To stay constantly updated on news regarding Azure management services, our community releases this monthly summary, allowing you to have an overview of the main new features of the month. In this article you will find the news, presented in a synthetic way and accompanied with the necessary references to be able to conduct further studies.
The following diagram shows the different areas related to management, which are covered in this series of articles, in order to stay up to date on these topics and to better deploy and maintain applications and resources.
New version of the agent for Linux systems
A new version of the Log Analytics agent has been released this month for Linux systems. The main innovations introduced are:
- Stability and reliability improvements.
- Improved support for Azure Arc for Server.
- FIPS Compliance.
- RHEL support 8.
SHA-2 signing for the Log Analytics agent
The Log Analytics agent for Windows will start enforcing SHA-2 signings from 17 August 2020, postponing the date previously set to 18 may 2020. This change requires action if you are running the agent on a legacy version of the operating system (Windows 7, Windows Server 2008 R2, or Windows Server 2008) . Customers who are in this condition should apply the latest updates and patches on these operating systems before 17 August 2020, otherwise their agents will stop sending data to Log Analytics workspaces. The following Azure services will be affected by this change: Azure Monitor, Azure Automation, Azure Update Management, Azure Change Tracking, Azure Security Center, Azure Sentinel, Windows Defender ATP.
Feature extensions of Azure Monitor
The following enhancements have been made in Azure Monitor that expand its functionality and make it an increasingly complete solution:
- Azure Monitor availability for Azure Storage and Azure Monitor for Azure Cosmos DB.
- Azure Monitor preview for Azure Key Vault and Azure Monitor for Redis Cache.
- Preview of Azure Monitor Application Insights in Azure Monitor Logs workspaces.
- Capacity reservation and CMK encryption with Azure Monitor Logs clusters dedicated to large-scale deployments.
Azure Private Link Availability for Azure Monitor
The Azure Private Link feature is now also available for Azure Monitor and allows you to have the following features:
- Private connectivity to Azure Monitor Logs workspaces and to Azure Application Insights.
- Exfiltration data protection with granular access to specific resources.
- Protecting resources from access from the public network.
At the moment you need to make a request explicitly to access these features.
Improve the experience when deleting and restoring Azure Monitor Logs workspaces
Microsoft has added soft-delete workspace functionality to make it easier to recover if necessary. In fact, in the event of a cancellation, the workspace will go into a soft-delete state to allow it to be restored if necessary, including data and connected agents, within 14 days. This behavior can be circumvented and permanently deleted the workspace. To avoid the incorrect elimination of the workspaces from the Azure portal, a specific section has been added where you can consult how many solutions are installed and the relative daily data volume received in the last 7 days by data type.
Restoring the workspace, can now take place directly from the Azure portal.
Azure Advisor recommendation digests
Azure Advisor introduces the ability to receive a periodic summary of the available best practice recommendations developed by the solution. Advisor Digest Recommendations keep you up-to-date on Azure optimization opportunities outside the Azure portal. Notifications are customizable and handled through Azure Monitor Action Group.
Azure Service Health also includes emerging issues
Azure Service Health now also reports emerging issues in the Azure portal. An emerging problem is a situation in which Azure is aware of a widespread outage but may not yet be fully aware of the extent and amplitude. Previously, emerging problems were only available in the Azure Status page.
TLS 1.2 Enforcement
Starting from September 1st 2020, Azure Automation will impose the presence of Transport Layer Security (TLS) version 1.2 or later, for all external HTTPS endpoints.
Azure Security Center
Changes to the just-in-time service (JIT) virtual machine (VM) Access
In the just-in-time service (JIT) virtual machine (VM) access have been made the following changes:
- The recommendation advising to enable JIT on a VM has been renamed by “Just-in-time network access control should be applied on virtual machines” in “Management ports of virtual machines should be protected with just-in-time network access control”.
- The recommendation is now activated only if open management ports are detected.
Custom recommendations placed in a separate panel
All the custom recommendations created for your subscriptions are now positioned in the dedicated section “Custom recommendations”.
Account security recommendations moved to the section “Security best practices”
The following recommendations have been included in the section “Security best practices” and therefore do not impact on the secure score:
- MFA should be enabled on accounts with read permissions on your subscription (originally in the “Enable MFA” control)
- External accounts with read permissions should be removed from your subscription (originally in the “Manage access and permissions” control)
- A maximum of 3 owners should be designated for your subscription (originally in the “Manage access and permissions” control)
Microsoft has decided to apply this change as it has determined that the risk of these three recommendations is lower than initially thought.
SAP HANA backup for Red Hat Enterprise Linux VM
Azure Backup includes protecting SAP HANA databases on Red Hat Enterprise Linux virtual machines (RHEL). This feature allows to have in an integrated way and without having to provide a specific backup infrastructure, the protection of SAP HANA databases on RHEL, one of the most commonly used operating systems in these scenarios.
Protect against accidental deletion of Azure file shares
To provide greater protection against cyberattacks and accidental deletion, Azure Backup has added an extra layer of security to the Azure file shares snapshot management solution. If you delete File Shares, content and its recovery points (Snapshots) are retained for a configurable period of time, enabling full recovery without data loss. When you configure protection for a file share, Azure Backup enables soft-delete functionality at the account storage level with a retention period of 14 days, which is configurable according to your needs. This setting determines the time window in which you can restore the contents and snapshots of your file shares after any accidental deletion operations. Once the share file is restored, backups resume working without the need for additional configurations.
Azure Site Recovery
Zone-to-zone disaster recovery available in new regions
Zone-to-Zone DR is now also available in the Southeast Asia and UK South regions. With this Azure Site Recovery feature, called zone-to-zone DR, there's an opportunity to create disaster recovery plans (DR) for virtual machines (VM), replicating them between different Azure Availability Zones. If a single Azure Availability Zone is compromised, you will be able to fail over virtual machines to a different zone within the same region and access them from the Secondary Availability Zone.
Introduced support for proximity groups
Azure Site Recovery has introduced support for proximity placement groups (PPGs). Thanks to this feature, any virtual machine (VM) hosted within a PPG can be secured using Azure Site Recovery. By enabling replication of that VM, you can provide a PPG in the secondary region as an additional parameter. When a failover process is activated, Site Recovery will place the VM in the user-supplied target PPG.
Evaluation of Azure
To test for free and evaluate the services provided by Azure you can access this page.