Skip to content

Commit cba2d9d

Browse files
Merge pull request #247740 from dcurwin/wi-45810-enable-cosmosdb-aug9-2023
Add tabs to Cosmos DB article
2 parents 6669108 + 783e82a commit cba2d9d

File tree

4 files changed

+56
-18
lines changed

4 files changed

+56
-18
lines changed

articles/defender-for-cloud/defender-for-databases-enable-cosmos-protections.md

Lines changed: 56 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dcurwin
55
ms.author: dacurwin
66
ms.topic: how-to
77
ms.custom: ignite-2022
8-
ms.date: 11/28/2022
8+
ms.date: 08/09/2023
99
---
1010

1111
# Enable Microsoft Defender for Azure Cosmos DB
@@ -18,27 +18,27 @@ ms.date: 11/28/2022
1818

1919
## Enable database protection at the subscription level
2020

21-
The subscription level enablement, enables Microsoft Defender for Cloud protection for all database types in your subscription (recommended).
21+
The subscription level enablement enables Microsoft Defender for Cloud protection for all database types in your subscription (recommended).
22+
23+
You can enable Microsoft Defender for Cloud protection on your subscription in order to protect all database types, for example, Azure Cosmos DB, Azure SQL Database, Azure SQL servers on machines, and OSS RDBs. You can also select specific resource types to protect when you configure your plan.
2224

23-
You can enable Microsoft Defender for Cloud protection on your subscription in order to protect all database types, for example, Azure Cosmos DB, Azure SQL Database, Azure SQL servers on machines, and OSS RDBs. You can also select specific resource types to protect when you configure your plan.
24-
2525
When you enable Microsoft Defender for Cloud's enhanced security features on your subscription, Microsoft Defender for Azure Cosmos DB is automatically enabled for all of your Azure Cosmos DB accounts.
2626

2727
**To enable database protection at the subscription level**:
2828

2929
1. Sign in to the [Azure portal](https://portal.azure.com/).
3030

31-
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
31+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
3232

33-
1. Select the relevant subscription.
33+
1. Select the relevant subscription.
3434

3535
1. Locate Databases and toggle the switch to **On**.
3636

3737
:::image type="content" source="media/quickstart-enable-defender-for-cosmos/protection-type.png" alt-text="Screenshot showing the available protections you can enable." lightbox="media/quickstart-enable-defender-for-cosmos/protection-type-expanded.png":::
3838

3939
1. Select **Save**.
4040

41-
**To select specific resource types to protect when you configure your plan**:
41+
**To select specific resource types to protect when you configure your plan**:
4242

4343
1. Follow steps 1 - 4 above.
4444

@@ -54,7 +54,7 @@ When you enable Microsoft Defender for Cloud's enhanced security features on you
5454

5555
## Enable Microsoft Defender for Azure Cosmos DB at the resource level
5656

57-
You can enable Microsoft Defender for Cloud on a specific Azure Cosmos DB account through the Azure portal, PowerShell, or the Azure CLI.
57+
You can enable Microsoft Defender for Cloud on a specific Azure Cosmos DB account through the Azure portal, PowerShell, Azure CLI, ARM template, or Azure Policy.
5858

5959
**To enable Microsoft Defender for Cloud for a specific Azure Cosmos DB account**:
6060

@@ -80,7 +80,7 @@ You can enable Microsoft Defender for Cloud on a specific Azure Cosmos DB accoun
8080
Enable-AzSecurityAdvancedThreatProtection -ResourceId "/subscriptions/<Your subscription ID>/resourceGroups/myResourceGroup/providers/Microsoft.DocumentDb/databaseAccounts/myCosmosDBAccount/"
8181
```
8282
83-
1. Verify the Microsoft Defender for Azure Cosmos DB setting for your storage account through the PowerShell call [Get-AzSecurityAdvancedThreatProtection](/powershell/module/az.security/get-azsecurityadvancedthreatprotection) command.
83+
1. Verify the Microsoft Defender for Azure Cosmos DB setting for your storage account through the PowerShell call [Get-AzSecurityAdvancedThreatProtection](/powershell/module/az.security/get-azsecurityadvancedthreatprotection) command.
8484
8585
```powershell
8686
Get-AzSecurityAdvancedThreatProtection -ResourceId "/subscriptions/<Your subscription ID>/resourceGroups/myResourceGroup/providers/Microsoft.DocumentDb/databaseAccounts/myCosmosDBAccount/"
@@ -90,33 +90,71 @@ You can enable Microsoft Defender for Cloud on a specific Azure Cosmos DB accoun
9090
9191
Use an Azure Resource Manager template to deploy an Azure Cosmos DB account with Microsoft Defender for Azure Cosmos DB enabled. For more information, see [Create an Azure Cosmos DB account with Microsoft Defender for Azure Cosmos DB enabled](https://github.com/azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.documentdb/microsoft-defender-cosmosdb-create-account).
9292
93+
### [Azure CLI](#tab/azure-cli)
94+
95+
To enable Microsoft Defender for Azure Cosmos DB on a single account via Azure CLI, call the [az security atp cosmosdb update](/cli/azure/security/atp/cosmosdb) command. Remember to replace values in angle brackets with your own values:
96+
97+
```azurecli
98+
az security atp cosmosdb update \
99+
--resource-group <resource-group> \
100+
--cosmosdb-account <cosmosdb-account> \
101+
--is-enabled true
102+
```
103+
104+
To check the Microsoft Defender for Azure Cosmos DB setting for a single account via Azure CLI, call the [az security atp cosmosdb show](/cli/azure/security/atp/cosmosdb) command. Remember to replace values in angle brackets with your own values:
105+
106+
```azurecli
107+
az security atp cosmosdb show \
108+
--resource-group <resource-group> \
109+
--cosmosdb-account <cosmosdb-account>
110+
```
111+
112+
### [Azure Policy](#tab/azure-policy)
113+
114+
Use an Azure Policy to enable Microsoft Defender for Cloud across storage accounts under a specific subscription or resource group.
115+
116+
1. Launch the Azure Policy > Definitions page.
117+
1. Search for the **Configure Microsoft Defender for Azure Cosmos DB to be enabled** policy, then select the policy to view the policy definition page.
118+
119+
:::image type="content" source="media/defender-for-databases-enable-cosmos-protections/select-policy.png" alt-text="Screenshot of selecting the policy.":::
120+
121+
1. Select the **Assign button** for the built-in policy.
122+
123+
:::image type="content" source="media/defender-for-databases-enable-cosmos-protections/select-assign-button.png" alt-text="Screenshot of selecting the assign button.":::
124+
125+
1. Specify an Azure subscription.
126+
127+
:::image type="content" source="media/defender-for-databases-enable-cosmos-protections/choose-subscription.png" alt-text="Screenshot of choosing Azure subscription.":::
128+
129+
1. Select **Review + create** to review the policy assignment and complete it.
130+
93131
---
94132

95133
## Simulate security alerts from Microsoft Defender for Azure Cosmos DB
96134

97-
A full list of [supported alerts](alerts-reference.md) is available in the reference table of all Defender for Cloud security alerts.
135+
A full list of [supported alerts](alerts-reference.md#alerts-azurecosmos) is available in the reference table of all Defender for Cloud security alerts.
98136

99-
You can use sample Microsoft Defender for Azure Cosmos DB alerts to evaluate their value, and capabilities. Sample alerts will also validate any configurations you've made for your security alerts (such as SIEM integrations, workflow automation, and email notifications).
137+
You can use sample Microsoft Defender for Azure Cosmos DB alerts to evaluate their value, and capabilities. Sample alerts will also validate any configurations you've made for your security alerts (such as SIEM integrations, workflow automation, and email notifications).
100138

101-
**To create sample alerts from Microsoft Defender for Azure Cosmos DB**:
139+
**To create sample alerts from Microsoft Defender for Azure Cosmos DB**:
102140

103141
1. Sign in to the [Azure portal](https://portal.azure.com/) as a Subscription Contributor user.
104142

105-
1. Navigate to the security alerts page.
143+
1. Navigate to the security alerts page.
106144

107-
1. Select **Sample alerts**.
145+
1. Select **Sample alerts**.
108146

109-
1. Select the subscription.
147+
1. Select the subscription.
110148

111-
1. Select the relevant Microsoft Defender plan(s).
149+
1. Select the relevant Microsoft Defender plan(s).
112150

113151
1. Select **Create sample alerts**.
114152

115153
:::image type="content" source="media/quickstart-enable-defender-for-cosmos/sample-alerts.png" alt-text="Screenshot showing the order needed to create an alert.":::
116154

117-
After a few minutes, the alerts will appear in the security alerts page. Alerts will also appear anywhere that you've configured to receive your Microsoft Defender for Cloud security alerts. For example, connected SIEMs, and email notifications.
155+
After a few minutes, the alerts will appear in the security alerts page. Alerts will also appear anywhere that you've configured to receive your Microsoft Defender for Cloud security alerts. For example, connected SIEMs, and email notifications.
118156

119-
## Next Steps
157+
## Next steps
120158

121159
In this article, you learned how to enable Microsoft Defender for Azure Cosmos DB, and how to simulate security alerts.
122160

55.4 KB
Loading
34.5 KB
Loading
32.9 KB
Loading

0 commit comments

Comments
 (0)