[Preview]: Log Analytics Extension should be enabled for listed virtual machine images |
Reports virtual machines as non-compliant if the virtual machine image is not in the list defined and the extension is not installed. |
AuditIfNotExists, Disabled |
2.0.1-preview |
[Preview]: Network traffic data collection agent should be installed on Linux virtual machines |
Security Center uses the Microsoft Dependency agent to collect network traffic data from your Azure virtual machines to enable advanced network protection features such as traffic visualization on the network map, network hardening recommendations and specific network threats. |
AuditIfNotExists, Disabled |
1.0.2-preview |
[Preview]: Network traffic data collection agent should be installed on Windows virtual machines |
Security Center uses the Microsoft Dependency agent to collect network traffic data from your Azure virtual machines to enable advanced network protection features such as traffic visualization on the network map, network hardening recommendations and specific network threats. |
AuditIfNotExists, Disabled |
1.0.2-preview |
Activity log should be retained for at least one year |
This policy audits the activity log if the retention is not set for 365 days or forever (retention days set to 0). |
AuditIfNotExists, Disabled |
1.0.0 |
Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities |
This policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration but do not have any managed identities. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. |
modify |
4.1.0 |
Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identity |
This policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration and have at least one user-assigned identity but do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol. |
modify |
4.1.0 |
Audit virtual machines without disaster recovery configured |
Audit virtual machines which do not have disaster recovery configured. To learn more about disaster recovery, visit https://aka.ms/asr-doc. |
auditIfNotExists |
1.0.0 |
Auditing on SQL server should be enabled |
Auditing on your SQL Server should be enabled to track database activities across all databases on the server and save them in an audit log. |
AuditIfNotExists, Disabled |
2.0.0 |
Azure Backup should be enabled for Virtual Machines |
Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure. |
AuditIfNotExists, Disabled |
3.0.0 |
Azure Defender for App Service should be enabled |
Azure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks. |
AuditIfNotExists, Disabled |
1.0.3 |
Azure Defender for Azure SQL Database servers should be enabled |
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. |
AuditIfNotExists, Disabled |
1.0.2 |
Azure Defender for Key Vault should be enabled |
Azure Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts. |
AuditIfNotExists, Disabled |
1.0.3 |
Azure Defender for servers should be enabled |
Azure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities. |
AuditIfNotExists, Disabled |
1.0.3 |
Azure Defender for SQL servers on machines should be enabled |
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data. |
AuditIfNotExists, Disabled |
1.0.2 |
Azure Monitor log profile should collect logs for categories 'write,' 'delete,' and 'action' |
This policy ensures that a log profile collects logs for categories 'write,' 'delete,' and 'action' |
AuditIfNotExists, Disabled |
1.0.0 |
Azure Monitor should collect activity logs from all regions |
This policy audits the Azure Monitor log profile which does not export activities from all Azure supported regions including global. |
AuditIfNotExists, Disabled |
2.0.0 |
Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs |
This policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. |
deployIfNotExists |
3.1.0 |
Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs |
This policy deploys the Windows Guest Configuration extension to Windows virtual machines hosted in Azure that are supported by Guest Configuration. The Windows Guest Configuration extension is a prerequisite for all Windows Guest Configuration assignments and must be deployed to machines before using any Windows Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol. |
deployIfNotExists |
1.2.0 |
Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images |
Reports virtual machine scale sets as non-compliant if the virtual machine image is not in the list defined and the extension is not installed. |
AuditIfNotExists, Disabled |
2.0.1 |
Microsoft Defender for Storage should be enabled |
Microsoft Defender for Storage detects potential threats to your storage accounts. It helps prevent the three major impacts on your data and workload: malicious file uploads, sensitive data exfiltration, and data corruption. The new Defender for Storage plan includes Malware Scanning and Sensitive Data Threat Detection. This plan also provides a predictable pricing structure (per storage account) for control over coverage and costs. |
AuditIfNotExists, Disabled |
1.0.0 |
Resource logs in Azure Data Lake Store should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
Resource logs in Azure Stream Analytics should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
Resource logs in Batch accounts should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
Resource logs in Data Lake Analytics should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
Resource logs in Event Hub should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
Resource logs in IoT Hub should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
3.1.0 |
Resource logs in Key Vault should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
Resource logs in Logic Apps should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.1.0 |
Resource logs in Search services should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
Resource logs in Service Bus should be enabled |
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised |
AuditIfNotExists, Disabled |
5.0.0 |
The Log Analytics extension should be installed on Virtual Machine Scale Sets |
This policy audits any Windows/Linux Virtual Machine Scale Sets if the Log Analytics extension is not installed. |
AuditIfNotExists, Disabled |
1.0.1 |
Virtual machines should have the Log Analytics extension installed |
This policy audits any Windows/Linux virtual machines if the Log Analytics extension is not installed. |
AuditIfNotExists, Disabled |
1.0.1 |