Skip to main content

Description

Microsoft Defender for Resource Manager scans incoming administrative requests to change your infrastructure from both CLI and the Azure portal.

Rationale

Scanning resource requests lets you be alerted every time there is suspicious activity in order to prevent a security threat from being introduced.

Impact

Enabling Microsoft Defender for Resource Manager requires enabling Microsoft Defender for your subscription. Both will incur additional charges.

Audit

This policy flags an Azure Subscription as INCOMPLIANT if the related Azure Defender Plan for Resource Manager has its Pricing Tier set to Free.

A Subscription is also marked as INCOMPLIANT if the Defender Plan for Resource Manager does not exist in the CMDB.

Default Value

By default, Microsoft Defender for Resource Manager is not enabled.

References

  1. https://docs.microsoft.com/en-us/azure/defender-for-cloud/enable-enhanced-security
  2. https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-resource-manager-introduction
  3. https://azure.microsoft.com/en-us/pricing/details/defender-for-cloud/
  4. https://docs.microsoft.com/en-us/azure/defender-for-cloud/alerts-overview
  5. https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-logging-threat-detection#lt-1-enable-threat-detection-capabilities