Source | Azure Portal | ||||||||||||||
Display name | Configure Azure Defender for Servers to be disabled for all resources (resource level) | ||||||||||||||
Id | f6ff485a-7630-4730-854d-cd3ad855435e | ||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||
Category | Security Center - Granular Pricing Microsoft Learn |
||||||||||||||
Description | Azure Defender for Servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities. This policy will disable the Defender for Servers plan for all resources (VMs, VMSSs and ARC Machines) in the selected scope (subscription or resource group). | ||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | ||||||||||||||
Mode | All | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | False | ||||||||||||||
Deprecated | False | ||||||||||||||
Effect | Default DeployIfNotExists Allowed DeployIfNotExists, Disabled |
||||||||||||||
RBAC role(s) |
|
||||||||||||||
Rule aliases | THEN-ExistenceCondition (1)
|
||||||||||||||
Rule resource types | IF (3) Microsoft.Compute/virtualMachines THEN-Deployment (1)Microsoft.Compute/virtualMachineScaleSets Microsoft.HybridCompute/machines |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage | none | ||||||||||||||
History |
|
||||||||||||||
JSON compare | n/a | ||||||||||||||
JSON |
|