🛡️ Azure Subscription Microsoft Defender For (Managed Instance) Azure SQL Databases is not set to On🟢
- Contextual name: 🛡️ Microsoft Defender For (Managed Instance) Azure SQL Databases is not set to On🟢
- ID:
/ce/ca/azure/subscription/microsoft-defender-for-sql-databases - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- Cloud Conformity: Enable Microsoft Defender for Cloud for Azure SQL Database Servers
- Internal:
dec-x-a00b4ec9
Similar Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-a00b4ec9 | 1 |
Description
Description
Turning on Microsoft Defender for Azure SQL Databases enables threat detection for Managed Instance Azure SQL databases, providing threat intelligence, anomaly detection, and behavior analytics in Microsoft Defender for Cloud.
Rationale
Enabling Microsoft Defender for Azure SQL Databases allows for greater defense-in-depth, includes functionality for discovering and classifying sensitive data, surfacing and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your database.
Impact
Turning on Microsoft Defender for Azure SQL Databases incurs an additional cost per resource.
Audit
This policy flags an Azure Subscription as
INCOMPLIANTif the relatedAzure Defender Planfor Managed Instance Azure SQL Databases has itsPricing Tierset to Free.A Subscription is also marked as
INCOMPLIANTif theDefender Planfor Managed Instance Azure SQL Databases does not exist in the CMDB.Default Value
By default, Microsoft Defender plan is
off.... see more
Remediation
Remediation
From Azure Portal
- Go to
Microsoft Defender for Cloud.- Under
Management, selectEnvironment Settings.- Click on the subscription name.
- Select the
Defender plansblade.- Click
Select types >in the row forDatabases.- Set the toggle switch next to
Azure SQL DatabasestoOn.- Select
Continue.- Select
Save.From Azure CLI
Run the following command:
az security pricing create \
-n SqlServers \
--tier StandardFrom PowerShell
Run the following command:
Set-AzSecurityPricing `
-Name "SqlServers" `
-PricingTier "Standard"