Introduction to Microsoft Defender for open-source relational databases
This plan brings threat protections for the following open-source relational databases:
Defender for Cloud detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. The plan makes it simple to address potential threats to databases without the need to be a security expert or manage advanced security monitoring systems.
|Release state:||General availability (GA)|
|Pricing:||Microsoft Defender for open-source relational databases is billed as shown on the pricing page|
Azure Arc-enabled machines
|Protected versions of PostgreSQL:||Single Server - General Purpose and Memory Optimized. Learn more in PostgreSQL pricing tiers.|
|Protected versions of MySQL:||Single Server - General Purpose and Memory Optimized. Learn more in MySQL pricing tiers.|
|Protected versions of MariaDB:||General Purpose and Memory Optimized. Learn more in MariaDB pricing tiers.|
Azure China 21Vianet
What are the benefits of Microsoft Defender for open-source relational databases?
Defender for Cloud provides security alerts on anomalous activities so that you can detect potential threats and respond to them as they occur.
When you enable this plan, Defender for Cloud will provide alerts when it detects anomalous database access and query patterns as well as suspicious database activities.
These alerts appear in Defender for Cloud's security alerts page and include:
- details of the suspicious activity that triggered them
- the associated MITRE ATT&CK tactic
- recommended actions for how to investigate and mitigate the threat
- options for continuing your investigations with Microsoft Sentinel
What kind of alerts does Microsoft Defender for open-source relational databases provide?
Threat intelligence enriched security alerts are triggered when there are:
- Anomalous database access and query patterns - For example, an abnormally high number of failed sign-in attempts with different credentials (a brute force attempt)
- Suspicious database activities - For example, a legitimate user accessing an SQL Server from a breached computer which communicated with a crypto-mining C&C server
- Brute-force attacks – With the ability to separate simple brute force from brute force on a valid user or a successful brute force
View the full list of security alerts for database servers in the alerts reference page.
In this article, you learned about Microsoft Defender for open-source relational databases.
Submit and view feedback for