Skip to content

Commit b572b6d

Browse files
authored
Merge pull request #199939 from ElazarK/defender-for-sql
SQL
2 parents 2b33c6b + 46158d7 commit b572b6d

File tree

4 files changed

+105
-16
lines changed

4 files changed

+105
-16
lines changed

articles/defender-for-cloud/defender-for-sql-introduction.md

Lines changed: 23 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,22 @@
11
---
22
title: Microsoft Defender for SQL - the benefits and features
33
description: Learn about the benefits and features of Microsoft Defender for SQL.
4-
ms.date: 01/06/2022
4+
ms.date: 06/01/2022
55
ms.topic: overview
6-
ms.author: benmansheim
7-
author: bmansheim
86
ms.custom: references_regions
97
---
108

119
# Introduction to Microsoft Defender for SQL
1210

13-
Microsoft Defender for SQL includes two Microsoft Defender plans that extend Microsoft Defender for Cloud's [data security package](/azure/azure-sql/database/azure-defender-for-sql) to secure your databases and their data wherever they're located. Microsoft Defender for SQL includes functionalities for discovering and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your databases.
11+
Microsoft Defender for SQL includes two Microsoft Defender plans that extend Microsoft Defender for Cloud's [data security package](/azure/azure-sql/database/azure-defender-for-sql) to protect your SQL estate regardless of where it is located (Azure, multi-cloud or Hybrid environments). Microsoft Defender for SQL includes functions that can be used to discover and mitigate potential database vulnerabilities. Defender for SQL can also detect anomalous activities that may be an indication of a threat to your databases.
12+
13+
To protect SQL databases in hybrid and multi-cloud environments, Defender for Cloud uses Azure Arc. Azure ARC connects your hybrid and multi-cloud machines. You can check out the following articles for more information:
14+
15+
- [Connect your non-Azure machines to Microsoft Defender for Cloud](quickstart-onboard-machines.md)
16+
17+
- [Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
18+
19+
- [Connect your GCP project to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
1420

1521
## Availability
1622

@@ -27,15 +33,28 @@ Microsoft Defender for SQL includes two Microsoft Defender plans that extend Mic
2733
**Microsoft Defender for SQL** comprises two separate Microsoft Defender plans:
2834

2935
- **Microsoft Defender for Azure SQL database servers** protects:
36+
3037
- [Azure SQL Database](/azure/azure-sql/database/sql-database-paas-overview)
38+
3139
- [Azure SQL Managed Instance](/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview)
40+
3241
- [Dedicated SQL pool in Azure Synapse](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md)
3342

3443
- **Microsoft Defender for SQL servers on machines** extends the protections for your Azure-native SQL Servers to fully support hybrid environments and protect SQL servers (all supported version) hosted in Azure, other cloud environments, and even on-premises machines:
44+
3545
- [SQL Server on Virtual Machines](https://azure.microsoft.com/services/virtual-machines/sql-server/)
46+
3647
- On-premises SQL servers:
48+
3749
- [Azure Arc-enabled SQL Server (preview)](/sql/sql-server/azure-arc/overview)
50+
3851
- [SQL Server running on Windows machines without Azure Arc](../azure-monitor/agents/agent-windows.md)
52+
53+
- Multi-cloud SQL servers:
54+
55+
- [Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
56+
57+
- [Connect your GCP project to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
3958

4059
When you enable either of these plans, all supported resources that exist within the subscription are protected. Future resources created on the same subscription will also be protected.
4160

198 KB
Loading

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 27 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,8 @@
11
---
22
title: Connect your AWS account to Microsoft Defender for Cloud
33
description: Defend your AWS resources with Microsoft Defender for Cloud
4-
author: bmansheim
5-
ms.author: benmansheim
64
ms.topic: quickstart
7-
ms.date: 05/17/2022
5+
ms.date: 06/02/2022
86
zone_pivot_groups: connect-aws-accounts
97
ms.custom: mode-other
108
---
@@ -23,6 +21,7 @@ To protect your AWS-based resources, you can connect an account with one of two
2321
- **Defender for Cloud's CSPM features** extend to your AWS resources. This agentless plan assesses your AWS resources according to AWS-specific security recommendations and these are included in your secure score. The resources will also be assessed for compliance with built-in standards specific to AWS (AWS CIS, AWS PCI DSS, and AWS Foundational Security Best Practices). Defender for Cloud's [asset inventory page](asset-inventory.md) is a multicloud enabled feature helping you manage your AWS resources alongside your Azure resources.
2422
- **Microsoft Defender for Containers** brings threat detection and advanced defenses to your Amazon EKS clusters. This plan includes Kubernetes threat protection, behavioral analytics, Kubernetes best practices, admission control recommendations and more. You can view the full list of available features in [Defender for Containers feature availability](supported-machines-endpoint-solutions-clouds-containers.md).
2523
- **Microsoft Defender for Servers** brings threat detection and advanced defenses to your Windows and Linux EC2 instances. This plan includes the integrated license for Microsoft Defender for Endpoint, security baselines and OS level assessments, vulnerability assessment scanning, adaptive application controls (AAC), file integrity monitoring (FIM), and more. You can view the full list of available features in the [feature availability table](supported-machines-endpoint-solutions-clouds-servers.md?tabs=tab/features-multicloud).
24+
- **Microsoft Defender for SQL** brings threat detection and advanced defenses to your SQL Servers running on AWS EC2, AWS RDS Custom for SQL Server. This plan includes the advanced threat protection and vulnerability assessment scanning. You can view the [full list of available features](defender-for-sql-introduction.md).
2625

2726
For a reference list of all the recommendations Defender for Cloud can provide for AWS resources, see [Security recommendations for AWS resources - a reference guide](recommendations-reference-aws.md).
2827

@@ -38,7 +37,7 @@ This screenshot shows AWS accounts displayed in Defender for Cloud's [overview d
3837
|Aspect|Details|
3938
|----|:----|
4039
|Release state:|General Availability (GA)|
41-
|Pricing:| The **CSPM plan** is free.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan for AWS is billed at the same price as for Azure resources. <br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
40+
|Pricing:|The **CSPM plan** is free.<br>The **[Defender for SQL](defender-for-sql-introduction.md)** plan is billed at the same price as Azure resources.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for AWS at the same price as for Azure resources.<br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
4241
|Required roles and permissions:|**Contributor** permission for the relevant Azure subscription. <br> **Administrator** on the AWS account.|
4342
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet)|
4443

@@ -51,6 +50,26 @@ This screenshot shows AWS accounts displayed in Defender for Cloud's [overview d
5150
- At least one Amazon EKS cluster with permission to access to the EKS K8s API server. If you need to create a new EKS cluster, follow the instructions in [Getting started with Amazon EKS – eksctl](https://docs.aws.amazon.com/eks/latest/userguide/getting-started-eksctl.html).
5251
- The resource capacity to create a new SQS queue, Kinesis Fire Hose delivery stream, and S3 bucket in the cluster's region.
5352

53+
- **To enable the Defender for SQL plan**, you'll need:
54+
55+
- Microsoft Defender for SQL enabled on your subscription. Learn how to [enable protection on all of your databases](quickstart-enable-database-protections.md).
56+
57+
- An active AWS account, with EC2 instances running SQL server or RDS Custom for SQL Server.
58+
59+
- Azure Arc for servers installed on your EC2 instances/RDS Custom for SQL Server.
60+
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
61+
62+
Auto provisioning is managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent pre-installed. If you already have the SSM agent pre-installed, the AMI's are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you will need to install it using either of the following relevant instructions from Amazon:
63+
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
64+
65+
> [!NOTE]
66+
> To enable the Azure Arc auto-provisioning, you'll need **Owner** permission on the relevant Azure subscription.
67+
68+
- Additional extensions should be enabled on the Arc-connected machines.
69+
- Log Analytics (LA) agent on Arc machines, and ensure the selected workspace has security solution installed. The LA agent is currently configured in the subscription level. All of your multicloud AWS accounts and GCP projects under the same subscription will inherit the subscription settings.
70+
71+
Learn how to [configure auto-provisioning on your subscription](enable-data-collection.md#configure-auto-provisioning-for-agents-and-extensions-from-microsoft-defender-for-cloud).
72+
5473
- **To enable the Defender for Servers plan**, you'll need:
5574

5675
- Microsoft Defender for Servers enabled on your subscription. Learn how to enable plans in [Enable enhanced security features](enable-enhanced-security.md).
@@ -141,6 +160,10 @@ If you have any existing connectors created with the classic cloud connectors ex
141160

142161
- (Optional) Select **Configure**, to edit the configuration as required. If you choose to disable this configuration, the `Threat detection (control plane)` feature will be disabled. Learn more about the [feature availability](supported-machines-endpoint-solutions-clouds-containers.md).
143162

163+
1. By default the **Databases** plan is set to **On**. This is necessary to extend Defender for SQL's coverage to your AWS EC2 and RDS Custom for SQL Server.
164+
165+
- (Optional) Select **Configure**, to edit the configuration as required. We recommend you leave it set to the default configuration.
166+
144167
1. Select **Next: Configure access**.
145168

146169
1. Download the CloudFormation template.

0 commit comments

Comments
 (0)