mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Merge pull request #2435 from MicrosoftDocs/proxy
add log analytics proxy details
This commit is contained in:
@ -38,8 +38,8 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe
|
|||||||
- Transparent proxy
|
- Transparent proxy
|
||||||
- Web Proxy Auto-discovery Protocol (WPAD)
|
- Web Proxy Auto-discovery Protocol (WPAD)
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Microsoft Defender ATP URL exclusions in the proxy, see [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server).
|
> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Microsoft Defender ATP URL exclusions in the proxy, see [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server).
|
||||||
|
|
||||||
- Manual static proxy configuration:
|
- Manual static proxy configuration:
|
||||||
- Registry based configuration
|
- Registry based configuration
|
||||||
@ -120,6 +120,16 @@ United States | ```us.vortex-win.data.microsoft.com``` <br> ```ussus1eastprod.bl
|
|||||||
|
|
||||||
If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs.
|
If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs.
|
||||||
|
|
||||||
|
### Log analytics agent requirements
|
||||||
|
|
||||||
|
The information below list the proxy and firewall configuration information required to communicate with Log Analytics agent (often referred to as Microsoft Monitoring Agent) for the previous versions of Windows such as Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, and Windows Server 2016.
|
||||||
|
|
||||||
|
|Agent Resource|Ports |Direction |Bypass HTTPS inspection|
|
||||||
|
|------|---------|--------|--------|
|
||||||
|
|*.ods.opinsights.azure.com |Port 443 |Outbound|Yes |
|
||||||
|
|*.oms.opinsights.azure.com |Port 443 |Outbound|Yes |
|
||||||
|
|*.blob.core.windows.net |Port 443 |Outbound|Yes |
|
||||||
|
|
||||||
## Microsoft Defender ATP service backend IP range
|
## Microsoft Defender ATP service backend IP range
|
||||||
|
|
||||||
If your network devices don't support the URLs added to an "allow" list in the prior section, you can use the following information.
|
If your network devices don't support the URLs added to an "allow" list in the prior section, you can use the following information.
|
||||||
|
@ -113,7 +113,7 @@ The following steps are required to enable this integration:
|
|||||||
On the **Agent Setup Options** page, choose **Connect the agent to Azure Log Analytics (OMS)**.
|
On the **Agent Setup Options** page, choose **Connect the agent to Azure Log Analytics (OMS)**.
|
||||||
- [Install the agent using the command line](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-the-agent-using-the-command-line) and [configure the agent using a script](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#add-a-workspace-using-a-script).
|
- [Install the agent using the command line](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-the-agent-using-the-command-line) and [configure the agent using a script](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#add-a-workspace-using-a-script).
|
||||||
|
|
||||||
3. You'll need to configure proxy settings for the Microsoft Monitoring Agent. For more information, see [Configure proxy settings](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#configure-proxy-settings).
|
3. You'll need to configure proxy settings for the Microsoft Monitoring Agent. For more information, see [Configure proxy settings](configure-proxy-internet.md).
|
||||||
|
|
||||||
Once completed, you should see onboarded servers in the portal within an hour.
|
Once completed, you should see onboarded servers in the portal within an hour.
|
||||||
|
|
||||||
@ -153,7 +153,9 @@ Support for Windows Server, version 1803 and Windows 2019 provides deeper insigh
|
|||||||
|
|
||||||
b. Run the following PowerShell command to verify that the passive mode was configured:
|
b. Run the following PowerShell command to verify that the passive mode was configured:
|
||||||
|
|
||||||
```Get-WinEvent -FilterHashtable @{ProviderName="Microsoft-Windows-Sense" ;ID=84}```
|
```PowerShell
|
||||||
|
Get-WinEvent -FilterHashtable @{ProviderName="Microsoft-Windows-Sense" ;ID=84}
|
||||||
|
```
|
||||||
|
|
||||||
c. Confirm that a recent event containing the passive mode event is found:
|
c. Confirm that a recent event containing the passive mode event is found:
|
||||||
|
|
||||||
@ -172,8 +174,8 @@ Microsoft Defender ATP integrates with Azure Security Center to provide a compre
|
|||||||
The following capabilities are included in this integration:
|
The following capabilities are included in this integration:
|
||||||
- Automated onboarding - Microsoft Defender ATP sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-onboarding).
|
- Automated onboarding - Microsoft Defender ATP sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-onboarding).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Automated onboarding is only applicable for Windows Server 2012 R2 and Windows Server 2016.
|
> Automated onboarding is only applicable for Windows Server 2012 R2 and Windows Server 2016.
|
||||||
|
|
||||||
- Servers monitored by Azure Security Center will also be available in Microsoft Defender ATP - Azure Security Center seamlessly connects to the Microsoft Defender ATP tenant, providing a single view across clients and servers. In addition, Microsoft Defender ATP alerts will be available in the Azure Security Center console.
|
- Servers monitored by Azure Security Center will also be available in Microsoft Defender ATP - Azure Security Center seamlessly connects to the Microsoft Defender ATP tenant, providing a single view across clients and servers. In addition, Microsoft Defender ATP alerts will be available in the Azure Security Center console.
|
||||||
- Server investigation - Azure Security Center customers can access Microsoft Defender Security Center to perform detailed investigation to uncover the scope of a potential breach
|
- Server investigation - Azure Security Center customers can access Microsoft Defender Security Center to perform detailed investigation to uncover the scope of a potential breach
|
||||||
|
Reference in New Issue
Block a user