π Azure Subscription Microsoft Defender For Servers is not set to On π’
- Contextual name: π Microsoft Defender For Servers is not set to On π’
- ID:
/ce/ca/azure/subscription/microsoft-defender-for-servers
- Located in: π Azure Subscription
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-52ac4ac0
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-52ac4ac0 | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
The Defender for Servers plan in Microsoft Defender for Cloud reduces security risk by providing actionable recommendations to improve and remediate machine security posture. Defender for Servers also helps to protect machines against real-time security threats and attacks.
Defender for Servers offers two paid plans:
Plan 1
The following components are enabled by default: β’ Log Analytics agent (deprecated) β’ Endpoint protection
Plan 1 also offers the following components, disabled by default:
β’ Vulnerability assessment for machines β’ Guest Configuration agent (preview)
Plan 2
The following components are enabled by default:
β’ Log Analytics agent (deprecated) β’ Vulnerability assessment for machines β’ Endpoint protection β’ Agentless scanning for machines
Plan 2 also offers the following components, disabled by default:
β’ Guest Configuration agent (preview) β’ File Integrity Monitoring
Rationaleβ
Enabling Microsoft Defender for Servers allows for greater defense-in-depth, with threat detection provided by the Microsoft Security Response Center (MSRC).
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
.- Under
Management
, selectEnvironment Settings
.- Click on the subscription name.
- Click
Defender plans
in the left pane.- Under
Cloud Workload Protection (CWP)
, locateServer
in the Plan column, set Status toOn
.- Select
Save
.- Repeat steps 1-6 for each subscription requiring remediation.
From Azure CLIβ
Run the following command:
az security pricing create -n VirtualMachines --tier 'standard'
From PowerShellβ
Run the following command:
Set-AzSecurityPricing -Name 'VirtualMachines' -PricingTier 'Standard'