on%20boarding%3C%2FH1%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20apply%20policies%20to%20non-Azure%20VMs%20you%20must%20first%20deploy%20the%20Azure%20Arc%20agent%2C%20so%20it%20is%20registered%20into%20ARM.%20Having%20this%20agent%20and%20using%20Azure%20as%20the%20management%20control%20plane%20will%20also%20come%20with%20a%20set%20of%20new%20benefits%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EHave%20a%20full%20inventory%20of%20your%20resources%3C%2FLI%3E%0A%3CLI%3EOrganize%20them%20into%20Resource%20Groups%20and%20Subscriptions%20to%20follow%20your%20cloud%20native%20practices%3C%2FLI%3E%0A%3CLI%3EApply%20tagging%2C%20RBAC%20and%20locks%3C%2FLI%3E%0A%3CLI%3EEach%20Azure%20Arc%20connected%20machine%20will%20get%20a%20resource%20ID%20in%20ARM%2C%20so%20you%20will%20be%20able%20to%20scope%20your%20Log%20Analytics%20queries%3C%2FLI%3E%0A%3CLI%3EDeploy%20extensions%20at%20scale%20including%20Microsoft%20monitoring%20Agent%2C%20Desired%20State%20Configuration%20and%20Custom%20Script%20extension.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EYou%20could%20deploy%20this%20agent%20manually%20or%20automate%20the%20installation%20with%20tools%20like%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWindows%20Admin%20Center%3C%2FLI%3E%0A%3CLI%3EAzure%20automation%20service%3C%2FLI%3E%0A%3CLI%3ESystem%20Center%20Configuration%20Manager%20(SCCM)%3C%2FLI%3E%0A%3CLI%3ESystem%20Center%20Virtual%20Machine%20Manager%20(SCVMM)%3C%2FLI%3E%0A%3CLI%3EOther%20automation%20tools%3A%20Ansible%2C%20Puppet%2C%20Chef%2C%20etc.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH1%20id%3D%22toc-hId--1332734627%22%20id%3D%22toc-hId--1332734627%22%20id%3D%22toc-hId--1332734627%22%20id%3D%22toc-hId--1332734627%22%3EAzure%20Policies%20with%20Azure%20Arc%3C%2FH1%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%20that%20external%20resources%20are%20connected%20to%20Azure%2C%20you%20can%20start%20managing%20them%20in%20a%20similar%20way%20you%E2%80%99d%20do%20in%20Azure.%20A%20very%20common%20way%20to%20make%20sure%20all%20of%20your%20VMs%20are%20reporting%20events%20to%20Sentinel%20would%20be%20to%20set%20up%20an%20Azure%20Policy%20at%20subscription%20or%20Resource%20Group%20level%20so%2C%20why%20not%20do%20the%20same%20for%20non-Azure%20Linux%20and%20Windows%20systems%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20article%2C%20shows%20the%20steps%20needed%20to%20set%20up%20a%20policy%20that%20will%20act%20as%20built-in%20control%20to%20make%20sure%20all%20your%20servers%20are%20reporting%20to%20you%20Azure%20Sentinel%20Log%20Analytics%20Workspace.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20will%20set%20up%20an%20initiative%20at%20resource%20group%20level%20to%20make%20sure%20that%20all%20Azure%20Arc%20enabled%20servers%20are%20reporting%20to%20Azure%20Sentinel%2C%20including%20on-prem%20and%20other%20cloud%20servers.%20Since%20we%20can%20install%20extensions%20on%20Azure%20Arc%20enabled%20VMs%2C%20we%20can%20use%20deployIfNotExist%20policies%20to%20automatically%20remediate%20non-compliant%20resources%20and%20install%20the%20MMA%20as%20an%20extension.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFirst%2C%20I%20created%20a%20Linux%20Virtual%20machine%20in%20Google%20Cloud%20Platform%20and%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-arc%2Fservers%2Fagent-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Einstalled%20the%20Azure%20Arc%20agent%3C%2FA%3E%3C%2FSPAN%3E.%20As%20a%20result%2C%20you%20will%20be%20able%20to%20see%20this%20GCP%20VM%20on%20Azure%20as%20an%20Azure%20Arc%20connected%20VM%20that%20is%20now%20mapped%20to%20a%20Resource%20Group%2C%20Subscription%20and%20Region.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2201.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200917i2126D2C07ED5DF73%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2201.png%22%20alt%3D%2201.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2202.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200918i79910F0A46A556A3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2202.png%22%20alt%3D%2202.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%20we%20can%20set%20up%20an%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fpolicy%2Foverview%23initiative-definition%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInitiative%3C%2FA%3E%3C%2FSPAN%3E%20to%20the%20Resource%20Group%2C%20In%20this%20case%20we%20will%20set%20up%20the%20initiative%20called%20%E2%80%9CEnable%20Azure%20Monitor%E2%80%9D%20and%20the%20scope%20will%20be%20the%20Resource%20Group%20(you%20could%20also%20apply%20it%20to%20the%20entire%20subscription).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2203.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200919i508EC653F566FFD6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2203.png%22%20alt%3D%2203.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20part%20of%20the%20initiative%2C%20we%20need%20to%20provide%20the%20Log%20Analytics%20workspace%20we%20want%20to%20use%20to%20configure%20the%20agent%20to%20connect%20to.%20In%20this%20case%2C%20we%20will%20provide%20the%20information%20of%20the%20Log%20Analytics%20workspace%20where%20we%20have%20enabled%20Azure%20Sentinel.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2204.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200921i734F543CCEC0EE5B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2204.png%22%20alt%3D%2204.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThen%20we%20also%20have%20the%20option%20to%20define%20how%20the%20policy%20should%20act%20in%20case%20it%20finds%20resources%20that%20are%20non-compliant%2C%20using%20a%20remediation%20task.%20The%20initiative%20we%20are%20using%20is%20of%20the%20type%26nbsp%3B%3CSTRONG%3EdeployIfNotExists%3C%2FSTRONG%3E%2C%20therefore%20it%20has%20the%20option%20to%26nbsp%3Bmodify%26nbsp%3Bthe%20not%20compliant%20resource%20so%20it%20can%20be%20put%20into%20a%20compliant%20state.%20The%20remediation%20task%20we%20will%20use%20is%20%E2%80%9CDeploy%20Log%20Analytics%20agent%20to%20Linux%20Arc%20machines%E2%80%9D%2C%20the%20task%20will%20leverage%20the%20Azure%20Arc%20agent%20to%20deploy%20MMA%20as%20an%20extension.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2205.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200922i6A5572CB655073BC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2205.png%22%20alt%3D%2205.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EOnce%20you%20have%20assigned%20the%20initiative%2C%20you%20will%20see%20that%20it%20will%20be%20evaluated%20(it%20may%20take%2030%20minutes%20to%20run%20the%20scan)%20and%20show%20that%20the%20server%20on%20GCP%20is%20not%20compliant.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2206.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200923iD089D240B92E7C62%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2206.png%22%20alt%3D%2206.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAfter%20we%20run%20the%20remediation%20task%2C%20we%20will%20see%20that%20the%20extension%20is%20deployed%20to%20the%20VM%20and%20we%20have%20a%20compliant%20Azure%20Policy%20report%2C%20with%20a%20Linux%20VM%20reporting%20to%20our%20Sentinel%20Log%20Analytics%20workspace.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2207.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200924i7133A9B3A4D441CE%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2207.png%22%20alt%3D%2207.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2208.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200925i677A2E48F96D7DCB%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2208.png%22%20alt%3D%2208.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20can%20also%20verify%20that%20we%20are%20collecting%20hearbeats%20and%20security%20events%20from%20the%20VM.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2209.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200926i98F69DD6653F8426%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2209.png%22%20alt%3D%2209.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAdditional%20Resources%3A%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMore%20information%20regarding%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fhybrid%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Hybrid%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Flikamrat%2Fazure_arc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Arc%20Jumpstart%3C%2FA%3E%3C%2FSPAN%3E%26nbsp%3Bto%20get%20started%20with%20Azure%20Arc%20and%20explore%20other%20use%20cases%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1488267%22%20slang%3D%22en-US%22%3E%3CP%3ELearn%20how%20to%20deploy%20The%20Log%20Analytics%20agent%20automatically%20on-prem%20and%20other%20clouds%20using%20Azure%20Arc%20anf%20Azure%20Policy.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1488267%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Arc%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Policy%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1502994%22%20slang%3D%22en-US%22%3ERe%3A%20Automating%20the%20onboarding%20on-premises%2C%20AWS%20and%20GCP%20VMs%20on%20Sentinel%20with%20Azure%20Arc%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1502994%22%20slang%3D%22en-US%22%3E%3CP%3EShould%20I%20be%20able%20to%20see%20these%20ARC%20enabled%20servers%20when%20looking%20at%20the%20Azure%20Virtual%20machines%20listing%20in%20the%20Log%20Analytics%20workspace%20(because%20I%20don't)%3F%26nbsp%3B%20This%20the%20listing%20you%20get%20by%20going%20to%20the%20%3CSTRONG%3ESettings%3C%2FSTRONG%3E%20in%20Azure%20Sentinel%2C%20click%20%3CSTRONG%3EWokspace%20settings%3C%2FSTRONG%3E%20at%20the%20top%20of%20the%20page%2C%20and%20then%20click%20the%20%3CSTRONG%3EAzure%20virtual%20Machines%20(VMs)%3C%2FSTRONG%3E%20link.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1503006%22%20slang%3D%22en-US%22%3ERe%3A%20Automating%20the%20onboarding%20on-premises%2C%20AWS%20and%20GCP%20VMs%20on%20Sentinel%20with%20Azure%20Arc%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1503006%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F46875%22%20target%3D%22_blank%22%3E%40Gary%20Bushey%3C%2FA%3E%26nbsp%3Bon%20that%20view%2C%20only%20Azure%20VMs%20are%20listed.%20However%2C%20you%20can%20see%20the%20Azure%20Arc%20connected%20machines%20in%20the%20Agent%20Management%20view%20on%20the%20same%20Workspace%20Settings.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

To collect events in Azure Sentinel from VMs and servers, we use the Microsoft Monitoring Agent. The MMA  supports both Windows and Linux operating systems independently of where they run: on-premise, Azure or other clouds. The agent may be installed on Windows or Linux VMs by using one of the following methods:

  • Manual installation: following a wizard or using an existing software distribution tool.
  • Azure Automation Desired State Configuration (DSC): you can include the MMA agent as part of your desired state configuration.
  • Scripting or Automation: either using PowerShell, Bash or other automation tools such as Ansible, Puppet, Chef, etc.
  • VM extension: the Log Analytics agent virtual machine installs the Log Analytics agent on Azure virtual machines, and enrolls virtual machines into an existing Log Analytics workspace. 

 

There is a very convenient and fast approach for making sure all of your Azure VMs are onboarded into Azure Sentinel, using an Azure Policy that can audit settings inside the machine and then using the VM extensions installation as a remediation task if the agent is not present. However, it was only available for Azure VMs ; for non-Azure deployments, we had to do a manual installation, what if we could have a similar experience for those servers as well?

 

Azure Arc for servers allows us to extend Azure Policies and extensions outside the boundaries of Azure, this makes non-Azure VMs first class citizens in Azure management plane. On this article we will focus on how you can not only automate the MMA installation using extensions but also leveraging Azure Policies to warrantee all servers are reporting events to Azure Sentinel.

 

Azure Arc agent on boarding

 

To apply policies to non-Azure VMs you must first deploy the Azure Arc agent, so it is registered into ARM. Having this agent and using Azure as the management control plane will also come with a set of new benefits:

  • Have a full inventory of your resources
  • Organize them into Resource Groups and Subscriptions to follow your cloud native practices
  • Apply tagging, RBAC and locks
  • Each Azure Arc connected machine will get a resource ID in ARM, so you will be able to scope your Log Analytics queries
  • Deploy extensions at scale including Microsoft monitoring Agent, Desired State Configuration and Custom Script extension.

You could deploy this agent manually or automate the installation with tools like:

  • Windows Admin Center
  • Azure automation service
  • System Center Configuration Manager (SCCM)
  • System Center Virtual Machine Manager (SCVMM)
  • Other automation tools: Ansible, Puppet, Chef, etc.

Azure Policies with Azure Arc

 

Now that external resources are connected to Azure, you can start managing them in a similar way you’d do in Azure. A very common way to make sure all of your VMs are reporting events to Sentinel would be to set up an Azure Policy at subscription or Resource Group level so, why not do the same for non-Azure Linux and Windows systems?

 

This article, shows the steps needed to set up a policy that will act as built-in control to make sure all your servers are reporting to you Azure Sentinel Log Analytics Workspace.

 

We will set up an initiative at resource group level to make sure that all Azure Arc enabled servers are reporting to Azure Sentinel, including on-prem and other cloud servers. Since we can install extensions on Azure Arc enabled VMs, we can use deployIfNotExist policies to automatically remediate non-compliant resources and install the MMA as an extension.

 

First, I created a Linux Virtual machine in Google Cloud Platform and installed the Azure Arc agent. As a result, you will be able to see this GCP VM on Azure as an Azure Arc connected VM that is now mapped to a Resource Group, Subscription and Region.

 

01.png

 

02.png

 

Now we can set up an Initiative to the Resource Group, In this case we will set up the initiative called “Enable Azure Monitor” and the scope will be the Resource Group (you could also apply it to the entire subscription).

 

03.png

 

As part of the initiative, we need to provide the Log Analytics workspace we want to use to configure the agent to connect to. In this case, we will provide the information of the Log Analytics workspace where we have enabled Azure Sentinel.

 

04.png

 

Then we also have the option to define how the policy should act in case it finds resources that are non-compliant, using a remediation task. The initiative we are using is of the type deployIfNotExists, therefore it has the option to modify the not compliant resource so it can be put into a compliant state. The remediation task we will use is “Deploy Log Analytics agent to Linux Arc machines”, the task will leverage the Azure Arc agent to deploy MMA as an extension.

 

05.png

Once you have assigned the initiative, you will see that it will be evaluated (it may take 30 minutes to run the scan) and show that the server on GCP is not compliant.

 

06.png

 

After we run the remediation task, we will see that the extension is deployed to the VM and we have a compliant Azure Policy report, with a Linux VM reporting to our Sentinel Log Analytics workspace.

 

07.png

 

08.png

 

We can also verify that we are collecting hearbeats and security events from the VM.

 

09.png

 

Additional Resources:

 

4 Comments
Super Contributor

Great article!  Thanks for updating with the latest Azure Arc information.

New Contributor

This is incredibly useful, cheers!

Super Contributor

Should I be able to see these ARC enabled servers when looking at the Azure Virtual machines listing in the Log Analytics workspace (because I don't)?  This the listing you get by going to the Settings in Azure Sentinel, click Wokspace settings at the top of the page, and then click the Azure virtual Machines (VMs) link.

Microsoft

@Gary Bushey on that view, only Azure VMs are listed. However, you can see the Azure Arc connected machines in the Agent Management view on the same Workspace Settings.