🛡️ Azure Subscription Log Analytics Agent is not auto provisioned🟢
- Contextual name: 🛡️ Log Analytics Agent is not auto provisioned🟢
- ID:
/ce/ca/azure/subscription/log-analytics-agent-auto-provisioning - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- Cloud Conformity: Enable Automatic Provisioning of the Monitoring Agent
- Internal:
dec-x-181422d8
Similar Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-181422d8 | 1 |
Description
Description
Enable automatic provisioning of the monitoring agent to collect security data.
DEPRECATION PLANNED: The Log Analytics Agent is slated for deprecation in August 2024. The Microsoft Defender for Endpoint agent, in tandem with new agentless capabilities will be providing replacement functionality. More detail is available here: https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-strategy-and-plan-towards-log/ba-p/3883341.
Rationale
When
Log Analytics agent for Azure VMsis turned on, Microsoft Defender for Cloud provisions the Microsoft Monitoring Agent on all existing supported Azure virtual machines and any new ones that are created. The Microsoft Monitoring Agent scans for various security-related configurations and events such as system updates, OS vulnerabilities, endpoint protection, and provides alerts.Audit
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Defender for Cloud.- Under
Management, selectEnvironment Settings.... see more
Remediation
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Defender for Cloud.- Under
Management, selectEnvironment Settings.- Select a subscription.
- Click on
Settings & monitoring.- Set the
StatusofLog Analytics agenttoOn.- Select a Workspace.
- Click
Apply.- Click
Continue.Repeat the above for any additional subscriptions.
From Azure CLI
Use the below command to set
Automatic provisioning of monitoring agenttoOn:az account get-access-token --query "{subscription:subscription,accessToken:accessToken}" --out tsv | xargs -L1 bash -c 'curl -X PUT -H "Authorization: Bearer $1" -H "Content-Type: application/json" https://management.azure.com/subscriptions/subscriptionID/providers/Microsoft.Security/autoProvisioningSettings/default?api-version=2017-08-01-preview -d@"input.json"'Where
input.jsoncontains the Request body json data as mentioned below:{
"id": "/subscriptions/<Your_Subscription_Id>/providers/Microsoft.Security/autoProvisioningSettings/default",
... [see more](remediation.md)