Skip to content

Commit 19611eb

Browse files
authored
Merge pull request #2562 from ElazarK/wi556158-MMA-article-replaced
WI556158 added article back in
2 parents d55b27a + 2d2da3e commit 19611eb

3 files changed

Lines changed: 58 additions & 1 deletion

File tree

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -462,7 +462,7 @@
462462
},
463463
{
464464
"source_path_from_root": "/articles/defender-for-cloud/identify-sql-servers-protected-by-mma.md",
465-
"redirect_url": "/azure/defender-for-cloud/defender-for-sql-servers-introduction",
465+
"redirect_url": "/azure/defender-for-cloud/identify-sql-servers-protected-by-monitor-agent",
466466
"redirect_document_id": false
467467
},
468468
{

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,9 @@
145145
- name: Update Defender for SQL Servers on Machines plan configuration
146146
displayName: SQL, SQL servers, defender, machines
147147
href: update-sql-machine-configuration.md
148+
- name: Identify SQL Servers protected by Microsoft Monitoring Agent
149+
displayName: SQL, SQL servers, defender, machines, identify, Microsoft Monitoring Agent, MMA
150+
href: identify-sql-servers-protected-by-monitor-agent.md
148151
- name: Verify SQL machine protection
149152
displayName: SQL, SQL servers, defender, machines
150153
href: verify-machine-protection.md
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: Identify SQL Servers protected by Microsoft Monitoring Agent
3+
description: Learn how to identify SQL servers protected by the Microsoft Monitoring Agent (MMA) in your environment without having Azure Arc installed
4+
ms.topic: how-to
5+
ms.date: 02/26/2026
6+
ms.author: Elkrieger
7+
author: ElazarK
8+
# customer intent: As a user, I want to learn how to identify SQL servers that are protected by Microsoft Monitoring Agent (MMA) in my environment so that I can assess their security posture.
9+
---
10+
11+
# Identify SQL Servers protected by Microsoft Monitoring Agent
12+
13+
Microsoft Defender for Cloud's Defender for SQL Server on Machines plan provides database security to protect SQL Server instances hosted on Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises machines. With the retirement of the Microsoft Monitoring Agent (MMA), on August 1,2024, the Defender for SQL Server on Machines plan requires meeting the [required perquisites](defender-for-sql-usage.md#prerequisites) and deploying Azure Arc on all non-Azure SQL Server instances.
14+
15+
Once Azure Arc is deployed and following the [release on the updated agent](release-notes-archive.md#update-to-defender-for-sql-servers-on-machines-plan), your SQL Server instances will migrate automatically and seamlessly to the updated agent. To ensure your SQL servers are correctly protected, we recommend the [installation of Azure Arc](quickstart-onboard-machines.md#connect-on-premises-machines-by-using-azure-arc).
16+
17+
> [!NOTE]
18+
> This change might affect your pricing. For information regarding the plan pricing, review [Microsoft Defender for Cloud pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
19+
20+
## Determine which SQL servers are protected by the legacy MMA
21+
22+
You can identify SQL servers onboarded to the Defender for SQL Server on Machines plan with the legacy MMA in your environment without Azure Arc installed.
23+
24+
1. Sign in to the [Azure portal](https://portal.azure.com).
25+
26+
1. Search for and select **Azure Resource Graph Explorer**.
27+
28+
1. Copy and paste the following query into the query window:
29+
30+
```kusto
31+
securityresources
32+
| where type == "microsoft.security/assessments/subassessments"
33+
| extend assessmentKey = extract(@"(?i)providers/Microsoft.Security/assessments/([^/]*)", 1, id)
34+
| where assessmentKey == "f97aa83c-9b63-4f9a-99f6-b22c4398f936"
35+
| where tostring(properties.resourceDetails.source) == "OnPremiseSql"
36+
| extend lastScanTime = todatetime(properties.timeGenerated)
37+
| where lastScanTime > ago(30d)
38+
| extend machineName = tostring(properties.resourceDetails.machineName)
39+
| extend machineUuid = tostring(properties.resourceDetails.vmuuid)
40+
| distinct machineName, machineUuid
41+
```
42+
43+
1. Select **Run query**.
44+
45+
:::image type="content" source="media/identify-sql-servers-protected-by-mma/run-query.png" alt-text="Screenshot that shows the pasted query and where to find the Run query button." lightbox="media/identify-sql-servers-protected-by-mma/run-query.png":::
46+
47+
1. For any results returned, [connect hybrid machines with Azure Arc-enabled servers](/azure/azure-arc/servers/learn/quick-enable-hybrid-vm).
48+
49+
## Related content
50+
51+
- [Upcoming changes to Defender for SQL servers on Machines plan](release-notes-archive.md#update-to-defender-for-sql-servers-on-machines-plan)
52+
- [Enable Defender for SQL Servers on Machines](defender-for-sql-usage.md)
53+
- [Verify SQL machine protection](verify-machine-protection.md)
54+
- [Troubleshoot Defender for SQL on Machines configuration](troubleshoot-sql-machines-guide.md)

0 commit comments

Comments
 (0)