🛡️ Azure Subscription Microsoft Defender For Servers is not set to On🟢
- Contextual name: 🛡️ Microsoft Defender For Servers is not set to On🟢
- ID:
/ce/ca/azure/subscription/microsoft-defender-for-servers - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- Cloud Conformity: Enable Microsoft Defender for Cloud for Virtual Machines
- Internal:
dec-x-52ac4ac0
Similar Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-52ac4ac0 | 1 |
Description
Description
The Defender for Servers plan in Microsoft Defender for Cloud reduces security risk by providing actionable recommendations to improve and remediate machine security posture. Defender for Servers also helps to protect machines against real-time security threats and attacks.
Defender for Servers offers two paid plans:
Plan 1
The following components are enabled by default:
- Log Analytics agent (deprecated)
- Endpoint protection
Plan 1 also offers the following components, disabled by default:
- Vulnerability assessment for machines
- Guest Configuration agent (preview)
Plan 2
The following components are enabled by default:
- Log Analytics agent (deprecated)
- Vulnerability assessment for machines
- Endpoint protection
- Agentless scanning for machines
Plan 2 also offers the following components, disabled by default:
- Guest Configuration agent (preview)
- File Integrity Monitoring
Rationale
Enabling Microsoft Defender for Servers allows for greater defense-in-depth, with threat detection provided by the Microsoft Security Response Center (MSRC).
... see more
Remediation
Remediation
From Azure Portal
- Go to
Microsoft Defender for Cloud.- Under
Management, selectEnvironment Settings.- Click on the subscription name.
- Click
Defender plansin the left pane.- Under
Cloud Workload Protection (CWP), locateServerin the Plan column, set Status toOn.- Select
Save.- Repeat steps 1-6 for each subscription requiring remediation.
From Azure CLI
Run the following command:
az security pricing create \
-n VirtualMachines \
--tier StandardFrom PowerShell
Run the following command:
Set-AzSecurityPricing `
-Name "VirtualMachines" `
-PricingTier "Standard"