แก้ไข

แชร์ผ่าน


Enable Defender for SQL Servers on Machines

The Defender for SQL Servers on Machines plan is one of the Defender for Databases plans in Microsoft Defender for Cloud. Use Defender for SQL servers on machines to protect SQL Server databases hosted on Azure VMs and Azure Arc-enabled VMs.

Prerequisites

Requirement Details
Permissions To deploy the plan on a subscription including Azure Policy, you need Subscription owner permissions.

The Windows user on the SQL VM must have the Sysadmin role on the database.
Multicloud machines Multicloud machines (AWS and GCP) must be onboarded as Azure Arc-enabled VMs. They can be automatically onboarded as Azure Arc machines when onboarded with the connector.
Onboard your AWS connector and automatically provision Azure Arc.
Onboard your GCP connector and automatically provision Azure Arc.
On-premises machines On-premises machines must be onboarded as Azure Arc-enabled VMs. Onboard on-premises machines and install Azure Arc.
Azure Arc Review Azure Arc deployment requirements
- Plan and deploy Azure Arc-enabled servers
- Connected Machine agent prerequisites
- Connected Machine agent network requirements
- Roles specific to SQL Server enabled by Azure Arc
Extensions Ensure these extensions aren't blocked in your environment.
Defender for SQL (IaaS and Arc) - Publisher: Microsoft.Azure.AzureDefenderForSQL
- Type: AdvancedThreatProtection.Windows
SQL IaaS Extension (IaaS) - Publisher: Microsoft.SqlServer.Management
- Type: SqlIaaSAgent
SQL IaaS Extension (Arc) - Publisher: Microsoft.AzureData
- Type: WindowsAgent.SqlServer
AMA extension (IaaS and Arc) - Publisher: Microsoft.Azure.Monitor
- Type: AzureMonitorWindowsAgent
Region requirement When you enable the plan, a resource group is created in the East US. Ensure this region isn't blocked in your environment.
Resource naming conventions Defender for SQL uses the following naming convention when creating our resources:
- Data Collection Rule: MicrosoftDefenderForSQL--dcr
- DCRA: /Microsoft.Insights/MicrosoftDefenderForSQL-RulesAssociation
- Resource group: DefaultResourceGroup-
- Log analytics workspace: D4SQL--
- Defender for SQL uses MicrosoftDefenderForSQL as a createdBy database tag.

Ensure that Deny policies don't block this naming convention.
Operating Systems Machines running Windows Server 2012 R2 or later are supported. SQL Server 2012 R2 or later is supported for SQL instances.

Enable the plan

  1. In the Azure portal, search for and select Microsoft Defender for Cloud.

  2. In the Defender for Cloud menu, select Environment settings.

  3. Select the relevant subscription.

  4. On the Defender plans page, locate the Databases plan and select Select types.

    Screenshot that shows you where to select types on the Defender plans page.

  5. In the Resource types selection window, toggle the SQL servers on machines plan to On.

  6. Select Continue > Save.

Select a workspace

Select a Log Analytics workspace to work with the Defender for SQL on Machines plan.

  1. In the Defender plans page, in Databases, Monitoring Coverage column select settings.

  2. In the Azure Monitoring Agent for SQL server on machines section, in the configurations column select Edit configurations.

  3. In the Autoprovisioning configuration page, select the Default workspace or specify a Custom workspace.

  4. In SQL server automatic registration make sure that you leave the Register Azure SQL Server instances by enabling SQL IaaS extension automatic registration option enabled.

    Screenshot that shows where to leave the register Azure SQL Server instances enabled.

    Registration ensures that all SQL instances can be discovered and configured correctly.

  5. Select Apply.

Verify that your machines are protected

Depending on your environment, it can take a few hours to discover and protect SQL instances. As a final step, you should verify that all machines are protected. Don't skip this step, as it's important to verify your deployment is protected.