You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Migrate to SQL server-targeted Azure Monitoring Agent's autoprovisioning process
3
+
description: Learn how to enable SQL server-targeted Azure Monitoring Agent's autoprovisioning process for Defender for SQL.
4
+
ms.topic: install-set-up-deploy
5
+
ms.author: dacurwin
6
+
author: dcurwin
7
+
ms.date: 09/21/2023
8
+
---
9
+
10
+
# Migrate to SQL server-targeted Azure Monitoring Agent's (AMA) autoprovisioning process (Preview)
11
+
12
+
Microsoft Monitoring Agent (MMA) is being deprecated in August 2024. As a result, a new SQL server-targeted Azure Monitoring Agent (AMA) autoprovisioning process is being released in preview. You can learn more about the [Defender for SQL Server on machines Log Analytics Agent's deprecation plan](upcoming-changes.md#defender-for-sql-server-on-machines).
13
+
14
+
During the preview, customers who are using the current autoprovisioning process with Azure Monitor Agent (Preview) option, should migrate to the new Azure Monitoring Agent for SQL server on machines (Preview) autoprovisioning process. The migration process is seamless and provides continuous protection for all machines.
15
+
16
+
## Migrate to the SQL server-targeted AMA autoprovisioning process
17
+
18
+
1. Sign in to the [Azure portal](https://portal.azure.com).
19
+
20
+
1. Search for and select **Microsoft Defender for Cloud**.
21
+
22
+
1. In the Defender for Cloud menu, select **Environment settings**.
23
+
24
+
1. Select the relevant subscription.
25
+
26
+
1. Under the Databases plan, select **Action required**.
27
+
28
+
:::image type="content" source="media/defender-sql-autoprovisioning/action-required.png" alt-text="Screenshot that shows where the option to select action required is on the Defender plans page." lightbox="media/defender-sql-autoprovisioning/action-required.png":::
29
+
30
+
> [!NOTE]
31
+
> If you do not see the action required button, under the Databases plan select **Settings** and then toggle the Azure Monitoring Agent for SQL server on machines (Preview) option to **On**. Then select **Continue** > **Save**.
32
+
33
+
1. In the pop-up window, select **Enable**.
34
+
35
+
:::image type="content" source="media/defender-sql-autoprovisioning/update-sql.png" alt-text="Screenshot that shows you where to select the Azure Monitor Agent on the screen." lightbox="media/defender-sql-autoprovisioning/update-sql.png":::
36
+
37
+
1. Select **Save**.
38
+
39
+
Once the SQL server-targeted AMA autoprovisioning process has been enabled, you should disable the Log Analytics agent/Azure Monitor agent autoprovisioning process.
40
+
41
+
> [!NOTE]
42
+
> If you have the Defender for Server plan enabled, you will need to [review the Defender for Servers Log Analytics deprecation plan](upcoming-changes.md#defender-for-servers) for Log Analytics agent/Azure Monitor agent dependency before disabling the process.
43
+
44
+
## Disable the Log Analytics agent/Azure Monitor agent
45
+
46
+
1. Sign in to the [Azure portal](https://portal.azure.com).
47
+
48
+
1. Search for and select **Microsoft Defender for Cloud**.
49
+
50
+
1. In the Defender for Cloud menu, select **Environment settings**.
51
+
52
+
1. Select the relevant subscription.
53
+
54
+
1. Under the Database plan, select **Settings**.
55
+
56
+
1. Toggle the Log Analytics agent/Azure Monitor agent to **Off**.
57
+
58
+
:::image type="content" source="media/defender-sql-autoprovisioning/toggle-to-off.png" alt-text="Screenshot that shows where the toggle is for the log analytics agent and the Azure monitor agent toggled to off." lightbox="media/defender-sql-autoprovisioning/toggle-to-off.png":::
59
+
60
+
1. Select **Continue**.
61
+
62
+
1. Select **Save**.
63
+
64
+
## Next steps
65
+
66
+
For related information, see these resources:
67
+
-[How Microsoft Defender for Azure SQL can protect SQL servers anywhere](https://www.youtube.com/watch?v=V7RdB6RSVpc).
68
+
-[Security alerts for SQL Database and Azure Synapse Analytics](alerts-reference.md#alerts-sql-db-and-warehouse)
69
+
-[Set up email notifications for security alerts](configure-email-notifications.md)
70
+
-[Learn more about Microsoft Sentinel](../sentinel/index.yml)
71
+
- Check out [common questions](faq-defender-for-databases.yml) about Defender for Databases.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-sql-usage.md
+45-58Lines changed: 45 additions & 58 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,128 +5,115 @@ ms.topic: how-to
5
5
ms.custom: ignite-2022
6
6
ms.author: dacurwin
7
7
author: dcurwin
8
-
ms.date: 09/04/2023
8
+
ms.date: 09/20/2023
9
9
---
10
10
11
11
# Enable Microsoft Defender for SQL servers on machines
12
12
13
-
This Microsoft Defender plan detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases on the SQL server.
13
+
Defender for SQL protects your IaaS SQL Servers by identifying and mitigating potential database vulnerabilities and detecting anomalous activities that could indicate threats to your databases.
14
14
15
-
You see alerts when there are suspicious database activities, potential vulnerabilities, or SQL injection attacks, and anomalous database access and query patterns.
15
+
Defender for Cloud populates with alerts when it detects suspicious database activities, potentially harmful attempts to access or exploit SQL machines, SQL injection attacks, anomalous database access and query patterns. The alerts created by these types of events appear on the [alerts reference page](alerts-reference.md#alerts-sql-db-and-warehouse).
16
16
17
-
Microsoft Defender for SQL servers on machines extends the protections for your Azure-native SQL servers to fully support hybrid environments and protect SQL servers hosted in Azure, multicloud environments, and even on-premises machines:
17
+
Defender for Cloud uses vulnerability assessment to discover, track, and assist you in the remediation of potential database vulnerabilities. Assessment scans provide an overview of your SQL machines' security state and provide details of any security findings.
18
18
19
-
-[SQL Server on Virtual Machines](https://azure.microsoft.com/services/virtual-machines/sql-server/)
19
+
Learn more about [vulnerability assessment for Azure SQL servers on machines](defender-for-sql-on-machines-vulnerability-assessment.md).
20
20
21
-
- On-premises SQL servers:
21
+
Defender for SQL servers on machines protects your SQL servers hosted in Azure, multicloud, and even on-premises machines.
- Learn more about [SQL Server on Virtual Machines](https://azure.microsoft.com/services/virtual-machines/sql-server/).
24
24
25
-
-[SQL Server running on Windows machines without Azure Arc](../azure-monitor/agents/agent-windows.md)
25
+
- For on-premises SQL servers, you can learn more about [Azure Arc-enabled SQL Server](/sql/sql-server/azure-arc/overview) and how to [install Log Analytics agent on Windows computers without Azure Arc](../azure-monitor/agents/agent-windows.md).
26
26
27
-
-Multicloud SQL servers:
27
+
-For multicloud SQL servers:
28
28
29
29
-[Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
30
30
31
31
-[Connect your GCP project to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
32
32
33
33
> [!NOTE]
34
-
> Enable database protection for your multicloud SQL servers through the [AWS connector](quickstart-onboard-aws.md#connect-your-aws-account) or the [GCP connector](quickstart-onboard-gcp.md#configure-the-defender-for-databases-plan).
35
-
36
-
This plan includes functionality for identifying and mitigating potential database vulnerabilities and detecting anomalous activities that could indicate threats to your databases.
37
-
38
-
A vulnerability assessment service discovers, tracks, and helps you remediate potential database vulnerabilities. Assessment scans provide an overview of your SQL machines' security state, and details of any security findings.
39
-
40
-
Learn more about [vulnerability assessment for Azure SQL servers on machines](defender-for-sql-on-machines-vulnerability-assessment.md).
34
+
> You must enable database protection for your multicloud SQL servers through the [AWS connector](quickstart-onboard-aws.md#connect-your-aws-account) or the [GCP connector](quickstart-onboard-gcp.md#configure-the-defender-for-databases-plan).
41
35
42
36
## Availability
43
37
44
38
|Aspect|Details|
45
-
|----|:----|
39
+
|----|----|
46
40
|Release state:|General availability (GA)|
47
41
|Pricing:|**Microsoft Defender for SQL servers on machines** is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
48
42
|Protected SQL versions:|SQL Server version: 2012, 2014, 2016, 2017, 2019, 2022 <br>- [SQL on Azure virtual machines](/azure/azure-sql/virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview)<br>- [SQL Server on Azure Arc-enabled servers](/sql/sql-server/azure-arc/overview)<br>- On-premises SQL servers on Windows machines without Azure Arc<br>|
49
43
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Microsoft Azure operated by 21Vianet **(Advanced Threat Protection Only)**|
50
44
51
45
## Set up Microsoft Defender for SQL servers on machines
52
46
53
-
To enable this plan:
47
+
The Defender for SQL server on machines plan requires either the Microsoft Monitoring Agent (MMA) or Azure Monitoring Agent (AMA) to prevent attacks and detect misconfigurations. The plan’s autoprovisioning process is automatically enabled with the plan and is responsible for the configuration of all of the agent components required for the plan to function. This includes, installation and configuration of MMA/AMA, workspace configuration and the installation of the plan’s VM extension/solution.
54
48
55
-
[Install the agent extension](#install-the-agent-extension)
49
+
Microsoft Monitoring Agent (MMA) is set to be retired in August 2024. Defender for Cloud [updated its strategy](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation) accordingly by releasing a SQL Server-targeted Azure Monitoring Agent (AMA) autoprovisioning process to replace the Microsoft Monitoring Agent (MMA) process which is set to be deprecated. Learn more about the [AMA for SQL server on machines (Preview) autoprovisioning process](defender-for-sql-autoprovisioning.md) and how to migrate to it.
56
50
57
-
[Provision the Log Analytics agent on your SQL server's host:](#provision-the-log-analytics-agent-on-your-sql-servers-host)
51
+
> [!NOTE]
52
+
> During the **Azure Monitoring Agent for SQL Server on machines (Preview)**, customers who are currently using the **Log Analytics agent/Azure Monitor agent** processes will be asked to [migrate to the AMA for SQL server on machines (Preview) autoprovisioning process](defender-for-sql-autoprovisioning.md).
58
53
59
-
[Enable the optional plan in Defender for Cloud's environment settings page:](#enable-the-optional-plan-in-defender-for-clouds-environment-settings-page)
54
+
**To enable the plan**:
60
55
61
-
### Install the agent extension
56
+
1. Sign in to the [Azure portal](https://portal.azure.com).
62
57
63
-
-**SQL Server on Azure VM** - Register your SQL Server VM with the SQL IaaS Agent extension as explained in [Register SQL Server VM with SQL IaaS Agent Extension](/azure/azure-sql/virtual-machines/windows/sql-agent-extension-manually-register-single-vm).
58
+
1. Search for and select **Microsoft Defender for Cloud**.
64
59
65
-
-**SQL Server on Azure Arc-enabled servers** - Install the Azure Arc agent by following the installation methods described in the [Azure Arc documentation](../azure-arc/servers/manage-vm-extensions.md).
60
+
1. In the Defender for Cloud menu, select **Environment settings**.
66
61
67
-
### Provision the Log Analytics agent on your SQL server's host
62
+
1. Select the relevant subscription.
68
63
69
-
<aname="auto-provision-mma"></a>
64
+
1. On the Defender plans page, locate the Databases plan and select **Select types**.
70
65
71
-
-**SQL Server on Azure VM** - If your SQL machine is hosted on an Azure VM, you can [customize the Log Analytics agent configuration](working-with-log-analytics-agent.md).
72
-
-**SQL Server on Azure Arc-enabled servers** - If your SQL Server is managed by [Azure Arc](../azure-arc/index.yml) enabled servers, you can deploy the Log Analytics agent using the Defender for Cloud recommendation “Log Analytics agent should be installed on your Windows-based Azure Arc machines (Preview)”.
66
+
:::image type="content" source="media/tutorial-enabledatabases-plan/select-types.png" alt-text="Screenshot that shows you where to select, select types on the Defender plans page." lightbox="media/tutorial-enabledatabases-plan/select-types.png":::
73
67
74
-
-**SQL Server on-premises** - If your SQL Server is hosted on an on-premises Windows machine without Azure Arc, you can connect the machine to Azure by either:
68
+
1. In the Resource types selection window, toggle the **SQL servers on machines** plan to **On**.
75
69
76
-
-**Deploy Azure Arc** - You can connect any Windows machine to Defender for Cloud. However, Azure Arc provides deeper integration across *all* of your Azure environment. If you set up Azure Arc, you see the **SQL Server – Azure Arc** page in the portal and your security alerts appear on a dedicated **Security** tab on that page. So the first and recommended option is to [set up Azure Arc on the host](../azure-arc/servers/onboard-portal.md#install-and-validate-the-agent-on-windows) and follow the instructions for **SQL Server on Azure Arc**.
70
+
1. Select **Continue**.
77
71
78
-
-**Connect the Windows machine without Azure Arc** - If you choose to connect a SQL Server running on a Windows machine without using Azure Arc, follow the instructions in [Connect Windows machines to Azure Monitor](../azure-monitor/agents/agent-windows.md).
72
+
1. Select **Save**.
79
73
80
-
### Enable the optional plan in Defender for Cloud's environment settings page
1. From Defender for Cloud's menu, open the **Environment settings** page.
76
+
1. Navigate to the **Environment settings** page.
83
77
84
-
- If you're using **Microsoft Defender for Cloud's default workspace** (named “default workspace-\<your subscription ID>-\<region>”), select the relevant **subscription**.
78
+
1. Select **Settings & monitoring**.
85
79
86
-
- If you're using **a non-default workspace**, select the relevant **workspace**(enter the workspace's name in the filter if necessary).
80
+
- For customer using the current generally available autoprovisioning process, select **Edit configuration**for the **Log Analytics agent/Azure Monitor agent** component.
87
81
88
-
1. Set the option for **SQL servers on machines** plan to **On**.
82
+
- For customer using the preview of the autoprovisioning process, select **Edit configuration** for the **Azure Monitoring Agent for SQL server on machines (Preview)** component.
89
83
90
-
:::image type="content" source="./media/security-center-advanced-iaas-data/sql-servers-on-vms-in-pricing-small.png" alt-text="Screenshot of Microsoft Defender for Cloud's 'Defender plans' page with optional plans.":::
91
-
92
-
The plan is enabled on all SQL servers connected to the selected workspace. The protection will be fully active after the first restart of the SQL Server instance.
84
+
## Explore and investigate security alerts
93
85
94
-
>[!TIP]
95
-
> To create a new workspace, follow the instructions in [Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md).
86
+
There are several ways to view Microsoft Defender for SQL alerts in Microsoft Defender for Cloud:
96
87
97
-
1. Optionally, configure email notification for security alerts.
88
+
- The Alerts page.
98
89
99
-
You can set a list of recipients to receive an email notification when Defenders for Cloud alerts are generated. The email contains a direct link to the alert in Microsoft Defender for Cloud with all the relevant details. For more information, see [Set up email notifications for security alerts](configure-email-notifications.md).
90
+
-The machine's security page.
100
91
101
-
## Microsoft Defender for SQL alerts
92
+
- The [workload protections dashboard](workload-protections-dashboard.md).
102
93
103
-
Alerts are generated by unusual and potentially harmful attempts to access or exploit SQL machines. These events can trigger alerts shown in the [alerts reference page](alerts-reference.md#alerts-sql-db-and-warehouse).
94
+
- Through the direct link provided in the alert's email.
104
95
105
-
## Explore and investigate security alerts
96
+
**To view alerts**:
106
97
107
-
Microsoft Defender for SQL alerts are available in:
98
+
1. Sign in to the [Azure portal](https://portal.azure.com).
108
99
109
-
- The Defender for Cloud's security alerts page
110
-
- The machine's security page
111
-
- The [workload protections dashboard](workload-protections-dashboard.md)
112
-
- Through the direct link in the alert emails
100
+
1. Search for and select **Microsoft Defender for Cloud**.
113
101
114
-
To view alerts:
102
+
1. Select **Security alerts**.
115
103
116
-
1. Select **Security alerts** from Defender for Cloud's menu and select an alert.
104
+
1. Select an alert.
117
105
118
-
1.Alerts are designed to be self-contained, with detailed remediation steps and investigation information in each one. You can investigate further by using other Microsoft Defender for Cloud and Microsoft Sentinel capabilities for a broader view:
106
+
Alerts are designed to be self-contained, with detailed remediation steps and investigation information in each one. You can investigate further by using other Microsoft Defender for Cloud and Microsoft Sentinel capabilities for a broader view:
119
107
120
-
- Enable SQL Server's auditing feature for further investigations. If you're a Microsoft Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?preserve-view=true&view=sql-server-ver15).
121
-
122
-
- To improve your security posture, use Defender for Cloud's recommendations for the host machine indicated in each alert to reduce the risks of future attacks.
108
+
- Enable SQL Server's auditing feature for further investigations. If you're a Microsoft Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?preserve-view=true&view=sql-server-ver15).
123
109
110
+
- To improve your security posture, use Defender for Cloud's recommendations for the host machine indicated in each alert to reduce the risks of future attacks.
111
+
124
112
[Learn more about managing and responding to alerts](managing-and-responding-alerts.md).
125
113
126
114
## Next steps
127
115
128
116
For related information, see these resources:
129
-
130
117
-[How Microsoft Defender for Azure SQL can protect SQL servers anywhere](https://www.youtube.com/watch?v=V7RdB6RSVpc).
131
118
-[Security alerts for SQL Database and Azure Synapse Analytics](alerts-reference.md#alerts-sql-db-and-warehouse)
132
119
-[Set up email notifications for security alerts](configure-email-notifications.md)
0 commit comments