Skip to content

Commit 66c4fcd

Browse files
authored
Merge pull request #120263 from HamzaAqel/defender1
defender1
2 parents 2b45873 + d7f5a1f commit 66c4fcd

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/postgresql/flexible-server/concepts-security.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ These alerts appear in Defender for Cloud's security alerts page and include:
5555
- Recommended actions for how to investigate and mitigate the threat
5656
- Options for continuing your investigations with Microsoft Sentinel
5757

58-
59-
6058
### Microsoft Defender for Cloud and Brute Force Attacks
6159

6260
A brute force attack is among the most common and fairly successful hacking methods, despite being least sophisticated hacking methods. The theory behind such an attack is that if you take an infinite number of attempts to guess a password, you're bound to be right eventually. When Microsoft Defender for Cloud detects a brute force attack, it triggers an [alert](../../defender-for-cloud/defender-for-databases-introduction.md#what-kind-of-alerts-does-microsoft-defender-for-open-source-relational-databases-provide) to bring you awareness that a brute force attack took place. It also can separate simple brute force attack from brute force attack on a valid user or a successful brute force attack.
@@ -71,6 +69,9 @@ To get alerts from the Microsoft Defender plan, you'll first need to **enable it
7169

7270
:::image type="content" source="media/concepts-security/defender-for-cloud-azure-portal-postgresql.png" alt-text="Screenshot of Azure portal showing how to enable Cloud Defender." lightbox="media/concepts-security/defender-for-cloud-azure-portal-postgresql.png":::
7371

72+
> [!NOTE]
73+
> If you have the "open-source relational databases" feature enabled in your Microsoft Defender plan, you will observe that Microsoft Defender is automatically enabled by default for your Azure Database for PostgreSQL flexible server resource.
74+
7475
## Access management
7576

7677
The best way to manage Azure Database for PostgreSQL - Flexible Server database access permissions at scale is using the concept of [roles](https://www.postgresql.org/docs/current/user-manag.html). A role can be either a database user or a group of database users. Roles can own the database objects and assign privileges on those objects to other roles to control who has access to which objects. It's also possible to grant membership in a role to another role, thus allowing the member role to use privileges assigned to another role.

0 commit comments

Comments
 (0)