You need to configure the log forwarding. The solution must meet the Azure Stack Hub requirements.
What should you do?
A . Connect to 192.168.101.101 and run the Set-EventLogLevel and Add-AzLogProfile cmdlets.
B. Connect to 192.168.100.224 and run the Set-SyslogServer and Set-SyslogClient cmdlets.
C. Connect to 192.168.100.224 and run the Set-EventLogLevel and Add-AzLogProfile cmdlets.
D. Connect to 192.168.101.101 and run the Set-SyslogServer and Set-SyslogClient cmdlets.
Answer: D
Explanation:
Integrate Azure Stack Hub with monitoring solutions using syslog forwarding
The syslog channel exposes audits, alerts, and security logs from all the components of the Azure Stack Hub infrastructure. Use syslog forwarding to integrate with security monitoring solutions and to retrieve all audits, alerts, and security logs to store them for retention.
Cmdlets to configure syslog forwarding
Configuring syslog forwarding requires access to the privileged endpoint (PEP). Two PowerShell cmdlets have been added to the PEP to configure the syslog forwarding:
### cmdlet to pass the syslog server information to the client and to configure the transport protocol, the encryption and the authentication between the client and the server
Set-SyslogServer [-ServerName <String>] [-ServerPort <UInt16>] [-NoEncryption] [-SkipCertificateCheck] [-SkipCNCheck] [-UseUDP] [-Remove]
### cmdlet to configure the certificate for the syslog client to authenticate with the server
Set-SyslogClient [-pfxBinary <Byte[]>] [-CertPassword <SecureString>]
Reference: https://learn.microsoft.com/en-us/azure-stack/operator/azure-stack-integrate-security
Latest AZ-600 Dumps Valid Version with 73 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund