Skip to main content

lacework-global-602

2.1.5 Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On' (Manual)

Profile Applicability

• Level 2

Description

Turning on Microsoft Defender for SQL servers on machines enables threat detection for SQL servers on machines, providing threat intelligence, anomaly detection, and behavior analytics in the Microsoft Defender for Cloud.

Rationale

Enabling Microsoft Defender for SQL servers on machines allows for greater defense-in-depth, with threat detection provided by the Microsoft Security Response Center (MSRC).

Impact

Turning on Microsoft Defender for SQL servers on machines incurs an additional cost per resource.

Audit

From Azure Portal

  1. Go to Microsoft Defender for Cloud
  2. Select Environment Settings blade
  3. Click on the subscription name
  4. Select the Defender plans blade
  5. Review the chosen pricing tier. For the SQL Servers on machines resource type Plan should be set to On.

From Azure CLI

Run the following command:

az security pricing show -n SqlServerVirtualMachines

Ensure the 'PricingTier' is set to 'Standard'

From Azure Powershell

Run the following command:

Get-AzSecurityPricing -Name 'SqlServerVirtualMachines' | Select-Object Name,PricingTier

Remediation

From Azure Portal

  1. Go to Microsoft Defender for Cloud
  2. Select Environment Settings blade
  3. Click on the subscription name
  4. Select the Defender plans blade
  5. On the line in the table for SQL Servers on machines Select On under Plan.
  6. Select Save

From Azure CLI

Run the following command:

az security pricing create -n SqlServerVirtualMachines --tier 'standard'

From Azure Powershell

Run the following command:

Set-AzSecurityPricing -Name 'SqlServerVirtualMachines' -PricingTier 'Standard'

References

https://docs.microsoft.com/en-us/azure/security-center/defender-for-sql-usage
https://docs.microsoft.com/en-us/azure/security-center/security-center-detection-capabilities
https://docs.microsoft.com/en-us/rest/api/securitycenter/pricings/update
https://docs.microsoft.com/en-us/powershell/module/az.security/get-azsecuritypricing
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-data-protection#dp-3-monitor-for-unauthorized-transfer-of-sensitive-data
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-logging-threat-detection#lt-1-enable-threat-detection-capabilities