Microsoft Azure

Azure SQL Database Threat Detection Enters Public Preview

Cloud Hero Azure

A few weeks back, Microsoft announced a slew of new features coming to Azure and one item, SQL Database Threat Detection, has entered public preview. The tool adds a new layer of security to a database by detecting irregular activities that can include threats like SQL injection attacks.

The intent of this feature is to help Azure customers maintain greater control over their databases and be more aware of activities occurring with their content. In addition to monitoring for live threats, using the SQL database auditing tool, admins can explore threat vectors and gain a better understanding of how and where an attack occurred.

Microsoft is promoting this new feature across four key principles:

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

  • Simple configuration of SQL threat detection policy via Azure portal.
  • Clear email alerts upon detection of suspicious databases queries indicating potential SQL injection events.
  • Ability to explore the audit log around the time of the event using the Azure portal or pre-configured excel template.
  • No need to modify database procedures or application code.

This new feature is another piece in Microsoft’s toolkit to help make its platform more secure. This week, the company announced that they have entered into an agreement to acquire Secure Islands, a company that focuses on securing data no matter where it is stored including mobile devices like iOS and Android.

The public cloud has many benefits to it for nearly any size corporation but one issue that will always be a stopping point, for some, is security. Microsoft is working to deliver unique solutions in this area to help set its cloud apart from its competitors but as attacks become more advanced, the company will always be looking for a way to always be one step ahead.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: