Skip to content

Commit fb485cb

Browse files
author
Hamza Aqel
committed
defender1
1 parent 4cacb1a commit fb485cb

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/postgresql/flexible-server/concepts-security.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ These alerts appear in Defender for Cloud's security alerts page and include:
5757
* Options for continuing your investigations with Microsoft Sentinel
5858

5959
> [!NOTE]
60-
> Microsoft Defender for Azure Database for PostgreSQL - Flexible Server currently has following limitations:
60+
> Microsoft Defender for Azure Database for PostgreSQL - Flexible Server currently has following limitation:
6161
> - No Azure CLI or PowerShell support.
62-
> - No ability to enable Cloud Defender for Azure Database for PostgreSQL - Flexible Server on subscription level.
62+
6363

6464
### Microsoft Defender for Cloud and Brute Force Attacks
6565

@@ -75,6 +75,9 @@ To get alerts from the Microsoft Defender plan you'll first need to **enable it*
7575
:::image type="content" source="./media/concepts-security/defender-for-cloud-azure-portal-postgresql.png" alt-text="Screenshot of Azure portal showing how to enable Cloud Defender.":::
7676

7777

78+
> [!NOTE]
79+
> If you have the "open-source relational databases" feature enabled in your Microsoft Defender plan, you will observe that Microsoft Defender is automatically enabled by default for your Azure Database for PostgreSQL flexible server resource.
80+
7881
## Access management
7982

8083
The best way to manage Azure Database for PostgreSQL - Flexible Server database access permissions at scale is using the concept of [roles](https://www.postgresql.org/docs/current/user-manag.html). A role can be either a database user or a group of database users. Roles can own the database objects and assign privileges on those objects to other roles to control who has access to which objects. It is also possible to grant membership in a role to another role, thus allowing the member role to use privileges assigned to another role.

0 commit comments

Comments
 (0)