You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-sql-introduction.md
+23-4Lines changed: 23 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,22 @@
1
1
---
2
2
title: Microsoft Defender for SQL - the benefits and features
3
3
description: Learn about the benefits and features of Microsoft Defender for SQL.
4
-
ms.date: 01/06/2022
4
+
ms.date: 06/01/2022
5
5
ms.topic: overview
6
-
ms.author: benmansheim
7
-
author: bmansheim
8
6
ms.custom: references_regions
9
7
---
10
8
11
9
# Introduction to Microsoft Defender for SQL
12
10
13
-
Microsoft Defender for SQL includes two Microsoft Defender plans that extend Microsoft Defender for Cloud's [data security package](/azure/azure-sql/database/azure-defender-for-sql) to secure your databases and their data wherever they're located. Microsoft Defender for SQL includes functionalities for discovering and mitigating potential database vulnerabilities, and detecting anomalous activities that could indicate a threat to your databases.
11
+
Microsoft Defender for SQL includes two Microsoft Defender plans that extend Microsoft Defender for Cloud's [data security package](/azure/azure-sql/database/azure-defender-for-sql) to protect your SQL estate regardless of where it is located (Azure, multi-cloud or Hybrid environments). Microsoft Defender for SQL includes functions that can be used to discover and mitigate potential database vulnerabilities. Defender for SQL can also detect anomalous activities that may be an indication of a threat to your databases.
12
+
13
+
To protect SQL databases in hybrid and multi-cloud environments, Defender for Cloud uses Azure Arc. Azure ARC connects your hybrid and multi-cloud machines. You can check out the following articles for more information:
14
+
15
+
-[Connect your non-Azure machines to Microsoft Defender for Cloud](quickstart-onboard-machines.md)
16
+
17
+
-[Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
18
+
19
+
-[Connect your GCP project to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
14
20
15
21
## Availability
16
22
@@ -27,15 +33,28 @@ Microsoft Defender for SQL includes two Microsoft Defender plans that extend Mic
27
33
**Microsoft Defender for SQL** comprises two separate Microsoft Defender plans:
28
34
29
35
-**Microsoft Defender for Azure SQL database servers** protects:
-[Dedicated SQL pool in Azure Synapse](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md)
33
42
34
43
-**Microsoft Defender for SQL servers on machines** extends the protections for your Azure-native SQL Servers to fully support hybrid environments and protect SQL servers (all supported version) hosted in Azure, other cloud environments, and even on-premises machines:
44
+
35
45
-[SQL Server on Virtual Machines](https://azure.microsoft.com/services/virtual-machines/sql-server/)
46
+
36
47
- On-premises SQL servers:
48
+
37
49
-[Azure Arc-enabled SQL Server (preview)](/sql/sql-server/azure-arc/overview)
50
+
38
51
-[SQL Server running on Windows machines without Azure Arc](../azure-monitor/agents/agent-windows.md)
52
+
53
+
- Multi-cloud SQL servers:
54
+
55
+
-[Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
56
+
57
+
-[Connect your GCP project to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
39
58
40
59
When you enable either of these plans, all supported resources that exist within the subscription are protected. Future resources created on the same subscription will also be protected.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-aws.md
+27-4Lines changed: 27 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,8 @@
1
1
---
2
2
title: Connect your AWS account to Microsoft Defender for Cloud
3
3
description: Defend your AWS resources with Microsoft Defender for Cloud
4
-
author: bmansheim
5
-
ms.author: benmansheim
6
4
ms.topic: quickstart
7
-
ms.date: 05/17/2022
5
+
ms.date: 06/02/2022
8
6
zone_pivot_groups: connect-aws-accounts
9
7
ms.custom: mode-other
10
8
---
@@ -23,6 +21,7 @@ To protect your AWS-based resources, you can connect an account with one of two
23
21
-**Defender for Cloud's CSPM features** extend to your AWS resources. This agentless plan assesses your AWS resources according to AWS-specific security recommendations and these are included in your secure score. The resources will also be assessed for compliance with built-in standards specific to AWS (AWS CIS, AWS PCI DSS, and AWS Foundational Security Best Practices). Defender for Cloud's [asset inventory page](asset-inventory.md) is a multicloud enabled feature helping you manage your AWS resources alongside your Azure resources.
24
22
-**Microsoft Defender for Containers** brings threat detection and advanced defenses to your Amazon EKS clusters. This plan includes Kubernetes threat protection, behavioral analytics, Kubernetes best practices, admission control recommendations and more. You can view the full list of available features in [Defender for Containers feature availability](supported-machines-endpoint-solutions-clouds-containers.md).
25
23
-**Microsoft Defender for Servers** brings threat detection and advanced defenses to your Windows and Linux EC2 instances. This plan includes the integrated license for Microsoft Defender for Endpoint, security baselines and OS level assessments, vulnerability assessment scanning, adaptive application controls (AAC), file integrity monitoring (FIM), and more. You can view the full list of available features in the [feature availability table](supported-machines-endpoint-solutions-clouds-servers.md?tabs=tab/features-multicloud).
24
+
-**Microsoft Defender for SQL** brings threat detection and advanced defenses to your SQL Servers running on AWS EC2, AWS RDS Custom for SQL Server. This plan includes the advanced threat protection and vulnerability assessment scanning. You can view the [full list of available features](defender-for-sql-introduction.md).
26
25
27
26
For a reference list of all the recommendations Defender for Cloud can provide for AWS resources, see [Security recommendations for AWS resources - a reference guide](recommendations-reference-aws.md).
28
27
@@ -38,7 +37,7 @@ This screenshot shows AWS accounts displayed in Defender for Cloud's [overview d
38
37
|Aspect|Details|
39
38
|----|:----|
40
39
|Release state:|General Availability (GA)|
41
-
|Pricing:|The **CSPM plan** is free.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan for AWS is billed at the same price as for Azure resources.<br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
40
+
|Pricing:|The **CSPM plan** is free.<br>The **[Defender for SQL](defender-for-sql-introduction.md)** plan is billed at the same price as Azure resources.<br>The **[Defender for Containers](defender-for-containers-introduction.md)** plan is free during the preview. After which, it will be billed for AWS at the same price as for Azure resources.<br>For every AWS machine connected to Azure with [Azure Arc-enabled servers](../azure-arc/servers/overview.md), the **Defender for Servers** plan is billed at the same price as the [Microsoft Defender for Servers](defender-for-servers-introduction.md) plan for Azure machines. If an AWS EC2 doesn't have the Azure Arc agent deployed, you won't be charged for that machine.|
42
41
|Required roles and permissions:|**Contributor** permission for the relevant Azure subscription. <br> **Administrator** on the AWS account.|
43
42
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet)|
44
43
@@ -51,6 +50,26 @@ This screenshot shows AWS accounts displayed in Defender for Cloud's [overview d
51
50
- At least one Amazon EKS cluster with permission to access to the EKS K8s API server. If you need to create a new EKS cluster, follow the instructions in [Getting started with Amazon EKS – eksctl](https://docs.aws.amazon.com/eks/latest/userguide/getting-started-eksctl.html).
52
51
- The resource capacity to create a new SQS queue, Kinesis Fire Hose delivery stream, and S3 bucket in the cluster's region.
53
52
53
+
-**To enable the Defender for SQL plan**, you'll need:
54
+
55
+
- Microsoft Defender for SQL enabled on your subscription. Learn how to [enable protection on all of your databases](quickstart-enable-database-protections.md).
56
+
57
+
- An active AWS account, with EC2 instances running SQL server or RDS Custom for SQL Server.
58
+
59
+
- Azure Arc for servers installed on your EC2 instances/RDS Custom for SQL Server.
60
+
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
61
+
62
+
Auto provisioning is managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent pre-installed. If you already have the SSM agent pre-installed, the AMI's are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you will need to install it using either of the following relevant instructions from Amazon:
63
+
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
64
+
65
+
> [!NOTE]
66
+
> To enable the Azure Arc auto-provisioning, you'll need **Owner** permission on the relevant Azure subscription.
67
+
68
+
- Additional extensions should be enabled on the Arc-connected machines.
69
+
- Log Analytics (LA) agent on Arc machines, and ensure the selected workspace has security solution installed. The LA agent is currently configured in the subscription level. All of your multicloud AWS accounts and GCP projects under the same subscription will inherit the subscription settings.
70
+
71
+
Learn how to [configure auto-provisioning on your subscription](enable-data-collection.md#configure-auto-provisioning-for-agents-and-extensions-from-microsoft-defender-for-cloud).
72
+
54
73
-**To enable the Defender for Servers plan**, you'll need:
55
74
56
75
- Microsoft Defender for Servers enabled on your subscription. Learn how to enable plans in [Enable enhanced security features](enable-enhanced-security.md).
@@ -141,6 +160,10 @@ If you have any existing connectors created with the classic cloud connectors ex
141
160
142
161
- (Optional) Select **Configure**, to edit the configuration as required. If you choose to disable this configuration, the `Threat detection (control plane)` feature will be disabled. Learn more about the [feature availability](supported-machines-endpoint-solutions-clouds-containers.md).
143
162
163
+
1. By default the **Databases** plan is set to **On**. This is necessary to extend Defender for SQL's coverage to your AWS EC2 and RDS Custom for SQL Server.
164
+
165
+
- (Optional) Select **Configure**, to edit the configuration as required. We recommend you leave it set to the default configuration.
0 commit comments