Security Center - oWretch/policy GitHub Wiki

Policy Effects by Policy

Category Policy Landing Zones Platform Production Identity Corp Decommissioned Management Connectivity Sandbox
Security Center [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources
This policy definition is no longer the recommended way to achieve its intent. Instead of continuing to use this policy, we recommend you assign this replacement policies with policy IDs 3dc5edcd-002d-444c-b216-e123bbfa37c0 and ca88aadc-6e2b-416c-9de2-5a0f01d1693f. Learn more about policy definition deprecation at aka.ms/policydefdeprecation
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Linux hybrid machines
Deploys Microsoft Defender for Endpoint agent on Linux hybrid machines
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Linux virtual machines
Deploys Microsoft Defender for Endpoint agent on applicable Linux VM images.
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Windows Azure Arc machines
Deploys Microsoft Defender for Endpoint on Windows Azure Arc machines.
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Windows virtual machines
Deploys Microsoft Defender for Endpoint on applicable Windows VM images.
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Guest Attestation extension should be installed on supported Linux virtual machines
Install Guest Attestation extension on supported Linux virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Linux virtual machines.
AuditIfNotExists
Disabled
Security Center [Preview]: Guest Attestation extension should be installed on supported Linux virtual machines scale sets
Install Guest Attestation extension on supported Linux virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Linux virtual machine scale sets.
AuditIfNotExists
Disabled
Security Center [Preview]: Guest Attestation extension should be installed on supported Windows virtual machines
Install Guest Attestation extension on supported virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Windows virtual machines.
AuditIfNotExists
Disabled
Security Center [Preview]: Guest Attestation extension should be installed on supported Windows virtual machines scale sets
Install Guest Attestation extension on supported virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Windows virtual machine scale sets.
AuditIfNotExists
Disabled
Security Center [Preview]: Linux virtual machines should use only signed and trusted boot components
All OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allow list or remove the identified components.
AuditIfNotExists
Disabled
Security Center [Preview]: Secure Boot should be enabled on supported Windows virtual machines
Enable Secure Boot on supported Windows virtual machines to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. This assessment applies to Trusted Launch and Confidential Windows virtual machines.
Audit
Disabled
Security Center [Preview]: vTPM should be enabled on supported virtual machines
Enable virtual TPM device on supported virtual machines to facilitate Measured Boot and other OS security features that require a TPM. Once enabled, vTPM can be used to attest boot integrity. This assessment only applies to trusted launch enabled virtual machines.
Audit
Disabled
Security Center A maximum of 3 owners should be designated for your subscription
It is recommended to designate up to 3 subscription owners in order to reduce the potential for breach by a compromised owner.
AuditIfNotExists
Disabled
Security Center A vulnerability assessment solution should be enabled on your virtual machines
Audits virtual machines to detect whether they are running a supported vulnerability assessment solution. A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you.
AuditIfNotExists
Disabled
Security Center All network ports should be restricted on network security groups associated to your virtual machine
Azure Security Center has identified some of your network security groups' inbound rules to be too permissive. Inbound rules should not allow access from 'Any' or 'Internet' ranges. This can potentially enable attackers to target your resources.
AuditIfNotExists
Disabled
Security Center API endpoints in Azure API Management should be authenticated
API endpoints published within Azure API Management should enforce authentication to help minimize security risk. Authentication mechanisms are sometimes implemented incorrectly or are missing. This allows attackers to exploit implementation flaws and to access data. Learn More about the OWASP API Threat for Broken User Authentication here: https://learn.microsoft.com/azure/api-management/mitigate-owasp-api-threats#broken-user-authentication
AuditIfNotExists
Disabled
Security Center API endpoints that are unused should be disabled and removed from the Azure API Management service
As a security best practice, API endpoints that haven't received traffic for 30 days are considered unused and should be removed from the Azure API Management service. Keeping unused API endpoints may pose a security risk to your organization. These may be APIs that should have been deprecated from the Azure API Management service but may have been accidentally left active. Such APIs typically do not receive the most up to date security coverage.
AuditIfNotExists
Disabled
Security Center Authorized IP ranges should be defined on Kubernetes Services
Restrict access to the Kubernetes Service Management API by granting API access only to IP addresses in specific ranges. It is recommended to limit access to authorized IP ranges to ensure that only applications from allowed networks can access the cluster.
Audit
Disabled
Security Center Azure DDoS Protection should be enabled
DDoS protection should be enabled for all virtual networks with a subnet that is part of an application gateway with a public IP.
AuditIfNotExists
Disabled
Security Center Azure Defender for App Service should be enabled
Azure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks.
AuditIfNotExists
Disabled
Security Center Azure Defender for Azure SQL Database servers should be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
AuditIfNotExists
Disabled
Security Center Azure Defender for Key Vault should be enabled
Azure Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts.
AuditIfNotExists
Disabled
Security Center Azure Defender for open-source relational databases should be enabled
Azure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center
AuditIfNotExists
Disabled
Security Center Azure Defender for Resource Manager should be enabled
Azure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center .
AuditIfNotExists
Disabled
Security Center Azure Defender for servers should be enabled
Azure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities.
AuditIfNotExists
Disabled
Security Center Azure Defender for SQL servers on machines should be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
AuditIfNotExists
Disabled
Security Center Azure Defender for SQL should be enabled for unprotected MySQL flexible servers
Audit MySQL flexible servers without Advanced Data Security
AuditIfNotExists
Disabled
Security Center Azure Defender for SQL should be enabled for unprotected PostgreSQL flexible servers
Audit PostgreSQL flexible servers without Advanced Data Security
AuditIfNotExists
Disabled
Security Center Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)
Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment.
AuditIfNotExists
Disabled
Security Center Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)
Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads.
AuditIfNotExists
Disabled
Security Center Blocked accounts with owner permissions on Azure resources should be removed
Deprecated accounts with owner permissions should be removed from your subscription. Deprecated accounts are accounts that have been blocked from signing in.
AuditIfNotExists
Disabled
Security Center Blocked accounts with read and write permissions on Azure resources should be removed
Deprecated accounts should be removed from your subscriptions. Deprecated accounts are accounts that have been blocked from signing in.
AuditIfNotExists
Disabled
Security Center Configure Advanced Threat Protection to be enabled on Azure database for MySQL flexible servers
Enable Advanced Threat Protection on your Azure database for MySQL flexible servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
Security Center Configure Advanced Threat Protection to be enabled on Azure database for PostgreSQL flexible servers
Enable Advanced Threat Protection on your Azure database for PostgreSQL flexible servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers to automatically install Azure Monitor Agent
Automate the deployment of Azure Monitor Agent extension on your Windows Arc-enabled SQL Servers. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL
Configure Windows Arc-enabled SQL Servers to automatically install the Microsoft Defender for SQL agent. Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations).
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL and DCR with a user-defined LA workspace
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers with Data Collection Rule Association to Microsoft Defender for SQL user-defined DCR
Configure association between Arc-enabled SQL Servers and the Microsoft Defender for SQL user-defined DCR. Deleting this association will break the detection of security vulnerabilities for this Arc-enabled SQL Servers.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for App Service to be enabled
Azure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks.
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for Azure SQL database to be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for open-source relational databases to be enabled
Azure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for Resource Manager to be enabled
Azure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center .
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for servers to be enabled
Azure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities.
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for SQL servers on machines to be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Linux Arc machines
Configure Linux Arc machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Linux virtual machine scale sets
Configure Linux virtual machine scale sets to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Linux virtual machines
Configure Linux virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Windows Arc machines
Configure Windows Arc machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Windows virtual machine scale sets
Configure Windows virtual machine scale sets to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Windows virtual machines
Configure Windows virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure machines to receive a vulnerability assessment provider
Azure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender CSPM plan
Defender Cloud Security Posture Management (CSPM) provides enhanced posture capabilities and a new intelligent cloud security graph to help identify, prioritize, and reduce risk. Defender CSPM is available in addition to the free foundational security posture capabilities turned on by default in Defender for Cloud.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Azure Cosmos DB to be enabled
Microsoft Defender for Azure Cosmos DB is an Azure-native layer of security that detects attempts to exploit databases in your Azure Cosmos DB accounts. Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitations of your database through compromised identities or malicious insiders.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Containers to be enabled
Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP_EXCLUDE_LINUX...)
Configures the Microsoft Defender for Endpoint integration settings, within Microsoft Defender for Cloud (also known as WDATP_EXCLUDE_LINUX_...), for enabling auto provisioning of MDE for Linux servers. WDATP setting must be turned on for this setting to be applied. See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP_UNIFIED_SOLUTION)
Configures the Microsoft Defender for Endpoint integration settings, within Microsoft Defender for Cloud (also known as WDATP_UNIFIED_SOLUTION), for enabling auto provisioning of MDE Unified Agent for Windows Server 2012R2 and 2016. WDATP setting must be turned on for this setting to be applied. See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP)
Configures the Microsoft Defender for Endpoint integration settings, within Microsoft Defender for Cloud (also known as WDATP), for Windows downlevel machines onboarded to MDE via MMA, and auto provisioning of MDE on Windows Server 2019 , Windows Virtual Desktop and above. Must be turned on in order for the other settings (WDATP_UNIFIED, etc.) to work. See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Key Vault plan
Microsoft Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for SQL to be enabled on Synapse workspaces
Enable Microsoft Defender for SQL on your Azure Synapse workspaces to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit SQL databases.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Storage to be enabled
Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects potential threats to your storage accounts. This policy will enable all Defender for Storage capabilities; Activity Monitoring, Malware Scanning and Sensitive Data Threat Detection. To learn more about Defender for Storage capabilities and benefits, visit aka.ms/DefenderForStorage.
DeployIfNotExists
Disabled
Security Center Configure SQL Virtual Machines to automatically install Azure Monitor Agent
Automate the deployment of Azure Monitor Agent extension on your Windows SQL Virtual Machines. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL
Configure Windows SQL Virtual Machines to automatically install the Microsoft Defender for SQL extension. Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations).
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL and DCR with a user-defined LA workspace
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Create and assign a built-in user-assigned managed identity
Create and assign a built-in user-assigned managed identity at scale to SQL virtual machines.
DeployIfNotExists
Disabled
AuditIfNotExists
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center Deploy export to Log Analytics workspace for Microsoft Defender for Cloud data
Enable export to Log Analytics workspace of Microsoft Defender for Cloud data. This policy deploys an export to Log Analytics workspace configuration with your conditions and target workspace on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task.
deployIfNotExists
Security Center Deploy Microsoft Defender for Cloud Security Contacts
Deploy Microsoft Defender for Cloud Security Contacts
DeployIfNotExists
Disabled
Security Center Email notification for high severity alerts should be enabled
To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center.
AuditIfNotExists
Disabled
Security Center Email notification to subscription owner for high severity alerts should be enabled
To ensure your subscription owners are notified when there is a potential security breach in their subscription, set email notifications to subscription owners for high severity alerts in Security Center.
AuditIfNotExists
Disabled
Security Center Guest accounts with owner permissions on Azure resources should be removed
External accounts with owner permissions should be removed from your subscription in order to prevent unmonitored access.
AuditIfNotExists
Disabled
Security Center Guest accounts with read permissions on Azure resources should be removed
External accounts with read privileges should be removed from your subscription in order to prevent unmonitored access.
AuditIfNotExists
Disabled
Security Center Guest accounts with write permissions on Azure resources should be removed
External accounts with write privileges should be removed from your subscription in order to prevent unmonitored access.
AuditIfNotExists
Disabled
Security Center Guest Configuration extension should be installed on your machines
To ensure secure configurations of in-guest settings of your machine, install the Guest Configuration extension. In-guest settings that the extension monitors include the configuration of the operating system, application configuration or presence, and environment settings. Once installed, in-guest policies will be available such as 'Windows Exploit guard should be enabled'. Learn more at https://aka.ms/gcpol.
AuditIfNotExists
Disabled
Security Center Internet-facing virtual machines should be protected with network security groups
Protect your virtual machines from potential threats by restricting access to them with network security groups (NSG). Learn more about controlling traffic with NSGs at https://aka.ms/nsg-doc
AuditIfNotExists
Disabled
Security Center IP Forwarding on your virtual machine should be disabled
Enabling IP forwarding on a virtual machine's NIC allows the machine to receive traffic addressed to other destinations. IP forwarding is rarely required (e.g., when using the VM as a network virtual appliance), and therefore, this should be reviewed by the network security team.
AuditIfNotExists
Disabled
Security Center Machines should have secret findings resolved
Audits virtual machines to detect whether they contain secret findings from the secret scanning solutions on your virtual machines.
AuditIfNotExists
Disabled
Security Center Management ports of virtual machines should be protected with just-in-time network access control
Possible network Just In Time (JIT) access will be monitored by Azure Security Center as recommendations
AuditIfNotExists
Disabled
Security Center Management ports should be closed on your virtual machines
Open remote management ports are exposing your VM to a high level of risk from Internet-based attacks. These attacks attempt to brute force credentials to gain admin access to the machine.
AuditIfNotExists
Disabled
Security Center Microsoft Defender CSPM should be enabled
Defender Cloud Security Posture Management (CSPM) provides enhanced posture capabilities and a new intelligent cloud security graph to help identify, prioritize, and reduce risk. Defender CSPM is available in addition to the free foundational security posture capabilities turned on by default in Defender for Cloud.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for APIs should be enabled
Microsoft Defender for APIs brings new discovery, protection, detection, & response coverage to monitor for common API based attacks & security misconfigurations.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for Containers should be enabled
Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for SQL should be enabled for unprotected Synapse workspaces
Enable Defender for SQL to protect your Synapse workspaces. Defender for SQL monitors your Synapse SQL to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for SQL status should be protected for Arc-enabled SQL Servers
Microsoft Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, discovering and classifying sensitive data. Once enabled, the protection status indicates that the resource is actively monitored. Even when Defender is enabled, multiple configuration settings should be validated on the agent, machine, workspace and SQL server to ensure active protection.
Audit
Disabled
Security Center Microsoft Defender for Storage should be enabled
Microsoft Defender for Storage detects potential threats to your storage accounts. It helps prevent the three major impacts on your data and workload: malicious file uploads, sensitive data exfiltration, and data corruption. The new Defender for Storage plan includes Malware Scanning and Sensitive Data Threat Detection. This plan also provides a predictable pricing structure (per storage account) for control over coverage and costs.
AuditIfNotExists
Disabled
Security Center Non-internet-facing virtual machines should be protected with network security groups
Protect your non-internet-facing virtual machines from potential threats by restricting access with network security groups (NSG). Learn more about controlling traffic with NSGs at https://aka.ms/nsg-doc
AuditIfNotExists
Disabled
Security Center Role-Based Access Control (RBAC) should be used on Kubernetes Services
To provide granular filtering on the actions that users can perform, use Role-Based Access Control (RBAC) to manage permissions in Kubernetes Service Clusters and configure relevant authorization policies.
Audit
Disabled
Security Center Setup subscriptions to transition to an alternative vulnerability assessment solution
Microsoft Defender for cloud offers vulnerability scanning for your machines at no extra cost. Enabling this policy will cause Defender for Cloud to automatically propagate the findings from the built-in Microsoft Defender vulnerability management solution to all supported machines.
DeployIfNotExists
Disabled
Security Center SQL databases should have vulnerability findings resolved
Monitor vulnerability assessment scan results and recommendations for how to remediate database vulnerabilities.
AuditIfNotExists
Disabled
Security Center SQL server-targeted autoprovisioning should be enabled for SQL servers on machines plan
To ensure your SQL VMs and Arc-enabled SQL Servers are protected, ensure the SQL-targeted Azure Monitoring Agent is configured to automatically deploy. This is also necessary if you've previously configured autoprovisioning of the Microsoft Monitoring Agent, as that component is being deprecated. Learn more: https://aka.ms/SQLAMAMigration
AuditIfNotExists
Disabled
Security Center SQL servers on machines should have vulnerability findings resolved
SQL vulnerability assessment scans your database for security vulnerabilities, and exposes any deviations from best practices such as misconfigurations, excessive permissions, and unprotected sensitive data. Resolving the vulnerabilities found can greatly improve your database security posture.
AuditIfNotExists
Disabled
Security Center Subnets should be associated with a Network Security Group
Protect your subnet from potential threats by restricting access to it with a Network Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your subnet.
Disabled
AuditIfNotExists
Security Center Subscriptions should have a contact email address for security issues
To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, set a security contact to receive email notifications from Security Center.
AuditIfNotExists
Disabled
Security Center System updates should be installed on your machines (powered by Update Center)
Your machines are missing system, security, and critical updates. Software updates often include critical patches to security holes. Such holes are frequently exploited in malware attacks so it's vital to keep your software updated. To install all outstanding patches and secure your machines, follow the remediation steps.
AuditIfNotExists
Disabled
Security Center There should be more than one owner assigned to your subscription
It is recommended to designate more than one subscription owner in order to have administrator access redundancy.
AuditIfNotExists
Disabled
Security Center Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity
The Guest Configuration extension requires a system assigned managed identity. Azure virtual machines in the scope of this policy will be non-compliant when they have the Guest Configuration extension installed but do not have a system assigned managed identity. Learn more at https://aka.ms/gcpol
AuditIfNotExists
Disabled

Policy Parameters by Policy

Category Policy Landing Zones Platform Production Identity Corp Decommissioned Management Connectivity Sandbox
Security Center Configure machines to receive a vulnerability assessment provider
Azure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed.
vulnerabilityAssessmentProvider = mdeTvm
Security Center Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL
Configure Windows SQL Virtual Machines to automatically install the Microsoft Defender for SQL extension. Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations).
workspaceRegion = **<br/>bringYourOwnDcr = **`true`**<br/>userWorkspaceId = ** workspaceRegion = australiaeast
dcrResourceId = **<br/>bringYourOwnDcr = **`true`**<br/>userWorkspaceId = **
Security Center Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL and DCR with a user-defined LA workspace
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace.
userWorkspaceResourceId = ``
enableCollectionOfSqlQueriesForSecurity... = false
userWorkspaceResourceId = ``
enableCollectionOfSqlQueriesForSecurity... = false
Security Center Create and assign a built-in user-assigned managed identity
Create and assign a built-in user-assigned managed identity at scale to SQL virtual machines.
builtInIdentityResourceGroupLocation = eastus bringYourOwnUserAssignedManagedIdentity = true
builtInIdentityResourceGroupLocation = eastus
userAssignedIdentityResourceId = ``
Security Center Deploy export to Log Analytics workspace for Microsoft Defender for Cloud data
Enable export to Log Analytics workspace of Microsoft Defender for Cloud data. This policy deploys an export to Log Analytics workspace configuration with your conditions and target workspace on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task.
ascExportResourceGroupName = asc-export
ascExportResourceGroupLocation = ``
createResourceGroup = true
Security Center Deploy Microsoft Defender for Cloud Security Contacts
Deploy Microsoft Defender for Cloud Security Contacts
minimalSeverity = High
emailSecurityContact = ``
⚠️ **GitHub.com Fallback** ⚠️