Control: 2.1.5 Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'
Description
Turning on Microsoft Defender for SQL servers on machines enables threat detection for SQL servers on machines, providing threat intelligence, anomaly detection, and behavior analytics in the Microsoft Defender for Cloud.
Enabling Microsoft Defender for SQL servers on machines allows for greater defensein-depth, with threat detection provided by the Microsoft Security Response Center (MSRC).
Remediation
From Azure Portal
- Go to 
Microsoft Defender for Cloud - Select 
Environment Settingsblade - Click on the subscription name
 - Select the 
Defender plansblade - On the line in the table for 
SQL Servers on machinesSelectOnunderPlan. - Select 
Save 
From Azure CLI
Run the following command:
az security pricing create -n SqlServerVirtualMachines --tier 'standard'
From Powershell
Run the following command:
Set-AzSecurityPricing -Name 'SqlServerVirtualMachines' -PricingTier 'Standard'
Default Value
By default, Microsoft Defender plan is off.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v150_2_1_5Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v150_2_1_5 --shareSQL
This control uses a named query:
select  sub_pricing.id as resource,  case    when pricing_tier = 'Standard' then 'ok'    else 'alarm'  end as status,  case    when pricing_tier = 'Standard' then 'Azure Defender on for SQL servers on machines.'    else 'Azure Defender off for SQL servers on machines.'  end as reason    , sub.display_name as subscriptionfrom  azure_security_center_subscription_pricing sub_pricing  right join azure_subscription sub on sub_pricing.subscription_id = sub.subscription_idwhere  name = 'SqlServerVirtualMachines';