Key Features
- Routine Scanning: Continuously monitors your system with scheduled scans to ensure ongoing protection.
- Comprehensive Reporting: Offers detailed vulnerability reports with severity levels and tailored guidance on remediation.
- Real-Time Alerts: Sends immediate notifications for high-risk vulnerabilities, enabling fast response actions similar to Azure ATP.
- Compliance Support: Generates compliance-ready reports to help meet various data protection standards and regulations.
- Baseline Management: Lets you define an acceptable configuration baseline for your database. Any deviation triggers automatic alerts for all administrators.
Accessing Vulnerability Assessment in Defender for Cloud
If you have already enabled vulnerability assessment for your server within Microsoft Defender for Cloud, accessing the assessment results is straightforward. When you navigate to the Defender for Cloud dashboard, you will see the vulnerability assessment findings displayed prominently. If the feature is not yet enabled, a prompt will appear at the top of the page inviting you to activate it. Once enabled, if no findings are visible immediately because the tool was just activated, click the provided link to navigate to the findings page. From there, you can initiate a database scan by selecting the Scan option. Once the scan is complete, vulnerabilities are organized by severity.In our example scenario, the assessment detected one medium severity vulnerability. The detailed report includes valuable information to help resolve the issue.
Example Vulnerability Report
A sample vulnerability report might include details such as:- Vulnerability ID: VA1143
- Issue: DBA users should not be used for normal service operations
- Category: Surface Area Reduction
- Benchmark: FedRAMP
- Severity: Medium
Vulnerability Assessment Rule Example
The following SQL query determines whether the database owner (DBO) account is being misused. The DBO account inherently has permissions to perform all activities within the database. This query checks for the presence of user accounts with a principal ID within a specific range.Avoid using the DBO account for normal service operations, as it exposes your database to unnecessary security risks.
Managing Baselines
This vulnerability assessment result is based on the FedRAMP benchmark. You have two options for managing the result:| Option | Description |
|---|---|
| Approve Baseline | If the current configuration is acceptable, add this result as a baseline to prevent it from appearing in future scans. |
| Remediate Issue | Alternatively, implement corrective actions by creating users with appropriate, limited privileges and addressing the issue. |