Azure Defender for App Service should be enabled |
Azure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks. |
AuditIfNotExists, Disabled |
1.0.3 |
Azure Defender for Azure SQL Database servers should be enabled |
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. |
AuditIfNotExists, Disabled |
1.0.2 |
Azure Defender for Key Vault should be enabled |
Azure Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts. |
AuditIfNotExists, Disabled |
1.0.3 |
Azure Defender for open-source relational databases should be enabled |
Azure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center |
AuditIfNotExists, Disabled |
1.0.0 |
Azure Defender for Resource Manager should be enabled |
Azure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . |
AuditIfNotExists, Disabled |
1.0.0 |
Azure Defender for servers should be enabled |
Azure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities. |
AuditIfNotExists, Disabled |
1.0.3 |
Azure Defender for SQL servers on machines should be enabled |
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. |
AuditIfNotExists, Disabled |
1.0.2 |
Azure Defender for SQL should be enabled for unprotected Azure SQL servers |
Audit SQL servers without Advanced Data Security |
AuditIfNotExists, Disabled |
2.0.1 |
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances |
Audit each SQL Managed Instance without advanced data security. |
AuditIfNotExists, Disabled |
1.0.2 |
Azure Kubernetes Service clusters should have Defender profile enabled |
Microsoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks |
Audit, Disabled |
2.0.1 |
Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management) |
Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. |
AuditIfNotExists, Disabled |
1.0.1 |
Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management) |
Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. |
AuditIfNotExists, Disabled |
1.0.1 |
Block untrusted and unsigned processes that run from USB |
CMA_0050 - Block untrusted and unsigned processes that run from USB |
Manual, Disabled |
1.1.0 |
Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL |
Configure Windows Arc-enabled SQL Servers to automatically install the Microsoft Defender for SQL agent. Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). |
DeployIfNotExists, Disabled |
1.2.0 |
Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL and DCR with a Log Analytics workspace |
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group, a Data Collection Rule and Log Analytics workspace in the same region as the machine. |
DeployIfNotExists, Disabled |
1.6.0 |
Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL and DCR with a user-defined LA workspace |
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace. |
DeployIfNotExists, Disabled |
1.8.0 |
Configure Arc-enabled SQL Servers with Data Collection Rule Association to Microsoft Defender for SQL DCR |
Configure association between Arc-enabled SQL Servers and the Microsoft Defender for SQL DCR. Deleting this association will break the detection of security vulnerabilities for this Arc-enabled SQL Servers. |
DeployIfNotExists, Disabled |
1.1.0 |
Configure Arc-enabled SQL Servers with Data Collection Rule Association to Microsoft Defender for SQL user-defined DCR |
Configure association between Arc-enabled SQL Servers and the Microsoft Defender for SQL user-defined DCR. Deleting this association will break the detection of security vulnerabilities for this Arc-enabled SQL Servers. |
DeployIfNotExists, Disabled |
1.3.0 |
Configure Azure Defender for App Service to be enabled |
Azure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks. |
DeployIfNotExists, Disabled |
1.0.1 |
Configure Azure Defender for Azure SQL database to be enabled |
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. |
DeployIfNotExists, Disabled |
1.0.1 |
Configure Azure Defender for open-source relational databases to be enabled |
Azure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center |
DeployIfNotExists, Disabled |
1.0.0 |
Configure Azure Defender for Resource Manager to be enabled |
Azure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center . |
DeployIfNotExists, Disabled |
1.1.0 |
Configure Azure Defender for servers to be enabled |
Azure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities. |
DeployIfNotExists, Disabled |
1.0.1 |
Configure Azure Defender for SQL servers on machines to be enabled |
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. |
DeployIfNotExists, Disabled |
1.0.1 |
Configure Azure Defender to be enabled on SQL managed instances |
Enable Azure Defender on your Azure SQL Managed Instances to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. |
DeployIfNotExists, Disabled |
2.0.0 |
Configure Azure Kubernetes Service clusters to enable Defender profile |
Microsoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.Defender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks. |
DeployIfNotExists, Disabled |
4.3.0 |
Configure basic Microsoft Defender for Storage to be enabled (Activity Monitoring only) |
Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects potential threats to your storage accounts. This policy will enable the basic Defender for Storage capabilities (Activity Monitoring). To enable full protection, which also includes On-upload Malware Scanning and Sensitive Data Threat Detection use the full enablement policy: aka.ms/DefenderForStoragePolicy. To learn more about Defender for Storage capabilities and benefits, visit aka.ms/DefenderForStorage. |
DeployIfNotExists, Disabled |
1.1.0 |
Configure machines to receive a vulnerability assessment provider |
Azure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed. |
DeployIfNotExists, Disabled |
4.0.0 |
Configure Microsoft Defender CSPM to be enabled |
Defender Cloud Security Posture Management (CSPM) provides enhanced posture capabilities and a new intelligent cloud security graph to help identify, prioritize, and reduce risk. Defender CSPM is available in addition to the free foundational security posture capabilities turned on by default in Defender for Cloud. |
DeployIfNotExists, Disabled |
1.0.2 |
Configure Microsoft Defender for Azure Cosmos DB to be enabled |
Microsoft Defender for Azure Cosmos DB is an Azure-native layer of security that detects attempts to exploit databases in your Azure Cosmos DB accounts. Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitations of your database through compromised identities or malicious insiders. |
DeployIfNotExists, Disabled |
1.0.0 |
Configure Microsoft Defender for Containers to be enabled |
Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments. |
DeployIfNotExists, Disabled |
1.0.1 |
Configure Microsoft Defender for Key Vault plan |
Microsoft Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts. |
DeployIfNotExists, Disabled |
1.1.0 |
Configure Microsoft Defender for SQL to be enabled on Synapse workspaces |
Enable Microsoft Defender for SQL on your Azure Synapse workspaces to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit SQL databases. |
DeployIfNotExists, Disabled |
1.0.0 |
Configure Microsoft Defender for Storage to be enabled |
Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects potential threats to your storage accounts. This policy will enable all Defender for Storage capabilities; Activity Monitoring, Malware Scanning and Sensitive Data Threat Detection. To learn more about Defender for Storage capabilities and benefits, visit aka.ms/DefenderForStorage. |
DeployIfNotExists, Disabled |
1.4.0 |
Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL |
Configure Windows SQL Virtual Machines to automatically install the Microsoft Defender for SQL extension. Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). |
DeployIfNotExists, Disabled |
1.6.0 |
Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL and DCR with a Log Analytics workspace |
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group, a Data Collection Rule and Log Analytics workspace in the same region as the machine. |
DeployIfNotExists, Disabled |
1.9.0 |
Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL and DCR with a user-defined LA workspace |
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace. |
DeployIfNotExists, Disabled |
1.10.0 |
Configure the Microsoft Defender for SQL Log Analytics workspace |
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and Log Analytics workspace in the same region as the machine. |
DeployIfNotExists, Disabled |
1.5.0 |
Control maintenance and repair activities |
CMA_0080 - Control maintenance and repair activities |
Manual, Disabled |
1.1.0 |
Deploy export to Event Hub as a trusted service for Microsoft Defender for Cloud data |
Enable export to Event Hub as a trusted service of Microsoft Defender for Cloud data. This policy deploys an export to Event Hub as a trusted service configuration with your conditions and target Event Hub on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task. |
DeployIfNotExists, Disabled |
1.0.0 |
Enable Microsoft Defender for Cloud on your subscription |
Identifies existing subscriptions that aren't monitored by Microsoft Defender for Cloud and protects them with Defender for Cloud's free features. Subscriptions already monitored will be considered compliant. To register newly created subscriptions, open the compliance tab, select the relevant non-compliant assignment, and create a remediation task. |
deployIfNotExists |
1.0.1 |
Manage gateways |
CMA_0363 - Manage gateways |
Manual, Disabled |
1.1.0 |
Manage nonlocal maintenance and diagnostic activities |
CMA_0364 - Manage nonlocal maintenance and diagnostic activities |
Manual, Disabled |
1.1.0 |
Microsoft Defender CSPM should be enabled |
Defender Cloud Security Posture Management (CSPM) provides enhanced posture capabilities and a new intelligent cloud security graph to help identify, prioritize, and reduce risk. Defender CSPM is available in addition to the free foundational security posture capabilities turned on by default in Defender for Cloud. |
AuditIfNotExists, Disabled |
1.0.0 |
Microsoft Defender for APIs should be enabled |
Microsoft Defender for APIs brings new discovery, protection, detection, & response coverage to monitor for common API based attacks & security misconfigurations. |
AuditIfNotExists, Disabled |
1.0.3 |
Microsoft Defender for Azure Cosmos DB should be enabled |
Microsoft Defender for Azure Cosmos DB is an Azure-native layer of security that detects attempts to exploit databases in your Azure Cosmos DB accounts. Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitations of your database through compromised identities or malicious insiders. |
AuditIfNotExists, Disabled |
1.0.0 |
Microsoft Defender for Containers should be enabled |
Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments. |
AuditIfNotExists, Disabled |
1.0.0 |
Microsoft Defender for SQL should be enabled for unprotected Synapse workspaces |
Enable Defender for SQL to protect your Synapse workspaces. Defender for SQL monitors your Synapse SQL to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. |
AuditIfNotExists, Disabled |
1.0.0 |
Microsoft Defender for SQL status should be protected for Arc-enabled SQL Servers |
Microsoft Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, discovering and classifying sensitive data. Once enabled, the protection status indicates that the resource is actively monitored. Even when Defender is enabled, multiple configuration settings should be validated on the agent, machine, workspace and SQL server to ensure active protection. |
Audit, Disabled |
1.1.0 |
Microsoft Defender for Storage should be enabled |
Microsoft Defender for Storage detects potential threats to your storage accounts. It helps prevent the three major impacts on your data and workload: malicious file uploads, sensitive data exfiltration, and data corruption. The new Defender for Storage plan includes Malware Scanning and Sensitive Data Threat Detection. This plan also provides a predictable pricing structure (per storage account) for control over coverage and costs. |
AuditIfNotExists, Disabled |
1.0.0 |
Perform a trend analysis on threats |
CMA_0389 - Perform a trend analysis on threats |
Manual, Disabled |
1.1.0 |
Perform vulnerability scans |
CMA_0393 - Perform vulnerability scans |
Manual, Disabled |
1.1.0 |
Provide periodic security awareness training |
CMA_C1091 - Provide periodic security awareness training |
Manual, Disabled |
1.1.0 |
Provide security training for new users |
CMA_0419 - Provide security training for new users |
Manual, Disabled |
1.1.0 |
Review malware detections report weekly |
CMA_0475 - Review malware detections report weekly |
Manual, Disabled |
1.1.0 |
Review threat protection status weekly |
CMA_0479 - Review threat protection status weekly |
Manual, Disabled |
1.1.0 |
Setup subscriptions to transition to an alternative vulnerability assessment solution |
Microsoft Defender for cloud offers vulnerability scanning for your machines at no extra cost. Enabling this policy will cause Defender for Cloud to automatically propagate the findings from the built-in Microsoft Defender vulnerability management solution to all supported machines. |
DeployIfNotExists, Disabled |
1.0.0-preview |
Update antivirus definitions |
CMA_0517 - Update antivirus definitions |
Manual, Disabled |
1.1.0 |
Windows Defender Exploit Guard should be enabled on your machines |
Windows Defender Exploit Guard uses the Azure Policy Guest Configuration agent. Exploit Guard has four components that are designed to lock down devices against a wide variety of attack vectors and block behaviors commonly used in malware attacks while enabling enterprises to balance their security risk and productivity requirements (Windows only). |
AuditIfNotExists, Disabled |
2.0.0 |
Windows machines should configure Windows Defender to update protection signatures within one day |
To provide adequate protection against newly released malware, Windows Defender protection signatures need to be updated regularly to account for newly released malware. This policy is not applied to Arc connected servers and it requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For more information on Guest Configuration, visit https://aka.ms/gcpol. |
AuditIfNotExists, Disabled |
1.0.1 |
Windows machines should enable Windows Defender Real-time protection |
Windows machines should enable the Real-time protection in the Windows Defender to provide adequate protection against newly released malware. This policy is not applicable to arc connected servers and it requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For more information on Guest Configuration, visit https://aka.ms/gcpol. |
AuditIfNotExists, Disabled |
1.0.1 |