last sync: 2021-Jan-20 16:06:14 UTC

Azure Policy definition

Log Analytics agent should be installed on your virtual machine scale sets for Azure Security Center monitoring

Name Log Analytics agent should be installed on your virtual machine scale sets for Azure Security Center monitoring
Azure Portal
Id a3a6ea0c-e018-4933-9ef0-5aaa1501449b
Version 1.0.0
details on versioning
Category Security Center
Microsoft docs
Description Security Center collects data from your Azure virtual machines (VMs) to monitor for security vulnerabilities and threats.
Mode All
Type BuiltIn
Preview FALSE
Deprecated FALSE
Effect Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Used RBAC Role none
History
Date/Time (UTC ymd) (i) Change type Change detail
2020-09-09 11:24:03 add a3a6ea0c-e018-4933-9ef0-5aaa1501449b
Used in Initiatives
Initiative DisplayName Initiative Id Initiative Category State
[Preview]: Azure Security Benchmark v2 bb522ac1-bc39-4957-b194-429bcd3bcb0b Regulatory Compliance Preview
Enable Monitoring in Azure Security Center 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA
Json
{
  "properties": {
    "displayName": "Log Analytics agent should be installed on your virtual machine scale sets for Azure Security Center monitoring",
    "policyType": "BuiltIn",
    "mode": "All",
    "description": "Security Center collects data from your Azure virtual machines (VMs) to monitor for security vulnerabilities and threats.",
    "metadata": {
      "version": "1.0.0",
      "category": "Security Center"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      }
    },
    "policyRule": {
      "if": {
        "field": "type",
        "in": [
          "Microsoft.Compute/virtualMachineScaleSets"
        ]
      },
      "then": {
      "effect": "[parameters('effect')]",
        "details": {
          "type": "Microsoft.Security/assessments",
          "name": "45cfe080-ceb1-a91e-9743-71551ed24e94",
          "existenceCondition": {
            "field": "Microsoft.Security/assessments/status.code",
            "in": [
              "NotApplicable",
              "Healthy"
            ]
          }
        }
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/a3a6ea0c-e018-4933-9ef0-5aaa1501449b",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "a3a6ea0c-e018-4933-9ef0-5aaa1501449b"
}