Introduction to Microsoft Defender for Storage
Azure Security Center and Azure Defender are now called Microsoft Defender for Cloud. We've also renamed Azure Defender plans to Microsoft Defender plans. For example, Azure Defender for Storage is now Microsoft Defender for Storage.
Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit your storage accounts. It utilizes the advanced capabilities of security AI and Microsoft Threat Intelligence to provide contextual security alerts and recommendations.
Security alerts are triggered when anomalous activities occur. These alerts appear in Microsoft Defender for Cloud, and are also sent via email to subscription administrators, with details of suspicious activity and recommendations for how to investigate and remediate threats.
|Release state:||General availability (GA)|
|Pricing:||Microsoft Defender for Storage is billed as shown on the pricing page|
|Protected storage types:||Blob Storage
Azure Data Lake Storage Gen2
Azure China 21Vianet
What are the benefits of Microsoft Defender for Storage?
Microsoft Defender for Storage provides:
- Azure-native security - With 1-click enablement, Defender for Storage protects data stored in Azure Blob, Azure Files, and Data Lakes. As an Azure-native service, Defender for Storage provides centralized security across all data assets managed by Azure and is integrated with other Azure security services such as Microsoft Sentinel.
- Rich detection suite - Powered by Microsoft Threat Intelligence, the detections in Defender for Storage cover the top storage threats such as anonymous access, compromised credentials, social engineering, privilege abuse, and malicious content.
- Response at scale - Defender for Cloud's automation tools make it easier to prevent and respond to identified threats. Learn more in Automate responses to Defender for Cloud triggers.
What kind of alerts does Microsoft Defender for Storage provide?
Security alerts are triggered when there's:
- Suspicious access patterns - such as successful access from a Tor exit node or from an IP considered suspicious by Microsoft Threat Intelligence
- Suspicious activities - such as anomalous data extraction or unusual change of access permissions
- Upload of malicious content - such as potential malware files (based on hash reputation analysis) or hosting of phishing content
Alerts include details of the incident that triggered them, as well as recommendations on how to investigate and remediate threats. Alerts can be exported to Microsoft Sentinel or any other third-party SIEM or any other external tool.
What is hash reputation analysis for malware?
To determine whether an uploaded file is suspicious, Microsoft Defender for Storage uses hash reputation analysis supported by Microsoft Threat Intelligence. The threat protection tools don’t scan the uploaded files, rather they examine the storage logs and compare the hashes of newly uploaded files with those of known viruses, trojans, spyware, and ransomware.
When a file is suspected to contain malware, Defender for Cloud displays an alert and can optionally email the storage owner for approval to delete the suspicious file. To set up this automatic removal of files that hash reputation analysis indicates contain malware, deploy a workflow automation to trigger on alerts that contain "Potential malware uploaded to a storage account”.
To enable Defender for Cloud's threat protection capabilities, you must enable enhanced security features on the subscription containing the applicable workloads.
You can enable Microsoft Defender for Storage at either the subscription level or resource level.
Trigger a test alert for Microsoft Defender for Storage
To test the security alerts from Microsoft Defender for Storage in your environment, generate the alert "Access from a Tor exit node to a storage account" with the following steps:
Open a storage account with Microsoft Defender for Storage enabled.
From the sidebar, select “Containers” and open an existing container or create a new one.
Upload a file to that container.
Don't upload a file containing sensitive data.
Use the context menu on the uploaded file to select “Generate SAS”.
Leave the default options and select Generate SAS token and URL.
Copy the generated SAS URL.
On your local machine, open the Tor browser.
You can download Tor from the Tor Project site https://www.torproject.org/download/.
In the Tor browser, navigate to the SAS URL.
Download the file you uploaded in step 3.
Within two hours you'll get the following security alert from Defender for Cloud:
In this article, you learned about Microsoft Defender for Storage.
For related material, see the following articles:
- Whether an alert is generated by Defender for Cloud, or received by Defender for Cloud from a different security product, you can export it. To export your alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in Exporting alerts to a SIEM.
- How to enable Advanced Defender for Storage
- The list of Microsoft Defender for Storage alerts
- Microsoft's threat intelligence capabilities