Source | Azure Portal | ||||||||||||||
Display name | Configure Azure Defender for Servers to be disabled for resources (resource level) with the selected tag | ||||||||||||||
Id | 080fedce-9d4a-4d07-abf0-9f036afbc9c8 | ||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||
Category | Security Center - Granular Pricing Microsoft Learn |
||||||||||||||
Description | Azure Defender for Servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities. This policy will disable the Defender for Servers plan for all resources (VMs, VMSSs and ARC Machines) that have the selected tag name and tag value(s). | ||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | ||||||||||||||
Mode | Indexed | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | False | ||||||||||||||
Deprecated | False | ||||||||||||||
Effect | Default DeployIfNotExists Allowed DeployIfNotExists, Disabled |
||||||||||||||
RBAC role(s) |
|
||||||||||||||
Rule aliases | THEN-ExistenceCondition (1)
|
||||||||||||||
Rule resource types | IF (3) Microsoft.Compute/virtualMachines THEN-Deployment (1)Microsoft.Compute/virtualMachineScaleSets Microsoft.HybridCompute/machines |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage | none | ||||||||||||||
History |
|
||||||||||||||
JSON compare | n/a | ||||||||||||||
JSON |
|