Skip to content

Commit f5c96f4

Browse files
Merge pull request #2563 from MicrosoftDocs/main
Auto Publish – main to live - 2026-02-26 12:00 UTC
2 parents c750774 + 19611eb commit f5c96f4

5 files changed

Lines changed: 88 additions & 38 deletions

File tree

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -462,7 +462,7 @@
462462
},
463463
{
464464
"source_path_from_root": "/articles/defender-for-cloud/identify-sql-servers-protected-by-mma.md",
465-
"redirect_url": "/azure/defender-for-cloud/defender-for-sql-servers-introduction",
465+
"redirect_url": "/azure/defender-for-cloud/identify-sql-servers-protected-by-monitor-agent",
466466
"redirect_document_id": false
467467
},
468468
{

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,9 @@
145145
- name: Update Defender for SQL Servers on Machines plan configuration
146146
displayName: SQL, SQL servers, defender, machines
147147
href: update-sql-machine-configuration.md
148+
- name: Identify SQL Servers protected by Microsoft Monitoring Agent
149+
displayName: SQL, SQL servers, defender, machines, identify, Microsoft Monitoring Agent, MMA
150+
href: identify-sql-servers-protected-by-monitor-agent.md
148151
- name: Verify SQL machine protection
149152
displayName: SQL, SQL servers, defender, machines
150153
href: verify-machine-protection.md

articles/defender-for-cloud/containers-permissions.md

Lines changed: 27 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -44,45 +44,38 @@ The Azure Arc built-in role **Defender Kubernetes Agent Operator** to provision
4444

4545
## AWS Agentless threat protection permissions
4646

47-
- AzureDefenderKubernetesRole:
48-
- sts:AssumeRole
49-
- sts:AssumeRoleWithWebIdentity
50-
- logs:PutSubscriptionFilter
51-
- logs:DescribeSubscriptionFilters
52-
- logs:DescribeLogGroups
53-
- logs:PutRetentionPolicy
54-
- firehose:*
55-
- iam:PassRole
56-
- eks:UpdateClusterConfig
57-
- eks:DescribeCluster
58-
- eks:CreateAccessEntry
59-
- eks:ListAccessEntries
60-
- eks:AssociateAccessPolicy
61-
- eks:ListAssociatedAccessPolicies
62-
- sqs:*
63-
- s3:*
47+
- AzureDefenderKubernetesRole (default role name: **MDCContainersK8sRole**):
6448

65-
- AzureDefenderKubernetesScubaReaderRole (default role name: **MDCContainersK8sDataCollectionRole**):
6649
- sts:AssumeRole
6750
- sts:AssumeRoleWithWebIdentity
68-
- sqs:ReceiveMessage
69-
- sqs:DeleteMessage
70-
- s3:GetObject
71-
- s3:GetBucketLocation
72-
73-
- AzureDefenderCloudWatchToKinesisRole (default role name: **MDCContainersK8sCloudWatchToKinesisRole**):
74-
- sts:AssumeRole
51+
- logs:PutSubscriptionFilter
52+
- logs:DescribeSubscriptionFilters
53+
- logs:DescribeLogGroups
54+
- logs:PutRetentionPolicy
7555
- firehose:*
56+
- iam:PassRole
57+
- eks:UpdateClusterConfig
58+
- eks:DescribeCluster
59+
- eks:CreateAccessEntry
60+
- eks:ListAccessEntries
61+
- eks:AssociateAccessPolicy
62+
- eks:ListAssociatedAccessPolicies
63+
- sqs:*
64+
- s3:*
7665

77-
- AzureDefenderKinesisToS3Role (default role name: **MDCContainersK8sKinesisToS3Role**):
78-
- sts:AssumeRole
79-
- s3:AbortMultipartUpload
80-
- s3:GetBucketLocation
81-
- s3:GetObject
82-
- s3:ListBucket
83-
- s3:ListBucketMultipartUploads
84-
- s3:PutObject
66+
- AzureDefenderKubernetesScubaReaderRole (default role name: **MDCContainersK8sDataCollectionRole**):
67+
- sts:AssumeRole
68+
- sts:AssumeRoleWithWebIdentity
69+
- sqs:ReceiveMessage
70+
- sqs:DeleteMessage
71+
- s3:GetObject
72+
- s3:GetBucketLocation
8573

74+
- AzureDefenderCloudWatchToKinesisRole (default role name: **MDCContainersK8sCloudWatchToKinesisRole**):
75+
- sts:AssumeRole
76+
- firehose:*
77+
78+
- AzureDefenderKinesisToS3Role (default role name: **MDCContainersK8sKinesisToS3Role**):
8679
- MDCContainersAgentlessDiscoveryK8sRole
8780
- sts:AssumeRoleWithWebIdentity
8881
- eks:UpdateClusterConfig
@@ -179,4 +172,4 @@ The following tables show the permissions granted to certain Defender for Contai
179172

180173
## Next steps
181174

182-
- [Containers support matrix in Defender for Cloud](support-matrix-defender-for-containers.md)
175+
- [Containers support matrix in Defender for Cloud](support-matrix-defender-for-containers.md)
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: Identify SQL Servers protected by Microsoft Monitoring Agent
3+
description: Learn how to identify SQL servers protected by the Microsoft Monitoring Agent (MMA) in your environment without having Azure Arc installed
4+
ms.topic: how-to
5+
ms.date: 02/26/2026
6+
ms.author: Elkrieger
7+
author: ElazarK
8+
# customer intent: As a user, I want to learn how to identify SQL servers that are protected by Microsoft Monitoring Agent (MMA) in my environment so that I can assess their security posture.
9+
---
10+
11+
# Identify SQL Servers protected by Microsoft Monitoring Agent
12+
13+
Microsoft Defender for Cloud's Defender for SQL Server on Machines plan provides database security to protect SQL Server instances hosted on Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises machines. With the retirement of the Microsoft Monitoring Agent (MMA), on August 1,2024, the Defender for SQL Server on Machines plan requires meeting the [required perquisites](defender-for-sql-usage.md#prerequisites) and deploying Azure Arc on all non-Azure SQL Server instances.
14+
15+
Once Azure Arc is deployed and following the [release on the updated agent](release-notes-archive.md#update-to-defender-for-sql-servers-on-machines-plan), your SQL Server instances will migrate automatically and seamlessly to the updated agent. To ensure your SQL servers are correctly protected, we recommend the [installation of Azure Arc](quickstart-onboard-machines.md#connect-on-premises-machines-by-using-azure-arc).
16+
17+
> [!NOTE]
18+
> This change might affect your pricing. For information regarding the plan pricing, review [Microsoft Defender for Cloud pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
19+
20+
## Determine which SQL servers are protected by the legacy MMA
21+
22+
You can identify SQL servers onboarded to the Defender for SQL Server on Machines plan with the legacy MMA in your environment without Azure Arc installed.
23+
24+
1. Sign in to the [Azure portal](https://portal.azure.com).
25+
26+
1. Search for and select **Azure Resource Graph Explorer**.
27+
28+
1. Copy and paste the following query into the query window:
29+
30+
```kusto
31+
securityresources
32+
| where type == "microsoft.security/assessments/subassessments"
33+
| extend assessmentKey = extract(@"(?i)providers/Microsoft.Security/assessments/([^/]*)", 1, id)
34+
| where assessmentKey == "f97aa83c-9b63-4f9a-99f6-b22c4398f936"
35+
| where tostring(properties.resourceDetails.source) == "OnPremiseSql"
36+
| extend lastScanTime = todatetime(properties.timeGenerated)
37+
| where lastScanTime > ago(30d)
38+
| extend machineName = tostring(properties.resourceDetails.machineName)
39+
| extend machineUuid = tostring(properties.resourceDetails.vmuuid)
40+
| distinct machineName, machineUuid
41+
```
42+
43+
1. Select **Run query**.
44+
45+
:::image type="content" source="media/identify-sql-servers-protected-by-mma/run-query.png" alt-text="Screenshot that shows the pasted query and where to find the Run query button." lightbox="media/identify-sql-servers-protected-by-mma/run-query.png":::
46+
47+
1. For any results returned, [connect hybrid machines with Azure Arc-enabled servers](/azure/azure-arc/servers/learn/quick-enable-hybrid-vm).
48+
49+
## Related content
50+
51+
- [Upcoming changes to Defender for SQL servers on Machines plan](release-notes-archive.md#update-to-defender-for-sql-servers-on-machines-plan)
52+
- [Enable Defender for SQL Servers on Machines](defender-for-sql-usage.md)
53+
- [Verify SQL machine protection](verify-machine-protection.md)
54+
- [Troubleshoot Defender for SQL on Machines configuration](troubleshoot-sql-machines-guide.md)

articles/defender-for-cloud/regional-availability.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ This article gives an overview of where you can use Microsoft Defender for Cloud
1818
### Defender for Servers P2 (Agentless scanning)
1919

2020
**Supported regions:**
21-
Asia East, Asia Southeast, Australia Central 2, Australia East, Australia Southeast, Brazil South, Canada Central, Canada East, Central US, East US, East US 2, France Central, Germany West Central, India Central, India South, India West, Japan East, Japan West, Korea Central, Korea South, New Zealand North, North Central US, North Europe, Norway East, Poland Central, Qatar Central, South Africa North, South Central US, Spain Central, Sweden Central, Switzerland North, UAE North, UK South, UK West, US Gov East, US Gov South Central, US Gov Southwest, West Central US, West Europe, West US, West US 2, West US 3
21+
Asia East, Asia Southeast, Australia Central 2, Australia East, Australia Southeast, Austria East, Belgium Central, Brazil South, Brazil Southeast, Canada Central, Canada East, Central US, Chile Central, East US, East US 2, France Central, Germany West Central, India Central, India South, India West, Israel North West, Japan East, Japan West, Korea Central, Korea South, Malaysia South, New Zealand North, North Central US, North Europe, Norway East, Poland Central, Qatar Central, South Africa North, South Central US, South East US, South East US 3, Spain Central, Sweden Central, Sweden South, Switzerland North, Taiwan North, Taiwan North West, UAE North, UK South, UK West, US Gov East, US Gov South Central, US Gov Southwest, West Central US, West Europe, West US, West US 2, West US 3
2222

2323
**Unsupported regions:**
24-
Asia Northeast, Austria East, Belgium Central, Brazil Southeast, Central US (EU Access Program), Chile Central, China East, China East 2, China East 3, China North, China North 2, China North 3, East US 2 (EU Access Program), EU SSLV, France South, Germany North, Indonesia Central, Israel Central, Israel North West, Italy North, Jio India Central, Jio India West, Malaysia South, Mexico Central, Norway West, South Africa West, South East US, South East US 3, South US 2, Sweden South, Switzerland West, Taiwan North, Taiwan North West, UAE Central, US DoD Central, US DoD East
24+
Asia Northeast, Central US (EU Access Program), China East, China East 2, China East 3, China North, China North 2, China North 3, East US 2 (EU Access Program), EU SSLV, France South, Germany North, Indonesia Central, Israel Central, Italy North, Jio India Central, Jio India West, Mexico Central, Norway West, South Africa West, South US 2, Switzerland West, UAE Central, US DoD Central, US DoD East
2525

2626
### Defender for Servers P1
2727

@@ -35,7 +35,7 @@ Asia East, Asia Southeast, Asia Northeast, Australia Central 2, Australia East,
3535
**Unsupported regions:**
3636
Austria East, Belgium Central, Chile Central, China East 2, China North, China North 2, China North 3, EU SSLV, India West, Indonesia Central, Israel North West, Jio India Central, Jio India West, Malaysia South, South East US 3, South US 2, Taiwan North, Taiwan North West, UAE Central, US DoD Central, US DoD East
3737

38-
****** Supported via API management only.
38+
***** Supported via API management only.
3939

4040
### Defender for Storage (Malware Scanning)
4141

0 commit comments

Comments
 (0)