lacework-global-602
Set Microsoft Defender for SQL Servers on Machines To 'On' (Manual)
Profile Applicability
• Level 2
Description
Turning on Microsoft Defender for SQL servers on machines enables threat detection for SQL servers on machines, providing threat intelligence, anomaly detection, and behavior analytics in the Microsoft Defender for Cloud.
Rationale
Enabling Microsoft Defender for SQL servers on machines allows for greater defense-in-depth, with threat detection provided by the Microsoft Security Response Center (MSRC).
Impact
Turning on Microsoft Defender for SQL servers on machines incurs an additional cost per resource.
Audit
From Azure Portal
- Go to
Microsoft Defender for Cloud
- Select
Environment Settings
blade - Click on the subscription name
- Select the
Defender plans
blade - Review the chosen pricing tier. For the
SQL Servers on machines
resource typePlan
should be set toOn
.
From Azure CLI
Run the following command:
az security pricing show -n SqlServerVirtualMachines
Ensure the 'PricingTier' is set to 'Standard'
From Azure Powershell
Run the following command:
Get-AzSecurityPricing -Name 'SqlServerVirtualMachines' | Select-Object Name,PricingTier
Remediation
From Azure Portal
- Go to Microsoft Defender for Cloud.
- Select Environment Settings blade.
- Click the subscription name.
- Select the Defender plans blade.
- Click Select types > in the row for Databases.
- Set the radio button next to SQL servers on machines to On.
- Select Continue.
- Select Save.
From Azure CLI
Run the following command:
az security pricing create -n SqlServerVirtualMachines --tier 'standard'
From Azure Powershell
Run the following command:
Set-AzSecurityPricing -Name 'SqlServerVirtualMachines' -PricingTier 'Standard'
References
https://docs.microsoft.com/en-us/azure/security-center/defender-for-sql-usage
https://docs.microsoft.com/en-us/azure/security-center/security-center-detection-capabilities
https://docs.microsoft.com/en-us/rest/api/securitycenter/pricings/update
https://docs.microsoft.com/en-us/powershell/module/az.security/get-azsecuritypricing
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-data-protection#dp-3-monitor-for-unauthorized-transfer-of-sensitive-data
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-logging-threat-detection#lt-1-enable-threat-detection-capabilities