Plan agents, extensions, and Azure Arc for Defender for Servers
This article helps you plan your agents, extensions, and Azure Arc resources for your Microsoft Defender for Servers deployment.
Defender for Servers is one of the paid plans provided by Microsoft Defender for Cloud.
Before you begin
This article is the fifth article in the Defender for Servers planning guide. Before you begin, review the earlier articles:
- Start planning your deployment
- Understand where your data is stored and Log Analytics workspace requirements
- Review Defender for Servers access roles
- Select a Defender for Servers plan
Review Azure Arc requirements
Azure Arc helps you onboard Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises machines to Azure. Defender for Cloud uses Azure Arc to protect non-Azure machines.
Foundational cloud security posture management
The free foundational cloud security posture management (CSPM) features for AWS and GCP machines don't require Azure Arc. For full functionality, we recommend that you do have Azure Arc running on AWS or GCP machines.
Azure Arc onboarding is required for on-premises machines.
Defender for Servers plan
To use Defender for Servers, all AWS, GCP, and on-premises machines should be Azure Arc-enabled.
You can onboard the Azure Arc agent to your AWS or GCP servers automatically with the AWS or GCP multicloud connector.
Plan for Azure Arc deployment
To plan for Azure Arc deployment:
Open the network ports for Azure Arc in your firewall.
Azure Arc installs the Connected Machine agent to connect to and manage machines that are hosted outside of Azure. Review the following information:
Log Analytics agent and Azure Monitor agent
As the Log Analytics agent is set to retire in August 2024 and as part of the Defender for Cloud updated strategy, all Defender for Servers features and capabilities will be provided either through Microsoft Defender for Endpoint integration or agentless scanning, without dependency on either Log Analytics agent (MMA) or Azure Monitor agent (AMA). As a result, the shared autoprovisioning process for both agents will be adjusted accordingly For more information about this change, see this announcement.
Defender for Cloud uses the Log Analytics agent and the Azure Monitor agent to collect information from compute resources. Then, it sends the data to a Log Analytics workspace for more analysis. Review the differences and recommendations for both agents.
The following table describes the agents that are used in Defender for Servers:
|Feature||Log Analytics agent||Azure Monitor agent|
|Foundational CSPM recommendations (free) that depend on the agent: OS baseline recommendation (Azure VMs)||
With the Azure Monitor agent, the Azure Policy guest configuration extension is used.
|Foundational CSPM: System updates recommendations (Azure VMs)||Not yet available.|
|Foundational CSPM: Antimalware/endpoint protection recommendations (Azure VMs)|
|Attack detection at the OS level and network layer, including fileless attack detection
Plan 1 relies on Defender for Endpoint capabilities for attack detection.
|File integrity monitoring (Plan 2 only)|
|Adaptive application controls (Plan 2 only)|
The Qualys extension is available in Defender for Servers Plan 2. The extension is deployed if you want to use Qualys for vulnerability assessment.
Here's more information:
The Qualys extension sends metadata for analysis to one of two Qualys datacenter regions, depending on your Azure region.
- If you're in a European Azure geography, data is processed in the Qualys European datacenter.
- For other regions, data is processed in the US datacenter.
To use Qualys on a machine, the extension must be installed and the machine must be able to communicate with the relevant network endpoint:
- Europe datacenter:
- US datacenter:
- Europe datacenter:
Guest configuration extension
The extension performs audit and configuration operations inside VMs.
- If you're using the Azure Monitor Agent, Defender for Cloud uses this extension to analyze operating system security baseline settings on Windows and Linux machines.
- Although Azure Arc-enabled servers and the guest configuration extension are free, more costs might apply if you use guest configuration policies on Azure Arc servers outside the scope of Defender for Cloud.
Learn more about the Azure Policy guest configuration extension.
Defender for Endpoint extensions
When you enable Defender for Servers, Defender for Cloud automatically deploys a Defender for Endpoint extension. The extension is a management interface that runs a script inside the operating system to deploy and integrate the Defender for Endpoint sensor on the machine.
- Windows machines extension:
- Linux machines extension:
- Machines must meet minimum requirements.
- Some Windows Server versions have specific requirements.
Verify operating system support
Before you deploy Defender for Servers, verify operating system support for agents and extensions:
- Verify that your operating systems are supported by Defender for Endpoint.
- Check requirements for the Azure Arc Connect Machine agent.
- Check operating system support for the Log Analytics agent and Azure Monitor agent.
Review agent provisioning
When you enable Defender for Cloud plans, including Defender for Servers, you can choose to automatically provision some agents that are relevant for Defender for Servers:
- Log Analytics agent and Azure Monitor agent for Azure VMs
- Log Analytics agent and Azure Monitor agent for Azure Arc VMs
- Qualys agent
- Guest configuration agent
When you enable Defender for Servers Plan 1 or Plan 2, the Defender for Endpoint extension is automatically provisioned on all supported machines in the subscription.
The following table describes provisioning considerations to be aware of:
|Defender for Endpoint sensor||If machines are running Microsoft Antimalware, also known as System Center Endpoint Protection (SCEP), the Windows extension automatically removes it from the machine.
If you deploy on a machine that already has the legacy Microsoft Monitoring agent (MMA) Defender for Endpoint sensor running, after the Defender for Cloud and Defender for Endpoint unified solution is successfully installed, the extension stops and it disables the legacy sensor. The change is transparent and the machine’s protection history is preserved.
|AWS and GCP machines||Configure automatic provisioning when you set up the AWS or GCP connector.|
|Manual installation||If you don't want Defender for Cloud to provision the Log Analytics agent and Azure Monitor agent, you can install agents manually.
You can connect the agent to the default Defender for Cloud workspace or to a custom workspace.
The workspace must have the SecurityCenterFree (for free foundational CSPM) or Security solution enabled (Defender for Servers Plan 2).
|Log Analytics agent running directly||If a Windows VM has the Log Analytics agent running but not as a VM extension, Defender for Cloud installs the extension. The agent reports to the Defender for Cloud workspace and to the existing agent workspace.
On Linux VMs, multi-homing isn't supported. If an existing agent exists, the Log Analytics agent isn't automatically provisioned.
|Operations Manager agent||The Log Analytics agent can work side by side with the Operations Manager agent. The agents share common runtime libraries that are updated when the Log Analytics agent is deployed.|
|Removing the Log Analytics extension||If you remove the Log Analytics extension, Defender for Cloud can't collect security data and recommendations, and alerts will be missing. Within 24 hours, Defender for Cloud determines that the extension is missing and reinstalls it.|
When to opt out of auto provisioning
You might want to opt out of automatic provisioning in the circumstances that are described in the following table:
|You have critical VMs that shouldn't have agents installed||Log Analytics agent, Azure Monitor agent||Automatic provisioning is for an entire subscription. You can't opt out for specific machines.|
|You're running the System Center Operations Manager agent version 2012 with Operations Manager 2012||Log Analytics agent||With this configuration, don't turn on automatic provisioning. Management capabilities might be lost.|
|You want to configure a custom workspace||Log Analytics agent, Azure Monitor agent||You have two options with a custom workspace:
- Opt out of automatic provisioning when you first set up Defender for Cloud. Then, configure provisioning on your custom workspace.
- Let automatic provisioning run to install the Log Analytics agents on machines. Set a custom workspace, and then reconfigure existing VMs with the new workspace setting.
After working through these planning steps, you can start deployment: