Skip to content

Commit 0da0fe5

Browse files
authored
Merge pull request #251439 from ElazarK/WI143962-SQL-server-on-machine
WI143962 SQL server on machines
2 parents a8e171d + caaccb8 commit 0da0fe5

File tree

7 files changed

+131
-59
lines changed

7 files changed

+131
-59
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -636,6 +636,9 @@
636636
- name: Enable Defender for SQL servers on machines
637637
href: defender-for-sql-usage.md
638638
displayName: hybrid, arc, Azure Defender
639+
- name: Migrate to SQL server-targeted Azure Monitoring Agent's autoprovisioning process
640+
href: defender-for-sql-autoprovisioning.md
641+
displayName: defender for sql, autoprovisioning, auto provisioning, auto-provisioning
639642
- name: Scan your SQL resources for vulnerabilities
640643
href: defender-for-sql-on-machines-vulnerability-assessment.md
641644
displayName: hybrid, arc, Azure Defender, VA, registry, vulnerabilities
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: Migrate to SQL server-targeted Azure Monitoring Agent's autoprovisioning process
3+
description: Learn how to enable SQL server-targeted Azure Monitoring Agent's autoprovisioning process for Defender for SQL.
4+
ms.topic: install-set-up-deploy
5+
ms.author: dacurwin
6+
author: dcurwin
7+
ms.date: 09/21/2023
8+
---
9+
10+
# Migrate to SQL server-targeted Azure Monitoring Agent's (AMA) autoprovisioning process (Preview)
11+
12+
Microsoft Monitoring Agent (MMA) is being deprecated in August 2024. As a result, a new SQL server-targeted Azure Monitoring Agent (AMA) autoprovisioning process is being released in preview. You can learn more about the [Defender for SQL Server on machines Log Analytics Agent's deprecation plan](upcoming-changes.md#defender-for-sql-server-on-machines).
13+
14+
During the preview, customers who are using the current autoprovisioning process with Azure Monitor Agent (Preview) option, should migrate to the new Azure Monitoring Agent for SQL server on machines (Preview) autoprovisioning process. The migration process is seamless and provides continuous protection for all machines.
15+
16+
## Migrate to the SQL server-targeted AMA autoprovisioning process
17+
18+
1. Sign in to the [Azure portal](https://portal.azure.com).
19+
20+
1. Search for and select **Microsoft Defender for Cloud**.
21+
22+
1. In the Defender for Cloud menu, select **Environment settings**.
23+
24+
1. Select the relevant subscription.
25+
26+
1. Under the Databases plan, select **Action required**.
27+
28+
:::image type="content" source="media/defender-sql-autoprovisioning/action-required.png" alt-text="Screenshot that shows where the option to select action required is on the Defender plans page." lightbox="media/defender-sql-autoprovisioning/action-required.png":::
29+
30+
> [!NOTE]
31+
> If you do not see the action required button, under the Databases plan select **Settings** and then toggle the Azure Monitoring Agent for SQL server on machines (Preview) option to **On**. Then select **Continue** > **Save**.
32+
33+
1. In the pop-up window, select **Enable**.
34+
35+
:::image type="content" source="media/defender-sql-autoprovisioning/update-sql.png" alt-text="Screenshot that shows you where to select the Azure Monitor Agent on the screen." lightbox="media/defender-sql-autoprovisioning/update-sql.png":::
36+
37+
1. Select **Save**.
38+
39+
Once the SQL server-targeted AMA autoprovisioning process has been enabled, you should disable the Log Analytics agent/Azure Monitor agent autoprovisioning process.
40+
41+
> [!NOTE]
42+
> If you have the Defender for Server plan enabled, you will need to [review the Defender for Servers Log Analytics deprecation plan](upcoming-changes.md#defender-for-servers) for Log Analytics agent/Azure Monitor agent dependency before disabling the process.
43+
44+
## Disable the Log Analytics agent/Azure Monitor agent
45+
46+
1. Sign in to the [Azure portal](https://portal.azure.com).
47+
48+
1. Search for and select **Microsoft Defender for Cloud**.
49+
50+
1. In the Defender for Cloud menu, select **Environment settings**.
51+
52+
1. Select the relevant subscription.
53+
54+
1. Under the Database plan, select **Settings**.
55+
56+
1. Toggle the Log Analytics agent/Azure Monitor agent to **Off**.
57+
58+
:::image type="content" source="media/defender-sql-autoprovisioning/toggle-to-off.png" alt-text="Screenshot that shows where the toggle is for the log analytics agent and the Azure monitor agent toggled to off." lightbox="media/defender-sql-autoprovisioning/toggle-to-off.png":::
59+
60+
1. Select **Continue**.
61+
62+
1. Select **Save**.
63+
64+
## Next steps
65+
66+
For related information, see these resources:
67+
- [How Microsoft Defender for Azure SQL can protect SQL servers anywhere](https://www.youtube.com/watch?v=V7RdB6RSVpc).
68+
- [Security alerts for SQL Database and Azure Synapse Analytics](alerts-reference.md#alerts-sql-db-and-warehouse)
69+
- [Set up email notifications for security alerts](configure-email-notifications.md)
70+
- [Learn more about Microsoft Sentinel](../sentinel/index.yml)
71+
- Check out [common questions](faq-defender-for-databases.yml) about Defender for Databases.

articles/defender-for-cloud/defender-for-sql-usage.md

Lines changed: 45 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -5,128 +5,115 @@ ms.topic: how-to
55
ms.custom: ignite-2022
66
ms.author: dacurwin
77
author: dcurwin
8-
ms.date: 09/04/2023
8+
ms.date: 09/20/2023
99
---
1010

1111
# Enable Microsoft Defender for SQL servers on machines
1212

13-
This Microsoft Defender plan detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases on the SQL server.
13+
Defender for SQL protects your IaaS SQL Servers by identifying and mitigating potential database vulnerabilities and detecting anomalous activities that could indicate threats to your databases.
1414

15-
You see alerts when there are suspicious database activities, potential vulnerabilities, or SQL injection attacks, and anomalous database access and query patterns.
15+
Defender for Cloud populates with alerts when it detects suspicious database activities, potentially harmful attempts to access or exploit SQL machines, SQL injection attacks, anomalous database access and query patterns. The alerts created by these types of events appear on the [alerts reference page](alerts-reference.md#alerts-sql-db-and-warehouse).
1616

17-
Microsoft Defender for SQL servers on machines extends the protections for your Azure-native SQL servers to fully support hybrid environments and protect SQL servers hosted in Azure, multicloud environments, and even on-premises machines:
17+
Defender for Cloud uses vulnerability assessment to discover, track, and assist you in the remediation of potential database vulnerabilities. Assessment scans provide an overview of your SQL machines' security state and provide details of any security findings.
1818

19-
- [SQL Server on Virtual Machines](https://azure.microsoft.com/services/virtual-machines/sql-server/)
19+
Learn more about [vulnerability assessment for Azure SQL servers on machines](defender-for-sql-on-machines-vulnerability-assessment.md).
2020

21-
- On-premises SQL servers:
21+
Defender for SQL servers on machines protects your SQL servers hosted in Azure, multicloud, and even on-premises machines.
2222

23-
- [Azure Arc-enabled SQL Server](/sql/sql-server/azure-arc/overview)
23+
- Learn more about [SQL Server on Virtual Machines](https://azure.microsoft.com/services/virtual-machines/sql-server/).
2424

25-
- [SQL Server running on Windows machines without Azure Arc](../azure-monitor/agents/agent-windows.md)
25+
- For on-premises SQL servers, you can learn more about [Azure Arc-enabled SQL Server](/sql/sql-server/azure-arc/overview) and how to [install Log Analytics agent on Windows computers without Azure Arc](../azure-monitor/agents/agent-windows.md).
2626

27-
- Multicloud SQL servers:
27+
- For multicloud SQL servers:
2828

2929
- [Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
3030

3131
- [Connect your GCP project to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
3232

3333
> [!NOTE]
34-
> Enable database protection for your multicloud SQL servers through the [AWS connector](quickstart-onboard-aws.md#connect-your-aws-account) or the [GCP connector](quickstart-onboard-gcp.md#configure-the-defender-for-databases-plan).
35-
36-
This plan includes functionality for identifying and mitigating potential database vulnerabilities and detecting anomalous activities that could indicate threats to your databases.
37-
38-
A vulnerability assessment service discovers, tracks, and helps you remediate potential database vulnerabilities. Assessment scans provide an overview of your SQL machines' security state, and details of any security findings.
39-
40-
Learn more about [vulnerability assessment for Azure SQL servers on machines](defender-for-sql-on-machines-vulnerability-assessment.md).
34+
> You must enable database protection for your multicloud SQL servers through the [AWS connector](quickstart-onboard-aws.md#connect-your-aws-account) or the [GCP connector](quickstart-onboard-gcp.md#configure-the-defender-for-databases-plan).
4135
4236
## Availability
4337

4438
|Aspect|Details|
45-
|----|:----|
39+
|----|----|
4640
|Release state:|General availability (GA)|
4741
|Pricing:|**Microsoft Defender for SQL servers on machines** is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
4842
|Protected SQL versions:|SQL Server version: 2012, 2014, 2016, 2017, 2019, 2022 <br>- [SQL on Azure virtual machines](/azure/azure-sql/virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview)<br>- [SQL Server on Azure Arc-enabled servers](/sql/sql-server/azure-arc/overview)<br>- On-premises SQL servers on Windows machines without Azure Arc<br>|
4943
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Microsoft Azure operated by 21Vianet **(Advanced Threat Protection Only)**|
5044

5145
## Set up Microsoft Defender for SQL servers on machines
5246

53-
To enable this plan:
47+
The Defender for SQL server on machines plan requires either the Microsoft Monitoring Agent (MMA) or Azure Monitoring Agent (AMA) to prevent attacks and detect misconfigurations. The plan’s autoprovisioning process is automatically enabled with the plan and is responsible for the configuration of all of the agent components required for the plan to function. This includes, installation and configuration of MMA/AMA, workspace configuration and the installation of the plan’s VM extension/solution.
5448

55-
[Install the agent extension](#install-the-agent-extension)
49+
Microsoft Monitoring Agent (MMA) is set to be retired in August 2024. Defender for Cloud [updated its strategy](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation) accordingly by releasing a SQL Server-targeted Azure Monitoring Agent (AMA) autoprovisioning process to replace the Microsoft Monitoring Agent (MMA) process which is set to be deprecated. Learn more about the [AMA for SQL server on machines (Preview) autoprovisioning process](defender-for-sql-autoprovisioning.md) and how to migrate to it.
5650

57-
[Provision the Log Analytics agent on your SQL server's host:](#provision-the-log-analytics-agent-on-your-sql-servers-host)
51+
> [!NOTE]
52+
> During the **Azure Monitoring Agent for SQL Server on machines (Preview)**, customers who are currently using the **Log Analytics agent/Azure Monitor agent** processes will be asked to [migrate to the AMA for SQL server on machines (Preview) autoprovisioning process](defender-for-sql-autoprovisioning.md).
5853
59-
[Enable the optional plan in Defender for Cloud's environment settings page:](#enable-the-optional-plan-in-defender-for-clouds-environment-settings-page)
54+
**To enable the plan**:
6055

61-
### Install the agent extension
56+
1. Sign in to the [Azure portal](https://portal.azure.com).
6257

63-
- **SQL Server on Azure VM** - Register your SQL Server VM with the SQL IaaS Agent extension as explained in [Register SQL Server VM with SQL IaaS Agent Extension](/azure/azure-sql/virtual-machines/windows/sql-agent-extension-manually-register-single-vm).
58+
1. Search for and select **Microsoft Defender for Cloud**.
6459

65-
- **SQL Server on Azure Arc-enabled servers** - Install the Azure Arc agent by following the installation methods described in the [Azure Arc documentation](../azure-arc/servers/manage-vm-extensions.md).
60+
1. In the Defender for Cloud menu, select **Environment settings**.
6661

67-
### Provision the Log Analytics agent on your SQL server's host
62+
1. Select the relevant subscription.
6863

69-
<a name="auto-provision-mma"></a>
64+
1. On the Defender plans page, locate the Databases plan and select **Select types**.
7065

71-
- **SQL Server on Azure VM** - If your SQL machine is hosted on an Azure VM, you can [customize the Log Analytics agent configuration](working-with-log-analytics-agent.md).
72-
- **SQL Server on Azure Arc-enabled servers** - If your SQL Server is managed by [Azure Arc](../azure-arc/index.yml) enabled servers, you can deploy the Log Analytics agent using the Defender for Cloud recommendation “Log Analytics agent should be installed on your Windows-based Azure Arc machines (Preview)”.
66+
:::image type="content" source="media/tutorial-enabledatabases-plan/select-types.png" alt-text="Screenshot that shows you where to select, select types on the Defender plans page." lightbox="media/tutorial-enabledatabases-plan/select-types.png":::
7367

74-
- **SQL Server on-premises** - If your SQL Server is hosted on an on-premises Windows machine without Azure Arc, you can connect the machine to Azure by either:
68+
1. In the Resource types selection window, toggle the **SQL servers on machines** plan to **On**.
7569

76-
- **Deploy Azure Arc** - You can connect any Windows machine to Defender for Cloud. However, Azure Arc provides deeper integration across *all* of your Azure environment. If you set up Azure Arc, you see the **SQL Server – Azure Arc** page in the portal and your security alerts appear on a dedicated **Security** tab on that page. So the first and recommended option is to [set up Azure Arc on the host](../azure-arc/servers/onboard-portal.md#install-and-validate-the-agent-on-windows) and follow the instructions for **SQL Server on Azure Arc**.
70+
1. Select **Continue**.
7771

78-
- **Connect the Windows machine without Azure Arc** - If you choose to connect a SQL Server running on a Windows machine without using Azure Arc, follow the instructions in [Connect Windows machines to Azure Monitor](../azure-monitor/agents/agent-windows.md).
72+
1. Select **Save**.
7973

80-
### Enable the optional plan in Defender for Cloud's environment settings page
74+
1. **(Optional)** Configure advanced autoprovisioning settings:
8175

82-
1. From Defender for Cloud's menu, open the **Environment settings** page.
76+
1. Navigate to the **Environment settings** page.
8377

84-
- If you're using **Microsoft Defender for Cloud's default workspace** (named “default workspace-\<your subscription ID>-\<region>”), select the relevant **subscription**.
78+
1. Select **Settings & monitoring**.
8579

86-
- If you're using **a non-default workspace**, select the relevant **workspace** (enter the workspace's name in the filter if necessary).
80+
- For customer using the current generally available autoprovisioning process, select **Edit configuration** for the **Log Analytics agent/Azure Monitor agent** component.
8781

88-
1. Set the option for **SQL servers on machines** plan to **On**.
82+
- For customer using the preview of the autoprovisioning process, select **Edit configuration** for the **Azure Monitoring Agent for SQL server on machines (Preview)** component.
8983

90-
:::image type="content" source="./media/security-center-advanced-iaas-data/sql-servers-on-vms-in-pricing-small.png" alt-text="Screenshot of Microsoft Defender for Cloud's 'Defender plans' page with optional plans.":::
91-
92-
The plan is enabled on all SQL servers connected to the selected workspace. The protection will be fully active after the first restart of the SQL Server instance.
84+
## Explore and investigate security alerts
9385

94-
>[!TIP]
95-
> To create a new workspace, follow the instructions in [Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md).
86+
There are several ways to view Microsoft Defender for SQL alerts in Microsoft Defender for Cloud:
9687

97-
1. Optionally, configure email notification for security alerts.
88+
- The Alerts page.
9889

99-
You can set a list of recipients to receive an email notification when Defenders for Cloud alerts are generated. The email contains a direct link to the alert in Microsoft Defender for Cloud with all the relevant details. For more information, see [Set up email notifications for security alerts](configure-email-notifications.md).
90+
- The machine's security page.
10091

101-
## Microsoft Defender for SQL alerts
92+
- The [workload protections dashboard](workload-protections-dashboard.md).
10293

103-
Alerts are generated by unusual and potentially harmful attempts to access or exploit SQL machines. These events can trigger alerts shown in the [alerts reference page](alerts-reference.md#alerts-sql-db-and-warehouse).
94+
- Through the direct link provided in the alert's email.
10495

105-
## Explore and investigate security alerts
96+
**To view alerts**:
10697

107-
Microsoft Defender for SQL alerts are available in:
98+
1. Sign in to the [Azure portal](https://portal.azure.com).
10899

109-
- The Defender for Cloud's security alerts page
110-
- The machine's security page
111-
- The [workload protections dashboard](workload-protections-dashboard.md)
112-
- Through the direct link in the alert emails
100+
1. Search for and select **Microsoft Defender for Cloud**.
113101

114-
To view alerts:
102+
1. Select **Security alerts**.
115103

116-
1. Select **Security alerts** from Defender for Cloud's menu and select an alert.
104+
1. Select an alert.
117105

118-
1. Alerts are designed to be self-contained, with detailed remediation steps and investigation information in each one. You can investigate further by using other Microsoft Defender for Cloud and Microsoft Sentinel capabilities for a broader view:
106+
Alerts are designed to be self-contained, with detailed remediation steps and investigation information in each one. You can investigate further by using other Microsoft Defender for Cloud and Microsoft Sentinel capabilities for a broader view:
119107

120-
- Enable SQL Server's auditing feature for further investigations. If you're a Microsoft Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?preserve-view=true&view=sql-server-ver15).
121-
122-
- To improve your security posture, use Defender for Cloud's recommendations for the host machine indicated in each alert to reduce the risks of future attacks.
108+
- Enable SQL Server's auditing feature for further investigations. If you're a Microsoft Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?preserve-view=true&view=sql-server-ver15).
123109

110+
- To improve your security posture, use Defender for Cloud's recommendations for the host machine indicated in each alert to reduce the risks of future attacks.
111+
124112
[Learn more about managing and responding to alerts](managing-and-responding-alerts.md).
125113

126114
## Next steps
127115

128116
For related information, see these resources:
129-
130117
- [How Microsoft Defender for Azure SQL can protect SQL servers anywhere](https://www.youtube.com/watch?v=V7RdB6RSVpc).
131118
- [Security alerts for SQL Database and Azure Synapse Analytics](alerts-reference.md#alerts-sql-db-and-warehouse)
132119
- [Set up email notifications for security alerts](configure-email-notifications.md)
202 KB
Loading
51.7 KB
Loading
18.3 KB
Loading

0 commit comments

Comments
 (0)