Enable Microsoft Defender for SQL servers on machines

Defender for SQL servers on machines protects SQL servers hosted on Azure Virtual Machines, on-premises environments, and Azure Arc-enabled SQL servers. Defender for SQL servers on machines provides a unified security management experience for SQL servers.

Prerequisites

Before deploying AMA with Defender for Cloud, ensure you have the following prerequisites:

Enable Defender for SQL on non-Azure machines using the AMA agent

Prerequisites for enabling Defender for SQL on non-Azure machines

  • An active Azure subscription.

  • Subscription owner permissions on the subscription in which you wish to assign the policy.

  • SQL Server on machines prerequisites:

    • Permissions: the Windows user operating the SQL server must have the Sysadmin role on the database.
    • Extensions: The following extensions should be added to the allowlist:
      • Defender for SQL (IaaS and Arc):
        • Publisher: Microsoft.Azure.AzureDefenderForSQL
        • Type: AdvancedThreatProtection.Windows
      • SQL IaaS Extension (IaaS):
        • Publisher: Microsoft.SqlServer.Management
        • Type: SqlIaaSAgent
      • SQL IaaS Extension (Arc):
        • Publisher: Microsoft.AzureData
        • Type: WindowsAgent.SqlServer
      • AMA extension (IaaS and Arc):
        • Publisher: Microsoft.Azure.Monitor
        • Type: AzureMonitorWindowsAgent

Naming conventions in the "Deny policy" allowlist

  • Defender for SQL uses the following naming convention when creating our resources:

    • Data Collection Rule: MicrosoftDefenderForSQL--dcr
    • DCRA: /Microsoft.Insights/MicrosoftDefenderForSQL-RulesAssociation
    • Resource group: DefaultResourceGroup-
    • Log analytics workspace: D4SQL--
  • Defender for SQL uses MicrosoftDefenderForSQL as a createdBy database tag.

Steps to enable Defender for SQL on non-Azure machines

  1. Connect SQL server to Azure Arc. For more information on the supported operating systems, connectivity configuration, and required permissions, see the following documentation:

  2. Once Azure Arc is installed, the Azure extension for SQL Server is installed automatically on the database server. For more information, see Manage automatic connection for SQL Server enabled by Azure Arc.

Enable Defender for SQL

  1. Sign in to the Azure portal.

  2. Search for and select Microsoft Defender for Cloud.

  3. In the Defender for Cloud menu, select Environment settings.

  4. Select the relevant subscription.

  5. On the Defender plans page, locate the Databases plan and select Select types.

    Screenshot that shows you where to select, select types on the Defender plans page.

  6. In the Resource types selection window, toggle the SQL servers on machines plan to On.

  7. Select Continue.

  8. Select Save.

  9. Once enabled, use one of the following policy initiatives:

    • Configure SQL VMs and Arc-enabled SQL servers to install Microsoft Defender for SQL and AMA with a Log Analytics Workspace for a default Log Analytics Workspace. This creates resource groups with data collection rules and a default Log Analytics Workspace. For more information about the Log Analytics Workspace, see Log Analytics workspace overview.

    Screenshot of how to configure default log analytics workspace.

    • Configure SQL VMs and Arc-enabled SQL servers to install Microsoft Defender for SQL and AMA with a user-defined Log Analytics Workspace. This creates a resource group with data collection rules and a custom Log Analytics Workspace in the predefined region. During this process, install the Azure Monitoring Agent. For more information about the options to install the AMA agent, see Azure Monitor Agent prerequisites.

    Screenshot of how to configure user-defined log analytics workspace.

  10. To complete the installation process, restart the SQL server (instance) for versions 2017 and older.

Enable Defender for SQL on Azure virtual machines using the AMA agent

Prerequisites for enabling Defender for SQL on Azure virtual machines

  • An active Azure subscription.
  • Subscription owner permissions on the subscription in which you wish to assign the policy.
  • SQL Server on machines prerequisites:
    • Permissions: the Windows user operating the SQL server must have the Sysadmin role on the database.
    • Extensions: The following extensions should be added to the allowlist:
      • Defender for SQL (IaaS and Arc):
        • Publisher: Microsoft.Azure.AzureDefenderForSQL
        • Type: AdvancedThreatProtection.Windows
      • SQL IaaS Extension (IaaS):
        • Publisher: Microsoft.SqlServer.Management
        • Type: SqlIaaSAgent
      • SQL IaaS Extension (Arc):
        • Publisher: Microsoft.AzureData
        • Type: WindowsAgent.SqlServer
      • AMA extension (IaaS and Arc):
        • Publisher: Microsoft.Azure.Monitor
        • Type: AzureMonitorWindowsAgent
  • Since we're creating a resource group in East US, as part of the autoprovisioning enablement process, this region needs to be allowed or Defender for SQL can't complete the installation process successfully.

Steps to enable Defender for SQL on Azure virtual machines

  1. Sign in to the Azure portal.

  2. Search for and select Microsoft Defender for Cloud.

  3. In the Defender for Cloud menu, select Environment settings.

  4. Select the relevant subscription.

  5. On the Defender plans page, locate the Databases plan and select Select types.

    Screenshot that shows you where to select types on the Defender plans page.

  6. In the Resource types selection window, toggle the SQL servers on machines plan to On.

  7. Select Continue.

  8. Select Save.

  9. Once enabled, use one of the following policy initiatives:

    • Configure SQL VMs and Arc-enabled SQL servers to install Microsoft Defender for SQL and AMA with a Log Analytics Workspace for a default Log Analytics Workspace. This creates a resource group in East US and a managed identity. For more information about the use of the managed identity, see Resource Manager template samples for agents in Azure Monitor. It also creates a resource group that includes Data Collection Rules and a default Log Analytics Workspace. All resources are consolidated under this single resource group. The Data Collection Rule and Log Analytics Workspace are created to align with the region of the virtual machine (VM).

    Screenshot of how to configure default log analytics workspace.

    • Configure SQL VMs and Arc-enabled SQL servers to install Microsoft Defender for SQL and AMA with a user-defined Log Analytics Workspace. This creates a resource group in East US and a managed identity. For more information about the use of the managed identity, see Resource Manager template samples for agents in Azure Monitor. It also creates a resource group with DCR and a custom Log Analytics Workspace in the predefined region.

    Screenshot of how to configure user-defined log analytics workspace.

  10. To complete the installation process, restart the SQL server (instance) for versions 2017 and older.

For related information, see these resources: