Plan your Defender for Servers deployment

Microsoft Defender for Servers extends protection to your Windows and Linux machines that run in Azure, and on-premises. Defender for Servers integrates with Microsoft Defender for Endpoint to provide endpoint detection and response (EDR) and other threat protection features.

This guide helps you design and plan an effective Defender for Servers deployment. Microsoft Defender for Cloud offers two paid plans for Defender for Servers.

About this guide

The intended audience of this guide is cloud solution and infrastructure architects, security architects and analysts, and anyone who's involved in protecting cloud and hybrid servers and workloads.

The guide answers these questions:

  • What does Defender for Servers do and how is it deployed?
  • Where is my data stored and what Log Analytics workspaces do I need?
  • Who needs access to my Defender for Servers resources?
  • Which Defender for Servers plan should I choose and which vulnerability assessment solution should I use?
  • When do I need to use Azure Arc and which agents and extensions are required?
  • How do I scale a deployment?

Before you begin

Before you review the series of articles in the Defender for Servers planning guide:

Deployment overview

The following table shows an overview of the Defender for Servers deployment process:

Stage Details
Start protecting resources • When you open Defender for Cloud in the portal, it starts protecting resources with free foundational CSPM assessments and recommendations.

• Defender for Cloud creates a default Log Analytics workspace with the SecurityCenterFree solution enabled.

• Recommendations start appearing in the portal.
Enable Defender for Servers • When you enable a paid plan, Defender for Cloud enables the Security solution on its default workspace.

• After enabling a plan, decide how you want to install agents and extensions on Azure VMs in the subscription or workgroup.

•By default, auto-provisioning is enabled for some extensions.
Protect on-premises servers • Onboard them as Azure Arc machines and deploy agents with automation provisioning.
Foundational CSPM • There are no charges when you use foundational CSPM with no plans enabled.

• Some foundational recommendations rely only agents: Antimalware / endpoint protection (Log Analytics agent or Azure Monitor agent) | OS baselines recommendations (Log Analytics agent or Azure Monitor agent and Guest Configuration extension) |

When you enable Microsoft Defender for Servers on an Azure subscription, all of the connected machines are protected by Defender for Servers. You can enable Microsoft Defender for Servers at the Log Analytics workspace level, but only servers reporting to that workspace will be protected and billed and those servers won't receive some benefits, such as vulnerability assessment, and just-in-time VM access.

Next steps

After kicking off the planning process, review the second article in this planning series to understand how your data is stored, and Log Analytics workspace requirements.