Control: 3.1.16 [LEGACY] Ensure That Microsoft Defender for DNS Is Set To 'On'
Description
[NOTE: As of August 1, 2023 customers with an existing subscription to Defender for DNS can continue to use the service, but new subscribers will receive alerts about suspicious DNS activity as part of Defender for Servers P2.]
Microsoft Defender for DNS scans all network traffic exiting from within a subscription.
DNS lookups within a subscription are scanned and compared to a dynamic list of websites that might be potential security threats. These threats could be a result of a security breach within your services, thus scanning for them could prevent a potential security threat from being introduced.
Remediation
From Azure Portal
- Go to
Microsoft Defender for Cloud
. - Under
Management
, selectEnvironment Settings
. - Click on the subscription name.
- Select the
Defender plans
blade. - Select
On
underStatus
forDNS
. - Select
Save
.
From Azure CLI
Enable Standard pricing tier for DNS:
az security pricing create -n 'DNS' --tier 'Standard'
From Powershell
Enable Standard pricing tier for DNS:
Set-AzSecurityPricing -Name 'DNS' -PricingTier 'Standard'
Default Value
By default, Microsoft Defender for DNS is not enabled.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v300_3_1_16
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v300_3_1_16 --share
SQL
This control uses a named query:
securitycenter_azure_defender_on_for_dns