Azure Virtual Machines
When creating an Azure integration with Cloudhouse Guardian (Guardian), you can choose to detect and add your Azure Virtual Machines (VM) to Guardian for monitoring. The following topic describes how to configure your Azure VM(s) in Guardian; what aspects of the Azure VM you want to be scanned, how they should be scanned, and where that data should be stored. For more information on how to set up an Azure integration, see Azure Integration.
When detecting an Azure VM via Guardian, you can choose to detect one or both of the following node types:
Node Types |
Description |
---|---|
Instance nodes |
This option detects any Windows or Linux nodes within your Azure VM(s). |
Configuration data nodes |
This option detects the Azure VM configuration data associated with the Azure VM(s). |
These nodes represent the Azure VM instance and its associated configuration. For more information on the differences between these nodes, see below.
Azure Integration
On the Azure Integration page, if the Virtual Machines checkbox is selected from the list of Check Things You Want To Detect checkboxes, the following options are displayed:
Option |
Description |
---|---|
Detect Azure Virtual Machines (e.g. the Windows, Linux etc nodes) checkbox |
The option to detect the Azure VM instance, that is, the operating system and its associated components. For example, users, services, and packages. If selected, the Operating System column in the Detected tab (Inventory > Detected) displays any detected instance nodes as 'A type of Windows' or 'A type of Linux'. |
Select credential type checkbox |
The credentials to be used when authenticating Guardian's access to the source. The following options are available to select:
|
Depending on what credential type you choose to use, the fields displayed on this page will vary, see below for more information.
Password
If the Password credential option is selected, the following options are displayed:
Option |
Description |
---|---|
Linux Credentials drop-down |
When scanning Linux nodes, provide your Linux credentials according to the following:
If no value is provided, the nodes are added to the Detected tab, regardless of whether the Automatically start monitoring and scanning newly detected nodes checkbox is selected. |
Windows Credentials drop-down |
When scanning Windows nodes, provide your Windows credentials according to the following:
If no value is provided, the nodes are added to the Detected tab, regardless of whether the Automatically start monitoring and scanning newly detected nodes checkbox is selected. |
Detect Azure Virtual Machine Configurations checkbox |
The option to detect the Azure VM configuration data associated with the Azure VM instance. This option detects any security groups, policies, storage properties, load balancers, and other options attached to the Azure VM instance. If selected, once the integration is created, any detected configuration data node(s) are displayed with 'Config' appended to its name and the OS type is 'Azure VM Configuration' to differentiate it from the associated instance. For example, 'Windows Server 2022 Config'. |
Once the correct values have been set for the above fields, you can continue with the integration, see Next Steps for more information.
Microsoft Entra ID (previously Azure Active Directory)
If the Microsoft Entra ID credential option is selected, the following options are displayed:
Option |
Description |
---|---|
Azure CLI service principal password (leave blank if unchanged). field |
The password of the service principal configured to use SSH. |
Azure CLI service principal tenant. field |
The tenant ID of the service principal configured to use SSH. |
Azure CLI login command (Optional). field |
The |
Detect the Compute VM configuration for this node checkbox |
The option to detect the Azure VM configuration data associated with the Azure VM instance. This option detects any security groups, policies, storage properties, load balancers, and other options attached to the Azure VM instance. If selected, once the integration is created, any detected configuration data node(s) are displayed with 'Config' appended to its name and the OS type is 'Azure VM Configuration' to differentiate it from the associated instance. For example, 'Windows Server 2022 Config'. |
Once the correct values have been set for the above fields, you can continue with the integration, see Next Steps below for more information.
Next Steps
Once the correct values have been set for the above fields, you can choose the Detection Options for your integration. By default, any detected nodes are displayed within the Detected tab of your Guardian instance, with the appended identifier attributed to that Azure VM instance's node type.
If you choose to promote a detected node to the Monitored tab (Inventory > Monitored) for regular scanning, it will be automatically added to the corresponding dynamic node group. For example, configuration nodes are added to ‘Azure Virtual Machine Configuration’ node groups regardless of whether they are Windows or Linux.
Note: If a Windows node group is not present in your Guardian instance, it will be automatically created upon the addition of a monitored Windows node. For more information, see Node Groups.
However, if you choose to select the Automatically start monitoring and scanning newly detected nodes checkbox, all detected nodes are added to the Monitored tab. Here, they are automatically added to the corresponding Windows, Linux, or Azure Virtual Machine Configuration node groups.
Once you have set the correct values for each of the instances options displayed, you can continue completing the options to add the Azure integration to the Integrations tab of your Guardian instance.