What is Microsoft Defender for open-source relational databases

This plan brings threat protections for the following open-source relational databases:

Defender for Cloud detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. The plan makes it simple to address potential threats to databases without the need to be a security expert or manage advanced security monitoring systems.

Availability

Check out the pricing page for pricing information for Microsoft Defender for open-source relational databases.

Defender for open-source relational database is supported on PaaS environments and not on Azure Arc-enabled machines.

Protected versions of PostgreSQL include:

Protected versions of MySQL include:

  • Single Server - General Purpose and Memory Optimized. Learn more in MySQL pricing tiers.
  • Flexible Server - all pricing tiers.

Protected versions of MariaDB include:

View cloud availability for Defender for open-source relational databases

What are the benefits of Microsoft Defender for open-source relational databases?

Defender for Cloud provides security alerts on anomalous activities so that you can detect potential threats and respond to them as they occur.

When you enable this plan, Defender for Cloud will provide alerts when it detects anomalous database access and query patterns as well as suspicious database activities.

These alerts appear in Defender for Cloud's security alerts page and include:

  • details of the suspicious activity that triggered them
  • the associated MITRE ATT&CK tactic
  • recommended actions for how to investigate and mitigate the threat
  • options for continuing your investigations with Microsoft Sentinel

Some of the security alerts you might see with your databases protected by Microsoft Defender for open-source relational databases.

What kind of alerts does Microsoft Defender for open-source relational databases provide?

Threat intelligence enriched security alerts are triggered when there are:

  • Anomalous database access and query patterns - For example, an abnormally high number of failed sign-in attempts with different credentials (a brute force attempt).
  • Suspicious database activities - For example, a legitimate user accessing an SQL Server from a breached computer which communicated with a crypto-mining C&C server.
  • Brute-force attacks – With the ability to separate simple brute force or a successful brute force.

Tip

View the full list of security alerts for database servers in the alerts reference page.