Azure Monitor Agent (AMA) vs Log Analytics Agent (part 3) – How to ingest logs
The initiative: [Preview]: Configure machines to create the user-defined Microsoft Defender for Cloud pipeline using Azure Monitor Agent mentioned in part 1 contains from the following policies: [Preview]: Assign Built-In User-Assigned Managed Identity to Virtual Machines Configure Linux virtual machines to run Azure Monitor Agent with user-assigned managed identity-based authentication Configure Windows virtual machines to […]