Skip to main content

Description

Install endpoint protection for all virtual machines.

Rationale

Installing endpoint protection systems (like anti-malware for Azure) provides for real-time protection capability that helps identify and remove viruses, spyware, and other malicious software. These also offer configurable alerts when known-malicious or unwanted software attempts to install itself or run on Azure systems.

Impact

Endpoint protection will incur an additional cost to you.

Audit

From Azure Portal

  1. Go to Security Center.
  2. Click the Recommendations blade.
  3. Ensure that there are no recommendations for Endpoint Protection not installed on Azure VMs.

From Azure CLI

az vm show -g <MyResourceGroup> -n <MyVm> -d --query "resources[?type=='Microsoft.Compute/virtualMachines/extensions'].{ExtensionName:name}" -o table

If extensions are installed, it will list the installed extensions:

EndpointSecurity || TrendMicroDSA* || Antimalware || EndpointProtection || SCWPAgent || PortalProtectExtension* || FileSecurity*

Alternatively, you can employ your own endpoint protection tool for your OS.

From Azure Policy

If referencing a digital copy of this Benchmark, clicking a Policy ID will open a link to the associated Policy definition in Azure.

Default Value

By default Endpoint Protection is disabled.

References

  1. https://docs.microsoft.com/en-us/azure/security-center/security-center-install-endpoint-protection
  2. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware
  3. https://docs.microsoft.com/en-us/cli/azure/vm/extension?view=azure-cli-latest#az_vm_extension_list
  4. https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-endpoint-security#es-1-use-endpoint-detection-and-response-edr