New Blog Post | Azure Defender for Servers Monitoring Dashboard

%3CLINGO-SUB%20id%3D%22lingo-sub-2870957%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Azure%20Defender%20for%20Servers%20Monitoring%20Dashboard%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2870957%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22AshleyMartin_0-1634844040657.png%22%20style%3D%22width%3A%20719px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F319053i3714BE29C3398DFD%2Fimage-dimensions%2F719x221%3Fv%3Dv2%22%20width%3D%22719%22%20height%3D%22221%22%20role%3D%22button%22%20title%3D%22AshleyMartin_0-1634844040657.png%22%20alt%3D%22AshleyMartin_0-1634844040657.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fazure-defender-for-servers-monitoring-dashboard%2Fba-p%2F2869658%22%20target%3D%22_blank%22%3EAzure%20Defender%20for%20Servers%20Monitoring%20Dashboard%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EAzure%20Security%20Center%20will%20leverage%20the%20Log%20Analytics%20agent%20to%20scan%20operating%20systems%20for%20misconfiguration%2C%20or%20to%20gather%20evidence%20for%20malicious%20behavior%2C%20so%20security%20alerts%20can%20be%20created.%20It%20will%20show%20the%20%E2%80%9C%3CA%20title%3D%22Azure%20Security%20Center%20recommendations%20reference%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Frecommendations-reference%23compute-recommendations%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELog%20Analytics%20agent%20should%20be%20installed%20on%20...%3C%2FA%3E%26nbsp%3B%22%20recommendation%26nbsp%3Bin%20case%20there%20is%20a%20server%20that%20does%20not%20have%20the%20agent%20installed%2C%20but%20there%20won%E2%80%99t%20be%20a%20warning%20in%20case%20an%20agent%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CEM%3Estopped%20reporting%3C%2FEM%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eto%20its%20Log%20Analytics%20workspace.%26nbsp%3B%20In%20addition%20to%20that%2C%20you%20will%20see%20the%20%E2%80%9CAzure%20Defender%20for%20Servers%20should%20be%20enabled%E2%80%9D%20recommendation%20in%20case%20you%20have%20not%20switched%20the%20plan%20on.%3C%2FP%3E%0A%3CP%3EWhile%2C%20from%20a%20CSPM%20(%3DCloud%20Security%20Posture%20Management)%20perspective%2C%20it%20makes%20sense%20to%20only%20show%20the%20agent%20installation%20status%20(%20because%20agent%20monitoring%20is%20part%20of%20operations%2C%20not%20of%20environment%20hardening)%2C%20SOC%20teams%20have%20asked%20for%20a%20capability%20to%20easily%20see%20machines%20that%20are%20%E2%80%9Csecurely%20monitored%E2%80%9D%20if%20three%20conditions%20are%20met%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3Ethe%20machine%20is%20protected%20by%20Azure%20Defender%20for%20Servers%2C%20which%20means%20that%20the%20plan%20has%20been%20enabled%20on%20the%20machine%E2%80%99s%20subscription%3C%2FLI%3E%0A%3CLI%3Ethe%20Log%20Analytics%20agent%20has%20been%20installed%20and%20is%20connected%20to%20a%20workspace%20which%20has%20Azure%20Defender%20for%20Servers%20enabled%3C%2FLI%3E%0A%3CLI%3Ethe%20agent%20is%20properly%20reporting%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EOriginal%20Post%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fnew-blog-post-azure-defender-for-servers-monitoring-dashboard%2Fm-p%2F2870948%23M6482%22%20target%3D%22_blank%22%3ENew%20Blog%20Post%20%7C%20Azure%20Defender%20for%20Servers%20Monitoring%20Dashboard%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

AshleyMartin_0-1634844040657.png

Azure Defender for Servers Monitoring Dashboard - Microsoft Tech Community

Azure Security Center will leverage the Log Analytics agent to scan operating systems for misconfiguration, or to gather evidence for malicious behavior, so security alerts can be created. It will show the “Log Analytics agent should be installed on ... " recommendation in case there is a server that does not have the agent installed, but there won’t be a warning in case an agent stopped reporting to its Log Analytics workspace.  In addition to that, you will see the “Azure Defender for Servers should be enabled” recommendation in case you have not switched the plan on.

While, from a CSPM (=Cloud Security Posture Management) perspective, it makes sense to only show the agent installation status ( because agent monitoring is part of operations, not of environment hardening), SOC teams have asked for a capability to easily see machines that are “securely monitored” if three conditions are met:

  1. the machine is protected by Azure Defender for Servers, which means that the plan has been enabled on the machine’s subscription
  2. the Log Analytics agent has been installed and is connected to a workspace which has Azure Defender for Servers enabled
  3. the agent is properly reporting

Original Post: New Blog Post | Azure Defender for Servers Monitoring Dashboard - Microsoft Tech Community

0 Replies