Control: 2.1.11 Ensure That Microsoft Defender for DNS Is Set To 'On'
Description
Microsoft Defender for DNS scans all network traffic exiting from within a subscription.
DNS lookups within a subscription are scanned and compared to a dynamic list of websites that might be potential security threats. These threats could be a result of a security breach within your services, thus scanning for them could prevent a potential security threat from being introduced.
Remediation
From Azure Portal
- Go to
Microsoft Defender for Cloud
- Select
Environment Settings
blade - Click on the subscription name
- Select the
Defender plans
blade - On the line in the table for
DNS
SelectOn
underPlan
. - Select
Save
From Azure CLI
Use the below command to enable Standard pricing tier for App Service
az security pricing create -n 'DNS' --tier 'Standard'
From Powershell
Set-AzSecurityPricing -Name 'DNS' -PricingTier 'Standard'
Default Value
By default, Microsoft Defender for DNS is not enabled.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v150_2_1_11
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v150_2_1_11 --share
SQL
This control uses a named query:
securitycenter_azure_defender_on_for_dns