Description
Turning on Microsoft Defender for SQL servers on machines enables threat detection for SQL servers on machines, providing threat intelligence, anomaly detection, and behavior analytics in Microsoft Defender for Cloud.
Rationaleβ
Enabling Microsoft Defender for SQL servers on machines allows for greater defense-in-depth, functionality for discovering and classifying sensitive data, surfacing and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your database.
Impactβ
Turning on Microsoft Defender for SQL servers on machines incurs an additional cost per resource.
Auditβ
From Azure Portalβ
- Go to
Microsoft Defender for Cloud
. - Under
Management
, selectEnvironment Settings
. - Click on the subscription name.
- Select the
Defender plans
blade. - Click
Select types >
in the row forDatabases
. - Ensure the toggle switch next to
SQL servers on machines
is set toOn
.
From Azure CLIβ
Ensure Defender for SQL is licensed with the following command:
az security pricing show -n SqlServerVirtualMachines
Ensure the PricingTier
is set to Standard
.
From PowerShellβ
Run the following command:
Get-AzSecurityPricing -Name 'SqlServerVirtualMachines' | Select-Object Name,PricingTier
Ensure the PricingTier
is set to Standard
.
From Azure Policyβ
If referencing a digital copy of this Benchmark, clicking a Policy ID will open a link to the associated Policy definition in Azure.
-
Policy ID: 6581d072-105e-4418-827f-bd446d56421b - Name:
Azure Defender for SQL servers on machines should be enabled
-
Policy ID: abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9 - Name:
Azure Defender for SQL should be enabled for unprotected Azure SQL servers
Default Valueβ
By default, Microsoft Defender plan is off
.
Referencesβ
- https://docs.microsoft.com/en-us/azure/security-center/defender-for-sql-usage
- https://docs.microsoft.com/en-us/azure/security-center/security-center-detection-capabilities
- https://docs.microsoft.com/en-us/rest/api/securitycenter/pricings/update
- https://docs.microsoft.com/en-us/powershell/module/az.security/get-azsecuritypricing
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-data-protection#dp-2-monitor-anomalies-and-threats-targeting-sensitive-data
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-logging-threat-detection#lt-1-enable-threat-detection-capabilities