Skip to content

Commit 429f72b

Browse files
Resolved merge conflict, small fixes and Acrolinx check
1 parent 1e2fa59 commit 429f72b

2 files changed

Lines changed: 10 additions & 11 deletions

File tree

azure-sql/database/azure-defender-for-sql.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender for SQL
33
description: Learn about functionality for managing your database vulnerabilities and detecting anomalous activities that could indicate a threat to your database in Azure SQL Database, Azure SQL Managed Instance, or Azure Synapse.
44
author: bmansheim
55
ms.author: benmansheim
6-
ms.date: 01/10/2023
6+
ms.date: 01/16/2023
77
ms.service: sql-db-mi
88
ms.subservice: security
99
ms.topic: conceptual
@@ -20,7 +20,7 @@ Microsoft Defender for SQL is a Defender plan in Microsoft Defender for Cloud. M
2020

2121
Microsoft Defender for SQL provides a set of advanced SQL security capabilities, including SQL Vulnerability Assessment and Advanced Threat Protection.
2222

23-
- [Vulnerability Assessment](sql-vulnerability-assessment.md) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
23+
- [Vulnerability Assessment](https://learn.microsoft.com/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview?view=azuresql&branch=pr-en-us-25242&viewFallbackFrom=azuresql-mi) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
2424
- [Advanced Threat Protection](threat-detection-overview.md) detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your database. It continuously monitors your database for suspicious activities, and it provides immediate security alerts on potential vulnerabilities, Azure SQL injection attacks, and anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
2525

2626
Enable Microsoft Defender for SQL once to enable all these included features. With one select, you can enable Microsoft Defender for all databases on your [server](logical-servers.md) in Azure or in your SQL Managed Instance. Enabling or managing Microsoft Defender for SQL settings requires belonging to the [SQL security manager](/azure/role-based-access-control/built-in-roles#sql-security-manager) role, or one of the database or server admin roles.
@@ -55,7 +55,7 @@ To enable Microsoft Defender for Azure SQL Database at the subscription level fr
5555

5656
The flexibility of Azure allows for several programmatic methods for enabling Microsoft Defender plans.
5757

58-
Use any of the following tools to enable Microsoft Defender for your subscription:
58+
Use any of the following tools to enable Microsoft Defender for your subscription:
5959

6060
| Method | Instructions |
6161
|--------------|----------------------|
@@ -64,7 +64,6 @@ Use any of the following tools to enable Microsoft Defender for your subscriptio
6464
| PowerShell | [Set-AzSecurityPricing](/powershell/module/az.security/set-azsecuritypricing) |
6565
| Azure Policy | [Bundle Pricings](https://github.com/Azure/Azure-Security-Center/blob/master/Pricing%20%26%20Settings/ARM%20Templates/Set-ASC-Bundle-Pricing.json) |
6666

67-
6867
### Enable Microsoft Defender for Azure SQL Database at the resource level
6968

7069
We recommend enabling Microsoft Defender plans at the subscription level so that new resources are automatically protected. However, if you have an organizational reason to enable Microsoft Defender for Cloud at the server level, use the following steps:
@@ -100,4 +99,4 @@ To view and manage Microsoft Defender for SQL settings:
10099

101100
- Learn more about [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
102101
- Learn more about [Advanced Threat Protection](threat-detection-configure.md)
103-
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
102+
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)

azure-sql/database/sql-database-vulnerability-assessment-storage.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Provides instructions on how to store Vulnerability Assessment (VA)
44
ms.author: cesanu
55
author: CESANU
66
ms.reviewer: wiassaf, vanto, mathoma
7-
ms.date: 12/29/2022
7+
ms.date: 01/16/2023
88
ms.service: sql-db-mi
99
ms.subservice: security
1010
ms.topic: how-to
@@ -42,13 +42,13 @@ Ensure that **Allow trusted Microsoft services access to this storage account**
4242

4343
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-allow-microsoft-services.png" alt-text="Screenshot showing Firewall and virtual networks dialog box, with Allow trusted Microsoft services to access this storage account selected.":::
4444

45-
To find out which storage account is being used, do the following:
45+
To find out which storage account is being used, do the following steps:
4646

4747
1. Go to your **SQL server** pane in the [Azure portal](https://portal.azure.com).
4848
1. Under **Security**, select **Defender for Cloud**.
4949
1. Select **Configure**.
5050

51-
:::image type="content" source="../database/media/azure-defender-for-sql/storage-account.png" alt-text="Screenshot showing set up vulnerability assessment.":::
51+
:::image type="content" source="../database/media/azure-defender-for-sql/storage-account.png" alt-text="Screenshot showing setup vulnerability assessment.":::
5252

5353
> [!NOTE]
5454
> You can set up email alerts to notify users in your organization to view or access the scan reports. To do this, ensure that you have SQL Security Manager and Storage Blob Data Reader permissions.
@@ -59,7 +59,7 @@ Since Azure SQL Managed Instance isn't a trusted Microsoft Service and has a dif
5959

6060
To support VA scans on Azure SQL Managed Instances, follow the below steps:
6161

62-
1. In the **SQL managed instance** pane, under the **Overview** heading, select the **Virtual network/subnet** link. This takes you to the **Virtual network** pane.
62+
1. In the **SQL managed instance** pane, under the **Overview** heading, select the **Virtual network/subnet** link. This link takes you to the **Virtual network** pane.
6363

6464
:::image type="content" source="../managed-instance/media/public-endpoint-configure/mi-overview.png" alt-text="Screenshot showing mi-overview2.":::
6565

@@ -119,7 +119,7 @@ The storage account might not appear in the storage account picker for several r
119119

120120
You might not be able to open a link in a notification email about scan results, or to view scan results if you don't have the required permissions, or if you use a browser that doesn't support opening or displaying scan results.
121121

122-
#### Permissions
122+
#### Required permissions
123123

124124
The following permissions are required to open links in email notifications about scan results or to view scan results:
125125

@@ -134,4 +134,4 @@ The Firefox browser doesn't support opening or displaying scan results view. We
134134

135135
- [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
136136
- [Create an Azure Storage account](/azure/storage/common/storage-account-create)
137-
- [Microsoft Defender for SQL](azure-defender-for-sql.md)
137+
- [Microsoft Defender for SQL](azure-defender-for-sql.md)

0 commit comments

Comments
 (0)