π Azure Subscription Microsoft Defender For Servers is not set to On π’
- Contextual name: π Microsoft Defender For Servers is not set to On π’
- ID:
/ce/ca/azure/subscription/microsoft-defender-for-servers
- Located in: π Azure Subscription
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-52ac4ac0
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-52ac4ac0 | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Turning on Microsoft Defender for Servers enables threat detection for Servers, providing threat intelligence, anomaly detection, and behavior analytics in the Microsoft Defender for Cloud.
Rationaleβ
Enabling Microsoft Defender for Servers allows for greater defense-in-depth, with threat detection provided by the Microsoft Security Response Center (MSRC).
Impactβ
Turning on Microsoft Defender for Servers in Microsoft Defender for Cloud incurs an additional cost per resource.
Two Defender for Servers plans exist:
- Plan 1: Subscription only
- Plan 2: Subscription and workspace
Auditβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
.- Under
Management
, selectEnvironment Settings
.- Click on the subscription name.
- Select
Defender plans
in the left pane.- Under
Cloud Workload Protection (CWP)
, locateServer
in the Plan column, ensure Status is set toOn
.From Azure CLIβ
Run the following command:
az security pricing show -n VirtualMachines --query pricingTier
If the tenant is licensed and enabled, the output should indicate
Standard
.... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
.- Under
Management
, selectEnvironment Settings
.- Click on the subscription name.
- Click
Defender plans
in the left pane.- Under
Cloud Workload Protection (CWP)
, locateServer
in the Plan column, set Status toOn
.- Select
Save
.From Azure CLIβ
Run the following command:
az security pricing create -n VirtualMachines --tier 'standard'
From PowerShellβ
Run the following command:
Set-AzSecurityPricing -Name 'VirtualMachines' -PricingTier 'Standard'