This policy definition is deprecated because OMS Agent has been deprecation on August 31, 2024. While there is not a specific replacement policy, we have various policies available based on the VM setup that can be found under Azure Monitor Agent/DCRA Linux. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
The following 9 compliance controls are associated with this Policy definition '[Deprecated]: Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images' (5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138)
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
Implement Mechanisms to Detect Anomalous Activities in ICT Systems
Shared
n/a
Establish mechanisms to detect anomalous activities within information and communication technology (ICT) systems, including network performance issues and ICT-related incidents. Additionally, identify potential material single points of failure to enhance overall system resilience and response capabilities.
Establish Multi-Layered Detection Mechanisms for ICT Incidents
Shared
n/a
Implement detection mechanisms that provide multiple layers of control, defining alert thresholds and criteria to trigger information and communication technology (ICT) related incident response processes. This includes automated alert mechanisms to notify resources managing ICT-related incidents.
Establish Procedures for Managing the Security of System Operations
Shared
n/a
Establish and implement operating procedures for managing the security of system operations such as designating system administrators, updating policies, changing rulesets, monitoring events, managing policy implementations or exceptions.
Establish Protective Measures for Administrator Privileges and Security Configurations
Shared
n/a
Establish and implement protective measures with regard to administrator privileges and security configurations to ensure that important information and personal information are not exposed as a result of unauthorized access by service type or misconfigurations.
Establish Procedures for Managing Internal and External Intrusion Attempts
Shared
n/a
Establish procedures for detecting, analyzing, sharing, and effectively responding to internal and external intrusion attempts to prevent personal information leakage. Additionally, implement a framework for collaboration with relevant external agencies and experts.
Establish Procedures to Respond and Recover from Incidents
Shared
n/a
Establish procedures to respond and recover from incidents in a timely manner, including legal obligations for disclosing information. Additional procedures must be established and implemented to prevent recurrence.
Maintain Logs and Establish Log Management Procedures
Shared
n/a
Maintain log records for servers, applications, security systems, and networks. Define log types, access permissions, retention periods, and storage methods to ensure secure retention and prevent forgery, alteration, theft, and loss.
61
No results
Initiatives usage
Rows: 1-2 / 2
Records:
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
Minor, new suffix: deprecated (2.0.1 > 2.1.0-deprecated)
2021-09-27 15:52:17
change
Patch (2.0.0 > 2.0.1)
2021-03-02 15:11:40
change
Major (1.0.1 > 2.0.0)
2020-04-22 04:43:16
change
Previous DisplayName: [Preview]: Audit Log Analytics Agent Deployment in Virtual Machine Scale Sets - VM Image (OS) unlisted
2020-02-29 21:43:10
change
Previous DisplayName: [Preview]: Audit Log Analytics Agent Deployment in VMSS - VM Image (OS) unlisted
JSON compare
compare mode:version left:version right:
2.0.1 → 2.1.0-deprecatedRENAMED
@@ -1,12 +1,13 @@
1
{
2
- "displayName": "Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images",
3
"policyType": "BuiltIn",
4
"mode": "Indexed",
5
- "description": "Reportsvirtualmachinescalesetsasnon-compliantifthevirtualmachineimage is not inthelistdefinedand the extensionisnotinstalled.",
6
"metadata": {
7
- "version": "2.0.1",
8
- "category": "Monitoring"
9
},
10
"parameters": {
11
"listOfImageIdToInclude_windows": {
12
"type": "Array",
@@ -33,9 +34,9 @@
33
"allowedValues": [
34
"AuditIfNotExists",
35
"Disabled"
36
],
37
- "defaultValue": "AuditIfNotExists"
38
}
39
},
40
"policyRule": {
41
"if": {
1
{
2
+ "displayName": "[Deprecated]: Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images",
3
"policyType": "BuiltIn",
4
"mode": "Indexed",
5
+ "description": "This policy definition is deprecated because OMS Agent has been deprecation on August 31, 2024. While there is not a specific replacement policy, we have various policies available based on the VM setup that can be found under Azure Monitor Agent/DCRA Linux. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.",
displayName: "[Deprecated]: Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images",
policyType: "BuiltIn",
mode: "Indexed",
description: "This policy definition is deprecated because OMS Agent has been deprecation on August 31, 2024. While there is not a specific replacement policy, we have various policies available based on the VM setup that can be found under Azure Monitor Agent/DCRA Linux. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.",