turbot/steampipe-mod-azure-compliance

Control: 2.1.1 Ensure That Microsoft Defender for Servers Is Set to 'On'

Description

Turning on Microsoft Defender for Servers enables threat detection for Servers, providing threat intelligence, anomaly detection, and behavior analytics in the Microsoft Defender for Cloud.

Enabling Microsoft Defender for Servers allows for greater defense-in-depth, with threat detection provided by the Microsoft Security Response Center (MSRC).

Remediation

From Azure Portal

  1. Go to Microsoft Defender for Cloud.
  2. Select Environment Settings.
  3. Click on the subscription name.
  4. Select Defender plans.
  5. Set Server Status to On.
  6. Select Save.

From Azure CLI

Run the following command:

az security pricing create -n VirtualMachines --tier 'standard'

From Powershell

Run the following command:

Set-AzSecurityPricing -Name 'VirtualMachines' -PricingTier 'Standard'

Default Value

By default, Microsoft Defender plan is off.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v200_2_1_1

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v200_2_1_1 --share

SQL

This control uses a named query:

select
sub_pricing.id as resource,
case
when pricing_tier = 'Standard' then 'ok'
else 'alarm'
end as status,
case
when pricing_tier = 'Standard' then 'Azure Defender on for Servers.'
else 'Azure Defender off for Servers.'
end as reason
, sub.display_name as subscription
from
azure_security_center_subscription_pricing sub_pricing
right join azure_subscription sub on sub_pricing.subscription_id = sub.subscription_id
where
name = 'VirtualMachines';

Tags