Ensure that Microsoft Defender for Cloud is enabled for all the cloud resources that use DNS's Azure-provided name resolution capability. Microsoft Defender for Cloud monitors the queries from the associated resources and detects suspicious activities without the need for any additional agents or scripts.
By default, Microsoft Defender for Cloud is disabled for cloud resources that use the Azure DNS service. Microsoft Defender for Cloud automatically detects suspicious and anomalous activities such as malware, communication with malicious DNS resolvers, data exfiltration from cloud resources using DNS tunneling, traffic with domains used for malicious activities such as phishing and cryptomining (cryptojacking).
Defender for DNS remains active for existing Azure subscribers (legacy). For new customers, Defender for DNS is no longer offered as a separate plan. All Defender for DNS features are now included in Microsoft Defender for Servers P2.
Audit
To determine if Microsoft Defender for Cloud is enabled for resources that use Azure DNS, perform the following operations:
Remediation / Resolution
To enable Microsoft Defender for Cloud for resources that use DNS's Azure-provided name resolution capability, perform the following operations:
Turning on Microsoft Defender for Cloud for Azure DNS-enabled resources incurs an additional cost per resource management operation.References
- Azure Official Documentation
- Microsoft Defender for Cloud documentation
- Microsoft Defender for Cloud overview
- Microsoft Defender for Cloud pricing
- Defender for Cloud-What's new archive
- Azure PowerShell Documentation
- az account list
- az account set
- az security pricing list
- az security pricing create