MEDIUM
Source
CloudSploit
ID
server-auditing-enabled

Server Auditing Enabled

Ensures that SQL Server Auditing is enabled for SQL servers

Enabling SQL Server Auditing ensures that all activities are being logged properly, including potentially-malicious activity.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log in to the Microsoft Azure Management Console.

  2. Select the “Search resources, services, and docs” option at the top and search for “SQL servers”. Step

  3. On the “SQL server” page, select the SQL server that needs to be examined. Step

  4. On the selected “SQL server” page, scroll down the left navigation panel and select “Auditing” under “Security”.Step

  5. On the “Auditing” page, if “Azure SQL Auditing” and “Auditing of Microsoft support operations” is disabled then SQL Server Auditing for all activities are not being logged properly.Step

  6. To ensure that auditing is enabled for each SQL server, go to “Auditing” page and turn the toggle “ON” for “Enable Azure SQL Auditing” and under “Audit log destination” checkmark “Storage”, “Log Analytics”, “Event hub” selecting the “Subscription” and “Storage end points” under each section.Step

  7. Turn the toggle “ON” for “Auditing of Microsoft support operations” and under “Audit log destination” checkmark “Storage”, “Log Analytics”, “Event hub” selecting the “Subscription” and “Storage end points” under each section.Step

  8. Click on “Save” at the top to make the necessary changes.Step

  9. Repeat steps 3-8 to ensure that auditing is enabled for each SQL server.