This FAQ answers questions about Azure Security Center, a service that helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your Microsoft Azure resources.
What is Azure Security Center?
Azure Security Center helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources. It provides integrated security monitoring and policy management across your subscriptions, helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of security solutions.
How do I get Azure Security Center?
Azure Security Center is enabled with your Microsoft Azure Training subscription and accessed from the Azure portal. (Sign in to the portal, select Browse, and scroll to Security Center).
How does billing work for Azure Security Center?
Security Center is offered in two tiers:
The Free tier provides visibility into the security state of your Azure resources, basic security policy, security recommendations, and integration with security products and services from partners.
The Standard tier adds advanced threat detection capabilities, including threat intelligence, behavioral analysis, anomaly detection, security incidents, and threat attribution reports. The Standard tier is free for the first 60 days. Should you choose to continue to use the service beyond 60 days, we automatically start to charge for the service. To upgrade, select Pricing Tier in the security policy.
Azure Security Center uses Role-Based Access Control (RBAC), which provides built-in roles that can be assigned to users, groups, and services in Azure.
Security Center assesses the configuration of your resources to identify security issues and vulnerabilities. In Security Center, you only see information related to a resource when you are assigned the role of Owner, Contributor, or Reader for the subscription or resource group that a resource belongs to.
See Permissions in Azure Security Center to learn more about roles and allowed actions in Security Center.
Security Center collects data from your virtual machines to assess their security state, provide security recommendations, and alert you to threats. When you first access Security Center, data collection is enabled on all virtual machines in your subscription. You can also enable data collection in the Security Center policy.
How do I disable data collection?
If you are using the Azure Security Center Free tier, you can disable data collection from virtual machines at any time. Data collection is required for subscriptions on the Standard tier. You can disable data collection for a subscription in the Security policy. (Sign in to the Azure portal, select Browse, select Security Center, and select Policy.) When you select a subscription, a new blade opens and provides you the option to turn off Data collection.
How do I enable data collection?
You can enable data collection for your Azure subscription in the Security policy. To enable data collection. Sign in to the Azure portal, select Browse, select Security Center, and select Policy. Set Data collection to On.
What happens when data collection is enabled?
When data collection is enabled, the Microsoft Monitoring Agent is automatically provisioned on all existing and any new supported virtual machines that are deployed in the subscription.
The agent enables the process creation event 4688 and the CommandLine field inside event 4688. New processes created on the VM are recorded by EventLog and monitored by Security Center’s detection services. For information on the details recorded for each new process see description fields in 4688. The agent also collects the 4688 events created on the VM and stores them in search.
When Security Center detects suspicious activity on the VM, the customer is notified by email if security contact information has been provided. An alert is also visible in Security Center’s security alerts dashboard.