Skip to main content
Version: Next

Task 01: Enable Defender for Cloud

Runbook Azure

DOCUMENT CATEGORY: Runbook SCOPE: Defender for Cloud enablement PURPOSE: Enable security posture management MASTER REFERENCE: Microsoft Learn - Defender for Cloud

Status: Active


Microsoft Defender for Cloud provides cloud security posture management (CSPM) and cloud workload protection (CWP) for your Azure Local deployment. This step enables Defender plans and configures security policies.

Azure Local Requirements

For Azure Local deployments, Defender for Servers Plan 2 is recommended to provide:

  • Vulnerability assessment for Arc-enabled servers
  • Just-in-time VM access
  • File integrity monitoring
  • Adaptive application controls

Overview

Defender PlanPurposeRecommendation
Foundational CSPMFree security posture assessment✅ Always enabled
Defender for Servers P2Arc-enabled server protection✅ Required for Azure Local
Defender for Key VaultKey Vault threat protection✅ Recommended
Defender for Resource ManagerManagement plane protection✅ Recommended
Defender for StorageStorage account protection⚪ Optional
Defender for DNSDNS threat detection⚪ Optional

Prerequisites

  • Azure subscription with Owner or Security Administrator role
  • Log Analytics workspace created in Stage 06

Variables from variables.yml

VariableConfig PathExample
AZURE_SUBSCRIPTION_IDazure.subscription.id00000000-0000-0000-0000-000000000000
AZURE_RESOURCE_GROUPazure.resource_group.namerg-azurelocal-prod-eus2
LOG_ANALYTICS_WORKSPACE_NAMEmonitoring.log_analytics.workspace_namelaw-azl-DAL-prod-01
SECURITY_CONTACT_EMAILsecurity.contact_emailsecurity-team@contoso.com

Procedure

Enable Defender for Cloud

  1. Navigate to Defender for Cloud
  • In Azure Portal, search for Microsoft Defender for Cloud
  • Click Environment settings in the left menu
  1. Select Your Subscription
  • Expand your management group hierarchy
  • Click on your Azure Local subscription
  1. Enable Defender Plans
  • Toggle ON for the following plans:
  • Servers → Select Plan 2
  • Key Vault → Toggle ON
  • Resource Manager → Toggle ON
  • Click Save
  1. Configure Auto-Provisioning
  • Click Settings & monitoring
  • Enable Log Analytics agent or Azure Monitor Agent
  • Select your Log Analytics workspace from Stage 06
  • Enable Vulnerability assessment for machines
  • Click Save
  1. Configure Security Policies
  • Go to Environment settings → Your subscription
  • Click Security policy
  • Ensure Azure Security Benchmark is assigned
  • Click Add more standards to add custom initiatives

Configure Email Notifications

  1. Navigate to Email Notifications
  • In Defender for Cloud, go to Environment settings
  • Select your subscription
  • Click Email notifications
  1. Configure Alerts
  • Enter email addresses for security alerts
  • Select alert severity: High and Medium
  • Toggle Also notify subscription owners
  • Click Save

Validation

# Check Defender pricing tiers
$pricingTiers = Get-AzSecurityPricing
Write-Host "Defender Plan Status:" -ForegroundColor Cyan
$pricingTiers | Where-Object { $_.PricingTier -eq "Standard" } | Format-Table Name, PricingTier -AutoSize

# Check auto-provisioning
$autoProvision = Get-AzSecurityAutoProvisioningSetting
Write-Host "`nAuto-Provisioning: $($autoProvision.AutoProvision)" -ForegroundColor Cyan

# Check workspace setting
$workspaceSetting = Get-AzSecurityWorkspaceSetting
Write-Host "Workspace: $($workspaceSetting.WorkspaceId)" -ForegroundColor Cyan

Expected Output

Defender Plan Status:
Name PricingTier
---- -----------
VirtualMachines Standard
KeyVaults Standard
Arm Standard
StorageAccounts Standard

Auto-Provisioning: On
Workspace: /subscriptions/.../workspaces/law-azlmgmt-prod-eus2

Cost Considerations

PlanCost ModelEstimated Monthly Cost
Defender for Servers P2Per server/hour~$15/server/month
Defender for Key VaultPer 10K transactions~$0.02/10K transactions
Defender for Resource ManagerPer subscription~$4/subscription/month
note

Costs vary based on usage. Use Azure Pricing Calculator for accurate estimates.


Troubleshooting

IssueCauseResolution
Defender plans not visible in portalSubscription not registered for Microsoft.Security providerRegister provider: Register-AzResourceProvider -ProviderNamespace Microsoft.Security; wait 5 minutes
Email notifications not receivedAction Group email not configured or in spamVerify Action Group configuration in Monitor > Alerts > Action Groups; check spam/junk folders
Defender shows no recommendationsInitial scan not yet completeWait 24 hours after enabling plans for the first assessment cycle to complete

Next Steps

Proceed to Task 3: Apply Azure Policy Initiatives to enforce compliance policies.


PreviousUpNext
← Phase 02: Monitoring & ObservabilityPhase 04: Security & GovernanceTask 02: Azure Policy →

VersionDateAuthorChanges
1.0.02026-03-24Azure Local Cloudnology TeamInitial release