You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/azure-defender-for-sql.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender for SQL
3
3
description: Learn about functionality for managing your database vulnerabilities and detecting anomalous activities that could indicate a threat to your database in Azure SQL Database, Azure SQL Managed Instance, or Azure Synapse.
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
-
ms.date: 01/10/2023
6
+
ms.date: 01/16/2023
7
7
ms.service: sql-db-mi
8
8
ms.subservice: security
9
9
ms.topic: conceptual
@@ -20,7 +20,7 @@ Microsoft Defender for SQL is a Defender plan in Microsoft Defender for Cloud. M
20
20
21
21
Microsoft Defender for SQL provides a set of advanced SQL security capabilities, including SQL Vulnerability Assessment and Advanced Threat Protection.
22
22
23
-
-[Vulnerability Assessment](sql-vulnerability-assessment.md) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
23
+
-[Vulnerability Assessment](https://learn.microsoft.com/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview?view=azuresql&branch=pr-en-us-25242&viewFallbackFrom=azuresql-mi) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
24
24
-[Advanced Threat Protection](threat-detection-overview.md) detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your database. It continuously monitors your database for suspicious activities, and it provides immediate security alerts on potential vulnerabilities, Azure SQL injection attacks, and anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
25
25
26
26
Enable Microsoft Defender for SQL once to enable all these included features. With one select, you can enable Microsoft Defender for all databases on your [server](logical-servers.md) in Azure or in your SQL Managed Instance. Enabling or managing Microsoft Defender for SQL settings requires belonging to the [SQL security manager](/azure/role-based-access-control/built-in-roles#sql-security-manager) role, or one of the database or server admin roles.
@@ -55,7 +55,7 @@ To enable Microsoft Defender for Azure SQL Database at the subscription level fr
55
55
56
56
The flexibility of Azure allows for several programmatic methods for enabling Microsoft Defender plans.
57
57
58
-
Use any of the following tools to enable Microsoft Defender for your subscription:
58
+
Use any of the following tools to enable Microsoft Defender for your subscription:
59
59
60
60
| Method | Instructions |
61
61
|--------------|----------------------|
@@ -64,7 +64,6 @@ Use any of the following tools to enable Microsoft Defender for your subscriptio
### Enable Microsoft Defender for Azure SQL Database at the resource level
69
68
70
69
We recommend enabling Microsoft Defender plans at the subscription level so that new resources are automatically protected. However, if you have an organizational reason to enable Microsoft Defender for Cloud at the server level, use the following steps:
@@ -100,4 +99,4 @@ To view and manage Microsoft Defender for SQL settings:
100
99
101
100
- Learn more about [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
102
101
- Learn more about [Advanced Threat Protection](threat-detection-configure.md)
103
-
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
102
+
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
Copy file name to clipboardExpand all lines: azure-sql/database/sql-database-vulnerability-assessment-storage.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Provides instructions on how to store Vulnerability Assessment (VA)
4
4
ms.author: cesanu
5
5
author: CESANU
6
6
ms.reviewer: wiassaf, vanto, mathoma
7
-
ms.date: 12/29/2022
7
+
ms.date: 01/16/2023
8
8
ms.service: sql-db-mi
9
9
ms.subservice: security
10
10
ms.topic: how-to
@@ -42,13 +42,13 @@ Ensure that **Allow trusted Microsoft services access to this storage account**
42
42
43
43
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-allow-microsoft-services.png" alt-text="Screenshot showing Firewall and virtual networks dialog box, with Allow trusted Microsoft services to access this storage account selected.":::
44
44
45
-
To find out which storage account is being used, do the following:
45
+
To find out which storage account is being used, do the following steps:
46
46
47
47
1. Go to your **SQL server** pane in the [Azure portal](https://portal.azure.com).
48
48
1. Under **Security**, select **Defender for Cloud**.
49
49
1. Select **Configure**.
50
50
51
-
:::image type="content" source="../database/media/azure-defender-for-sql/storage-account.png" alt-text="Screenshot showing set up vulnerability assessment.":::
> You can set up email alerts to notify users in your organization to view or access the scan reports. To do this, ensure that you have SQL Security Manager and Storage Blob Data Reader permissions.
@@ -59,7 +59,7 @@ Since Azure SQL Managed Instance isn't a trusted Microsoft Service and has a dif
59
59
60
60
To support VA scans on Azure SQL Managed Instances, follow the below steps:
61
61
62
-
1. In the **SQL managed instance** pane, under the **Overview** heading, select the **Virtual network/subnet** link. This takes you to the **Virtual network** pane.
62
+
1. In the **SQL managed instance** pane, under the **Overview** heading, select the **Virtual network/subnet** link. This link takes you to the **Virtual network** pane.
@@ -119,7 +119,7 @@ The storage account might not appear in the storage account picker for several r
119
119
120
120
You might not be able to open a link in a notification email about scan results, or to view scan results if you don't have the required permissions, or if you use a browser that doesn't support opening or displaying scan results.
121
121
122
-
#### Permissions
122
+
#### Required permissions
123
123
124
124
The following permissions are required to open links in email notifications about scan results or to view scan results:
125
125
@@ -134,4 +134,4 @@ The Firefox browser doesn't support opening or displaying scan results view. We
0 commit comments