Skip to content

Commit ad93eca

Browse files
committed
finished article and added to TOC
1 parent 5b53054 commit ad93eca

File tree

2 files changed

+41
-5
lines changed

2 files changed

+41
-5
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -822,6 +822,9 @@
822822
- name: Enable Defender for SQL servers on machines
823823
href: defender-for-sql-usage.md
824824
displayName: hybrid, arc, Azure Defender
825+
- name: Enable Defender for SQL servers on machines at scale
826+
displayName: SQL, enable, scale, Defender, machines, SQL server, SQL servers
827+
href: enable-defender-sql-at-scale.md
825828
- name: Migrate to SQL server-targeted Azure Monitoring Agent's autoprovisioning
826829
process
827830
href: defender-for-sql-autoprovisioning.md

articles/defender-for-cloud/enable-defender-sql-at-scale.md

Lines changed: 38 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ ms.topic: how-to
55
ms.author: dacurwin
66
author: dcurwin
77
ms.date: 07/14/2024
8+
#customer intent: As a user, I want to learn how to enable Defender for SQL servers at scale so that I can protect my SQL servers efficiently.
89
---
910

1011
# Enable Microsoft Defender for SQL servers on machines at scale
@@ -45,9 +46,9 @@ This page explains how you can enable the auto-provisioning process for Defender
4546

4647
- Permissions: requires VM contributor, contributor or owner rules.
4748

48-
## Run the Powershell script
49+
## Powershell script parameters and samples
4950

50-
The Powershell script that enables Microsoft Defender for SQL on Machines on a given subscription.
51+
The Powershell script that enables Microsoft Defender for SQL on Machines on a given subscription has several parameters that you can customize to fit your needs. The following table lists the parameters and their descriptions:
5152

5253
| Parameter name | Required | Description |
5354
|--|--|--|
@@ -57,8 +58,40 @@ The Powershell script that enables Microsoft Defender for SQL on Machines on a g
5758
| DataCollectionRuleResourceId | Optional | The resource ID of the data collection rule, if you want to use a custom DCR instead of the default one. |
5859
| UserAssignedIdentityResourceId | Optional | The resource ID of the user assigned identity, if you want to use a custom user assigned identity instead of the default one. |
5960

61+
The following is a sample script for when you use a default Log Analytics workspace, data collection rule and managed identity.
62+
63+
```powershell
64+
Write-Host "------ Enable Defender for SQL on Machines example ------"
65+
$SubscriptionId = "<SubscriptionID>"
66+
.\EnableDefenderForSqlOnMachines.ps1 -SubscriptionId $SubscriptionId -RegisterSqlVmAgnet $RegisterSqlVmAgnet
67+
```
68+
69+
The following is a sample script for when you use a custom Log Analytics workspace, data collection rule and managed identity.
70+
71+
```powershell
72+
Write-Host "------ Enable Defender for SQL on Machines example ------"
73+
$SubscriptionId = "<SubscriptionID>"
74+
$RegisterSqlVmAgnet = "false"
75+
$WorkspaceResourceId = "/subscriptions/<SubscriptionID>/resourceGroups/someResourceGroup/providers/Microsoft.OperationalInsights/workspaces/someWorkspace"
76+
$DataCollectionRuleResourceId = "/subscriptions/<SubscriptionID>/resourceGroups/someOtherResourceGroup/providers/Microsoft.Insights/dataCollectionRules/someDcr"
77+
$UserAssignedIdentityResourceId = "/subscriptions/<SubscriptionID>/resourceGroups/someElseResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/someManagedIdentity"
78+
.\EnableDefenderForSqlOnMachines.ps1 -SubscriptionId $SubscriptionId -RegisterSqlVmAgnet $RegisterSqlVmAgnet -WorkspaceResourceId $WorkspaceResourceId -DataCollectionRuleResourceId $DataCollectionRuleResourceId -UserAssignedIdentityResourceId $UserAssignedIdentityResourceId
79+
```
80+
81+
## Enable Defender for SQL servers on machines at scale
82+
83+
6084
1. Open a Powershell window.
61-
1.
62-
1.
6385

64-
```powershell
86+
1. Copy the [EnableDefenderForSqlOnMachines.ps1](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/fd04330a79a4bcd48424bf7a4058f44216bc40e4/Powershell%20scripts/Enable%20Defender%20for%20SQL%20servers%20on%20machines/EnableDefenderForSqlOnMachines.ps1) script.
87+
88+
1. Paste the script into Powershell.
89+
90+
1. Enter parameter information as needed.
91+
92+
1. Run the script.
93+
94+
## Next step
95+
96+
> [!div class="nextstepaction"]
97+
> [Scan your SQL servers for vulnerabilities](defender-for-sql-on-machines-vulnerability-assessment.md)

0 commit comments

Comments
 (0)