π Azure Subscription Microsoft Defender For (Managed Instance) Azure SQL Databases is not set to On π’
- Contextual name: π Microsoft Defender For (Managed Instance) Azure SQL Databases is not set to On π’
- ID:
/ce/ca/azure/subscription/microsoft-defender-for-sql-databases
- Located in: π Azure Subscription
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-a00b4ec9
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-a00b4ec9 | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Turning on Microsoft Defender for Azure SQL Databases enables threat detection for Managed Instance Azure SQL databases, providing threat intelligence, anomaly detection, and behavior analytics in Microsoft Defender for Cloud.
Rationaleβ
Enabling Microsoft Defender for Azure SQL Databases allows for greater defense-in-depth, includes functionality for discovering and classifying sensitive data, surfacing and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your database.
Impactβ
Turning on Microsoft Defender for Azure SQL Databases incurs an additional cost per resource.
Auditβ
This policy flags an Azure Subscription as
INCOMPLIANT
if the relatedAzure Defender Plan
for Managed Instance Azure SQL Databases has itsPricing Tier
set to Free.A Subscription is also marked as
INCOMPLIANT
if theDefender Plan
for Managed Instance Azure SQL Databases does not exist in the CMDB.Default Valueβ
By default, Microsoft Defender plan is
off
.... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
.- Under
Management
, selectEnvironment Settings
.- Click on the subscription name.
- Select the
Defender plans
blade.- Click
Select types >
in the row forDatabases
.- Set the toggle switch next to
Azure SQL Databases
toOn
.- Select
Continue
.- Select
Save
.From Azure CLIβ
Run the following command:
az security pricing create -n SqlServers --tier 'standard'
From PowerShellβ
Run the following command:
Set-AzSecurityPricing -Name 'SqlServers' -PricingTier 'Standard'