Enable Microsoft Defender for SQL servers on machines at scale

Microsoft Defender for Cloud's SQL servers on machines component of the Defender for Databases plan protects SQL IaaS and Defender for SQL extensions. The SQL servers on machines component identify and mitigates potential database vulnerabilities while detecting anomalous activity that could indicate threats to your databases.

When you enable the SQL Server on machines component of the Defender for Databases plan, the auto-provision process is automatically initiated. The auto-provision process installs and configures all the necessary components for the plan to function, including the Azure Monitor Agent (AMA), SQL IaaS extension, and Defender for SQL extensions. The auto-provision process also sets up the workspace configuration, Data Collection Rules, identity (if needed), and the SQL IaaS extension.

This page explains how you can enable the auto-provision process for Defender for SQL across multiple subscriptions simultaneously using a PowerShell script. This process applies to SQL servers hosted on Azure Virtual Machines (VM), on-premises environments, and Azure Arc-enabled SQL servers. This article also discusses how to utilize extra functionalities that can accommodate various configurations such as:

  • Custom data collection rules

  • Custom identity management

  • Default workspace integration

  • Custom workspace configuration

Prerequisites

PowerShell script parameters and samples

The PowerShell script that enables Microsoft Defender for SQL on Machines on a given subscription has several parameters that you can customize to fit your needs. The following table lists the parameters and their descriptions:

Parameter name Required Description
SubscriptionId: Required The Azure subscription ID that you want to enable Defender for SQL servers on machines for.
RegisterSqlVmAgnet Required A flag indicating whether to register the SQL VM Agent in bulk.

Learn more about registering multiple SQL VMs in Azure with the SQL IaaS Agent extension.
WorkspaceResourceId Optional The resource ID of the Log Analytics workspace, if you want to use a custom workspace instead of the default one.
DataCollectionRuleResourceId Optional The resource ID of the data collection rule, if you want to use a custom Data Collection Rule (DCR) instead of the default one.
UserAssignedIdentityResourceId Optional The resource ID of the user assigned identity, if you want to use a custom user assigned identity instead of the default one.

The following sample script is applicable when you use a default Log Analytics workspace, data collection rule, and managed identity.

Write-Host "------ Enable Defender for SQL on Machines example ------" 
$SubscriptionId = "<SubscriptionID>"
.\EnableDefenderForSqlOnMachines.ps1 -SubscriptionId $SubscriptionId -RegisterSqlVmAgnet $RegisterSqlVmAgnet 

The following sample script is applicable when you use a custom Log Analytics workspace, data collection rule, and managed identity.

Write-Host "------ Enable Defender for SQL on Machines example ------" 
$SubscriptionId = "<SubscriptionID>" 
$RegisterSqlVmAgnet = "false" 
$WorkspaceResourceId = "/subscriptions/<SubscriptionID>/resourceGroups/someResourceGroup/providers/Microsoft.OperationalInsights/workspaces/someWorkspace" 
$DataCollectionRuleResourceId = "/subscriptions/<SubscriptionID>/resourceGroups/someOtherResourceGroup/providers/Microsoft.Insights/dataCollectionRules/someDcr" 
$UserAssignedIdentityResourceId = "/subscriptions/<SubscriptionID>/resourceGroups/someElseResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/someManagedIdentity" 
.\EnableDefenderForSqlOnMachines.ps1 -SubscriptionId $SubscriptionId -RegisterSqlVmAgnet $RegisterSqlVmAgnet -WorkspaceResourceId $WorkspaceResourceId -DataCollectionRuleResourceId $DataCollectionRuleResourceId -UserAssignedIdentityResourceId $UserAssignedIdentityResourceId

Enable Defender for SQL servers on machines at scale

You can enable Defender for SQL servers on machines at scale by following these steps.

  1. Open a PowerShell window.

  2. Copy the EnableDefenderForSqlOnMachines.ps1 script.

  3. Paste the script into PowerShell.

  4. Enter parameter information as needed.

  5. Run the script.

Next step