LOW
Source
CloudSploit
ID
email-account-admins-enabled

Email Account Admins Enabled

Ensures that email account admins is enabled in advanced data security for SQL servers.

Enabling email account admins in advanced data security on all SQL servers ensures that monitored data for unusual activity, vulnerabilities, and threats get sent to the account admins and subscription owners.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log in to the Microsoft Azure Management Console.

  2. Select the “Search resources, services, and docs” option at the top and search for “SQL servers”. Step

  3. On the “SQL server” page, select the SQL server that needs to be examined. Step

  4. On the selected “SQL server” page, scroll down the left navigation panel and select “Microsoft defender for cloud” under “Security”.Step

  5. On the “Microsoft defender for cloud” page, click on “Configure” next to “Microsoft Defender for SQL”. Step

  6. On the “Server settings” page, scroll down to “ADVANCED THREAT PROTECTION SETTINGS” and click on “Add your contact details to the subscription’s email settings in Defender for Cloud”.Step

  7. On the “Email notifications” page if there is no email address configured and no roles are selected then send alerts are not enabled.Step

  8. To ensure that send email notification to admins and subscription owners is enabled, under “Email receipients” select “Owner”, “AccountAdmin”. ServiceAdmin" from the dropdown and assign an email for “Additional emal addresses”. Step

  9. In the “Notification types” checkmark “Notify about alerts with the following severity (or higher)” and select “High” from the dropdown.Step

  10. Click “Save” at the top to make the necessary changes.Step

  11. Repeat steps 3-10 to ensure that send email notification to admins and subscription owners is enabled in advanced threat protections for all SQL servers.