Source | Azure Portal | |||||||||||||||||||||||||
Display name | Configure Azure Defender for open-source relational databases to be enabled | |||||||||||||||||||||||||
Id | 44433aa3-7ec2-4002-93ea-65c65ff0310a | |||||||||||||||||||||||||
Version | 1.0.0 Details on versioning |
|||||||||||||||||||||||||
Category | Security Center Microsoft Learn |
|||||||||||||||||||||||||
Description | Azure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center | |||||||||||||||||||||||||
Mode | All | |||||||||||||||||||||||||
Type | BuiltIn | |||||||||||||||||||||||||
Preview | False | |||||||||||||||||||||||||
Deprecated | False | |||||||||||||||||||||||||
Effect | Default DeployIfNotExists Allowed DeployIfNotExists, Disabled |
|||||||||||||||||||||||||
RBAC role(s) |
|
|||||||||||||||||||||||||
Rule aliases | THEN-ExistenceCondition (1)
|
|||||||||||||||||||||||||
Rule resource types | IF (1) Microsoft.Resources/subscriptions THEN-Deployment (1) Microsoft.Security/pricings |
|||||||||||||||||||||||||
Compliance |
The following 1 compliance controls are associated with this Policy definition 'Configure Azure Defender for open-source relational databases to be enabled' (44433aa3-7ec2-4002-93ea-65c65ff0310a)
| |||||||||||||||||||||||||
Initiatives usage |
|
|||||||||||||||||||||||||
History |
|
|||||||||||||||||||||||||
JSON compare | n/a | |||||||||||||||||||||||||
JSON |
|