Deploy Defender for Servers

The Defender for Servers plan in Microsoft Defender for Cloud protects Windows and Linux virtual machines (VMs) that run in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and in on-premises environments. Defender for Servers provides recommendations to improve the security posture of machines, and protects machines against security threats.

This article helps you to deploy a Defender for Servers plan.

Note

After a plan is enabled, a 30-day trial period begins. There is no way to stop, pause, or extend this trial period. To get the most out of the full 30-day trial, plan your evaluation goals.

Prerequisites

Requirement Details
Plan your deployment Review the Defender for Servers planning guide.

Check permissions needed to deploy and work with the plan, choose a plan and deployment scope, and understand how data is collected and stored.
Compare plan features Understand and compare Defender for Servers plan features.
Review pricing Review Defender for Servers pricing on the Defender for Cloud pricing page.
Get an Azure subscription You need a Microsoft Azure subscription. Sign up for a free one if you need to.
Turn on Defender for Cloud Make sure Defender for Cloud is available in the subscription.
Onboard AWS/GCP machines To protect AWS and GCP machines, connect AWS accounts and GCP projects to Defender for Cloud.

By default the connection process onboards machines as Azure Arc-enabled VMs.
Onboard on-premises machines Onboard on-premises machines as Azure Arc VMs for full functionality in Defender for Servers.

If you onboard on-premises machines by directly installing the Defender for Endpoint agent instead of onboarding Azure Arc, only Plan 1 functionality is available. In Defender for Servers Plan 2, you get only the premium Defender Vulnerability Management features in addition to Plan 1 functionality.
Review support requirements Check Defender for Servers requirements and support information.
Take advantage of 500 MB free data ingestion When Defender for Servers Plan 2 is enabled, a benefit of free 500 MB data ingestion is available for specific data types. Learn about requirements and set up free data ingestion
Defender integration Defender for Endpoint and Defender for Vulnerability Management are integrated by default in Defender for Cloud.

When you enable Defender for Servers, you give consent for the Defender for Servers plan to access Defender for Endpoint data related to vulnerabilities, installed software, and endpoint alerts.
Enable at resource level Although we recommend enabling Defender for Servers for a subscription, you can enable Defender for Servers at resource level if needed, for Azure VMs, Azure Arc-enabled servers, and Azure Virtual Machine Scale Sets.

You can enable Plan 1 at the resource level.

You can disable Plan 1 and Plan 2 at the resource level.

Enable on Azure, AWS, or GCP

You can enable a Defender for Servers plan for an Azure subscription, AWS account, or GCP project.

  1. Sign in to the Azure portal

  2. Search for and select Microsoft Defender for Cloud.

  3. In the Defender for Cloud menu, select Environment settings.

  4. Select the relevant Azure subscription, AWS account, or GCP project.

  5. On the Defender plans page, toggle the Servers switch to On.

    Screenshot that shows you how to toggle the Defender for Servers plan to on.

  6. By default this turns on Defender for Servers Plan 2. If you want to switch the plan, select Change plans.

    Screenshot that shows you where on the environment settings page to select change plans.

  7. In the popup window, select Plan 2 or Plan 1.

    Screenshot of the popup where you can select plan 1 or plan 2.

  8. Select Confirm.

  9. Select Save.

After enabling the plan, you have the ability to configure the features of the plan to suit your needs.

Disable on a subscription

  1. In Defender for Cloud, select Environment settings.
  2. Toggle the plan switch to Off.

Note

If you enabled Defender for Servers Plan 2 on a Log Analytics workspace, you need to disable it explicitly. To do that, navigate to the plans page for the workspace and toggle the switch to Off.

Enable Defender for Servers at resource level

Although we recommend that you enable the plan for an entire Azure subscription, you might need to mix plans, exclude specific resources, or enable Defender for Servers on specific machines only. To do this, you can enable or disable Defender for Servers at the resource level. Review deployment scope options before you start.

Configure on individual machines

Enable and disable the plan on specific machines.

Enable Plan 1 on a machine with the REST API

  1. To enable Plan 1 for the machine, in Update Pricings, create a PUT request with the endpoint.

  2. In the PUT request, replace the subscriptionId, resourceGroupName, and machineName in the endpoint URL with your own settings.

        PUT
        https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachines/{machineName}/providers/Microsoft.Security/pricings/virtualMachines?api-version=2024-01-01
    
  3. Add this request body.

    {
     "properties": {
    "pricingTier": "Standard",
    "subPlan": "P1"
      }
    }
    

Disable the plan on a machine with the REST API

  1. To disable Defender for Servers at the machine level, create a PUT request with the endpoint.

  2. In the PUT request, replace the subscriptionId, resourceGroupName, and machineName in the endpoint URL with your own settings.

        PUT
        https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachines/{machineName}/providers/Microsoft.Security/pricings/virtualMachines?api-version=2024-01-01
    
  3. Add this request body.

    {
     "properties": {
    "pricingTier": "Free",
      }
    }
    

Remove the resource-level configuration with the REST API

  1. To remove the machine-level configuration using the REST API, create a DELETE request with the endpoint.

  2. In the DELETE request, replace the subscriptionId, resourceGroupName, and machineName in the endpoint URL with your own settings.

        DELETE
        https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachines/{machineName}/providers/Microsoft.Security/pricings/virtualMachines?api-version=2024-01-01
    

Configure multiple machines at scale

Enable Plan 1 with a script

  1. Download and save this file as a PowerShell file.
  2. Run the downloaded file.
  3. Customize as needed. Select resources by tag or by resource group.
  4. Follow the rest of the onscreen instructions.

Enable Plan 1 with Azure Policy (on resource group)

  1. Sign in to Azure portal and navigate to the Policy dashboard.
  2. In the Policy dashboard, select Definitions from the left-side menu.
  3. In the Security Center – Granular Pricing category, search for and then select Configure Azure Defender for Servers to be enabled (with 'P1' subplan) for all resources (resource level). This policy enables Defender for Servers Plan 1 on all resources (Azure VMs, VMSS and Azure Arc-enabled servers) under the assignment scope.
  4. Select the policy and review it.
  5. Select Assign and edit the assignment details according to your needs. In the Basics tab, as Scope, select your relevant resource group.
  6. In the Remediation tab, select Create a remediation task.
  7. Once you edited all details, select **Review + create. Then select Create.

Enable Plan 1 with Azure Policy (on resource tag)

  1. Sign in to Azure portal and navigate to the Policy dashboard.
  2. In the Policy dashboard, select Definitions from the left-side menu.
  3. In the Security Center – Granular Pricing category, search for and then select Configure Azure Defender for Servers to be enabled (with 'P1' subplan) for all resources with the selected tag. This policy enables Defender for Servers Plan 1 on all resources (Azure VMs, VMSS and Azure Arc-enabled servers) under the assignment scope.
  4. Select the policy and review it.
  5. Select Assign and edit the assignment details according to your needs.
  6. In the Parameters tab, clear Only show parameters that need input or review
  7. In Inclusion Tag Name, enter the custom tag name. Enter the tag's value in Inclusion Tag Values array.
  8. In the Remediation tab, select Create a remediation task.
  9. Once you edited all details, select **Review + create. Then select Create.

Disable the plan with a script

  1. Download and save this file as a PowerShell file.
  2. Run the downloaded file.
  3. Customize as needed. Select resources by tag or by resource group.
  4. Follow the rest of the onscreen instructions.

Disable the plan with Azure Policy (for resource group)

  1. Sign in to Azure portal and navigate to the Policy dashboard.
  2. In the Policy dashboard, select Definitions from the left-side menu.
  3. In the Security Center – Granular Pricing category, search for and then select Configure Azure Defender for Servers to be disabled for all resources (resource level). This policy disables Defender for Servers on all resources (Azure VMs, VMSS and Azure Arc-enabled servers) under the assignment scope.
  4. Select the policy and review it.
  5. Select Assign and edit the assignment details according to your needs. In the Basics tab, as Scope, select your relevant resource group.
  6. In the Remediation tab, select Create a remediation task.
  7. Once you edited all details, select **Review + create. Then select Create.

Disable the plan with Azure Policy (for resource tag)

  1. Sign in to Azure portal and navigate to the Policy dashboard.
  2. In the Policy dashboard, select Definitions from the left-side menu.
  3. In the Security Center – Granular Pricing category, search for and then select Configure Azure Defender for Servers to be disabled for resources (resource level) with the selected tag. This policy disables Defender for Servers on all resources (Azure VMs, VMSS and Azure Arc-enabled servers) under the assignment scope based on the tag you defined.
  4. Select the policy and review it.
  5. Select Assign and edit the assignment details according to your needs.
  6. In the Parameters tab, clear Only show parameters that need input or review
  7. In Inclusion Tag Name, enter the custom tag name. Enter the tag's value in Inclusion Tag Values array.
  8. In the Remediation tab, select Create a remediation task.
  9. Once you edited all details, select **Review + create. Then select Create.

Remove the per resource configuration with a script (resource group or tag)

  1. Download and save this file as a PowerShell file.
  2. Run the downloaded file.
  3. Customize as needed. Select resources by tag or by resource group.
  4. Follow the rest of the onscreen instructions.

Next steps