Skip to content

Commit 77e3c9a

Browse files
authored
Merge pull request #202527 from ThomasWeiss/thweiss-cosmosdb-defender-ga2
Updated product name and linked to ext doc
2 parents cd7e630 + 82d74fe commit 77e3c9a

File tree

6 files changed

+8
-61
lines changed

6 files changed

+8
-61
lines changed

articles/cosmos-db/sql/defender-for-cosmos-db.md

Lines changed: 8 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -9,86 +9,33 @@ ms.author: thweiss
99
author: ThomasWeiss
1010
---
1111

12-
# Microsoft Defender for Cosmos DB
12+
# Microsoft Defender for Azure Cosmos DB
1313
[!INCLUDE[appliesto-sql-api](../includes/appliesto-sql-api.md)]
1414

15-
Microsoft Defender for Cosmos DB provides an extra layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit Azure Cosmos DB accounts. This layer of protection allows you to address threats, even without being a security expert, and integrate them with central security monitoring systems.
15+
Microsoft Defender for Azure Cosmos DB provides an extra layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit Azure Cosmos DB accounts. This layer of protection allows you to address threats, even without being a security expert, and integrate them with central security monitoring systems.
1616

1717
Security alerts are triggered when anomalies in activity occur. These security alerts show up in [Microsoft Defender for Cloud](https://azure.microsoft.com/services/security-center/). Subscription administrators also get these alerts over email, with details of the suspicious activity and recommendations on how to investigate and remediate the threats.
1818

1919
> [!NOTE]
2020
>
21-
> * Microsoft Defender for Cosmos DB is currently available only for the Core (SQL) API.
22-
> * Microsoft Defender for Cosmos DB is not currently available in Azure government and sovereign cloud regions.
21+
> * Microsoft Defender for Azure Cosmos DB is currently available only for the Core (SQL) API.
22+
> * Microsoft Defender for Azure Cosmos DB is not currently available in Azure government and sovereign cloud regions.
2323
2424
For a full investigation experience of the security alerts, we recommended enabling [diagnostic logging in Azure Cosmos DB](../monitor-cosmos-db.md), which logs operations on the database itself, including CRUD operations on all documents, containers, and databases.
2525

2626
## Threat types
2727

28-
Microsoft Defender for Cosmos DB detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. It can currently trigger the following alerts:
28+
Microsoft Defender for Azure Cosmos DB detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. It can currently trigger the following alerts:
2929

3030
- **Potential SQL injection attacks**: Due to the structure and capabilities of Azure Cosmos DB queries, many known SQL injection attacks can’t work in Azure Cosmos DB. However, there are some variations of SQL injections that can succeed and may result in exfiltrating data from your Azure Cosmos DB accounts. Defender for Azure Cosmos DB detects both successful and failed attempts, and helps you harden your environment to prevent these threats.
3131

3232
- **Anomalous database access patterns**: For example, access from a TOR exit node, known suspicious IP addresses, unusual applications, and unusual locations.
3333

3434
- **Suspicious database activity**: For example, suspicious key-listing patterns that resemble known malicious lateral movement techniques and suspicious data extraction patterns.
3535

36-
## Configure Microsoft Defender for Cosmos DB
36+
## Configure Microsoft Defender for Azure Cosmos DB
3737

38-
You can configure Microsoft Defender protection in any of several ways, described in the following sections.
39-
40-
# [Portal](#tab/azure-portal)
41-
42-
1. Launch the Azure portal at [https://portal.azure.com](https://portal.azure.com/).
43-
44-
2. From the Azure Cosmos DB account, from the **Settings** menu, select **Microsoft Defender for Cloud**.
45-
46-
:::image type="content" source="./media/defender-for-cosmos-db/cosmos-db-atp.png" alt-text="Set up Azure Defender for Cosmos DB" border="true":::
47-
48-
3. In the **Microsoft Defender for Cloud** configuration blade:
49-
50-
* Change the option from **OFF** to **ON**.
51-
* Click **Save**.
52-
53-
# [REST API](#tab/rest-api)
54-
55-
Use REST API commands to create, update, or get the Azure Defender setting for a specific Azure Cosmos DB account.
56-
57-
* [Advanced Threat Protection - Create](/rest/api/securitycenter/advancedthreatprotection/create)
58-
* [Advanced Threat Protection - Get](/rest/api/securitycenter/advancedthreatprotection/get)
59-
60-
# [PowerShell](#tab/azure-powershell)
61-
62-
Use the following PowerShell cmdlets:
63-
64-
* [Enable Advanced Threat Protection](/powershell/module/az.security/enable-azsecurityadvancedthreatprotection)
65-
* [Get Advanced Threat Protection](/powershell/module/az.security/get-azsecurityadvancedthreatprotection)
66-
* [Disable Advanced Threat Protection](/powershell/module/az.security/disable-azsecurityadvancedthreatprotection)
67-
68-
# [ARM template](#tab/arm-template)
69-
70-
Use an Azure Resource Manager (ARM) template to set up Azure Cosmos DB with Azure Defender protection enabled. For more information, see
71-
[Create a Cosmos DB Account with Advanced Threat Protection](https://azure.microsoft.com/resources/templates/microsoft-defender-cosmosdb-create-account/).
72-
73-
# [Azure Policy](#tab/azure-policy)
74-
75-
Use an Azure Policy to enable Azure Defender for Cosmos DB.
76-
77-
1. Launch the Azure **Policy - Definitions** page, and search for the **Deploy Advanced Threat Protection for Cosmos DB** policy.
78-
79-
:::image type="content" source="./media/defender-for-cosmos-db/cosmos-db.png" alt-text="Search Policy":::
80-
81-
1. Click on the **Deploy Advanced Threat Protection for CosmosDB** policy, and then click **Assign**.
82-
83-
:::image type="content" source="./media/defender-for-cosmos-db/cosmos-db-atp-policy.png" alt-text="Select Subscription Or Group":::
84-
85-
1. From the **Scope** field, click the three dots, select an Azure subscription or resource group, and then click **Select**.
86-
87-
:::image type="content" source="./media/defender-for-cosmos-db/cosmos-db-atp-details.png" alt-text="Policy Definitions Page":::
88-
89-
1. Enter the other parameters, and click **Assign**.
90-
91-
---
38+
See [Enable Microsoft Defender for Azure Cosmos DB](../../defender-for-cloud/defender-for-databases-enable-cosmos-protections.md).
9239

9340
## Manage security alerts
9441

@@ -102,5 +49,5 @@ When Azure Cosmos DB activity anomalies occur, a security alert is triggered wit
10249

10350
## Next steps
10451

105-
* Learn more about [Microsoft Defender for Cosmos DB](../../defender-for-cloud/concept-defender-for-cosmos.md)
52+
* Learn more about [Microsoft Defender for Azure Cosmos DB](../../defender-for-cloud/concept-defender-for-cosmos.md)
10653
* Learn more about [Diagnostic logging in Azure Cosmos DB](../cosmosdb-monitor-resource-logs.md)
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

0 commit comments

Comments
 (0)