This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can trysigning in orchanging directories.
Access to this page requires authorization. You can trychanging directories.
Applies to:SQL Server
You can configure your instance of SQL Server enabled by Azure Arc with Microsoft Defender for Cloud by following these steps.
Your Windows-based SQL Server instance is connected to Azure. Follow the instructions toConnect your SQL Server to Azure Arc.
Note
Microsoft Defender for Cloud is only supported for SQL Server instances on Windows machines. This will not work for SQL Server on Linux machines.
Your user account is assigned one of theSecurity Center Roles (RBAC)
Search forLog Analytics workspaces resource type and add a new one through the creation pane.
Note
You can use a Log Analytics workspace in any region so if you already have one, you can use it. But we recommend creating it in the same region where your SQL Server enabled by Azure Arc resource is created.
Go toAgents management > Log Analytics agent instructions and copy Workspace ID and Primary key for later use.
The next step is needed only if you haven't yet configured MMA on the remote machine.
Go toAzure Arc > Servers and open the Azure Arc-enabled server resource for the machine where the SQL Server instance is installed.
Open theExtensions pane and click+ Add.
SelectLog Analytics Agent - Azure Arc and clickNext.
Set the Workspace ID and Workspace key using the values you saved in the previous step.
After validation succeeds, selectCreate to install the agent. When the deployment completes, the status updates toSucceeded.
For more information, seeExtension management with Azure Arc.
Go toAzure Arc > SQL Servers and open the Azure Arc-enabled SQL Server resource for the instance that you want to protect.
Click on theMicrosoft Defender for Cloud tile. If Enablement Status showsDisabled at the subscription-level, follow the steps documented inEnable Microsoft Defender for SQL servers on machines.
Note
The first scan to generate the vulnerability assessment happens within 24 hours after enabling Microsoft Defender for Cloud. Successive scans run automatically every Sunday.
Explore security anomalies and threats in Azure Security Center.
Open your SQL Server – Azure Arc resource and selectMicrosoft Defender for Cloud in theSettings section of the left menu. to see the recommendations and alerts for that SQL Server instance.

Select any of the recommendations to see the vulnerability details.

Select any security alert for full details and further explore the attack. The following diagram is an example of the Potential SQL Injection alert.

SelectTake action to mitigate the alert.

Was this page helpful?
Need help with this topic?
Want to try using Ask Learn to clarify or guide you through this topic?
Was this page helpful?
Want to try using Ask Learn to clarify or guide you through this topic?