This reference implementation is based on Cloud Adoption Framework for Azure and provides an opinionated implementation that enables ITSG-33 regulatory compliance by using NIST SP 800-53 Rev. 4 and Canada Federal PBMM Regulatory Compliance Policy Sets.
MIT License
124
stars
86
forks
source link
Log Analytics solutions for SQL servers on machines #302
Add SQLAdvancedThreatProtection and SQLVulnerabilityAssessment as solutions to Log Analytics Workspace.
These two solutions enable support for SQL servers on machines defender plan.
SQLAdvancedThreatProtection
Detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your SQL server.
It continuously monitors your database for suspicious activities and provides action-oriented security alerts on anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
SQLVulnerabilityAssessment
A database scanning service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and includes actionable steps to resolve security issues and enhance your database fortifications.
Add
SQLAdvancedThreatProtection
andSQLVulnerabilityAssessment
as solutions to Log Analytics Workspace.These two solutions enable support for SQL servers on machines defender plan.
SQLAdvancedThreatProtection Detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your SQL server. It continuously monitors your database for suspicious activities and provides action-oriented security alerts on anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
SQLVulnerabilityAssessment A database scanning service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and includes actionable steps to resolve security issues and enhance your database fortifications.