π Azure Subscription Microsoft Defender For SQL Servers On Machines is not set to On π’
- Contextual name: π Microsoft Defender For SQL Servers On Machines is not set to On π’
- ID:
/ce/ca/azure/subscription/microsoft-defender-for-sql-servers
- Located in: π Azure Subscription
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-fafadacd
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-fafadacd | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Turning on Microsoft Defender for SQL servers on machines enables threat detection for SQL servers on machines, providing threat intelligence, anomaly detection, and behavior analytics in Microsoft Defender for Cloud.
Rationaleβ
Enabling Microsoft Defender for SQL servers on machines allows for greater defense-in-depth, functionality for discovering and classifying sensitive data, surfacing and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your database.
Impactβ
Turning on Microsoft Defender for SQL servers on machines incurs an additional cost per resource.
Auditβ
This policy flags an Azure Subscription as
INCOMPLIANT
if the relatedAzure Defender Plan
for SQL Servers on Virtual Machines has itsPricing Tier
set to Free.A Subscription is also marked as
INCOMPLIANT
if theDefender Plan
for SQL Servers on Virtual Machines does not exist in the CMDB.Default Valueβ
By default, Microsoft Defender plan is
off
.... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
.- Under
Management
, selectEnvironment Settings
.- Click on the subscription name.
- Select the
Defender plans
blade.- Click
Select types >
in the row forDatabases
.- Set the toggle switch next to
SQL servers on machines
toOn
.- Select
Continue
.- Select
Save
.From Azure CLIβ
Run the following command:
az security pricing create -n SqlServerVirtualMachines --tier 'standard'
From PowerShellβ
Run the following command:
Set-AzSecurityPricing -Name 'SqlServerVirtualMachines' -PricingTier 'Standard'