Control: 2.1.11 Ensure That Microsoft Defender for DNS Is Set To 'On'
Description
Microsoft Defender for DNS scans all network traffic exiting from within a subscription.
DNS lookups within a subscription are scanned and compared to a dynamic list of websites that might be potential security threats. These threats could be a result of a security breach within your services, thus scanning for them could prevent a potential security threat from being introduced.
Remediation
From Azure Portal
- Go to
Microsoft Defender for Cloud
. - Select
Environment Settings
blade. - Click on the subscription name.
- Select the
Defender plans
blade. - Select
On
underStatus
forDNS
. - Select
Save
.
From Azure CLI
Enable Standard pricing tier for DNS:
az security pricing create -n 'DNS' --tier 'Standard'
From Powershell
Enable Standard pricing tier for DNS:
Set-AzSecurityPricing -Name 'DNS' -PricingTier 'Standard'
Default Value
By default, Microsoft Defender for DNS is not enabled.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v200_2_1_11
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v200_2_1_11 --share
SQL
This control uses a named query:
securitycenter_azure_defender_on_for_dns