You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/).
6
+
7
+
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://aka.ms/opensource/security/definition), please report it to us as described below.
8
+
9
+
## Reporting Security Issues
10
+
11
+
**Please do not report security vulnerabilities through public GitHub issues.**
12
+
13
+
Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report).
14
+
15
+
If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey).
16
+
17
+
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc).
18
+
19
+
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
20
+
21
+
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
22
+
* Full paths of source file(s) related to the manifestation of the issue
23
+
* The location of the affected source code (tag/branch/commit or direct URL)
24
+
* Any special configuration required to reproduce the issue
25
+
* Step-by-step instructions to reproduce the issue
26
+
* Proof-of-concept or exploit code (if possible)
27
+
* Impact of the issue, including how an attacker might exploit the issue
28
+
29
+
This information will help us triage your report more quickly.
30
+
31
+
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs.
32
+
33
+
## Preferred Languages
34
+
35
+
We prefer all communications to be in English.
36
+
37
+
## Policy
38
+
39
+
Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/opensource/security/cvd).
Copy file name to clipboardExpand all lines: azure-sql/database/advance-notifications.md
+21-17Lines changed: 21 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Get notification before planned maintenance for Azure SQL Database.
4
4
author: scott-kim-sql
5
5
ms.author: scottkim
6
6
ms.reviewer: wiassaf, mathoma, urosmil
7
-
ms.date: 04/04/2022
7
+
ms.date: 12/01/2022
8
8
ms.service: sql-db-mi
9
9
ms.subservice: service-overview
10
10
ms.topic: how-to
@@ -25,39 +25,43 @@ Notifications can be configured so you can get texts, emails, Azure push notific
25
25
26
26
## Configure an advance notification
27
27
28
-
Advance notifications are available for Azure SQL databases that have their maintenance window configured.
28
+
Advance notifications are available for Azure SQL databases that have their maintenance window configured and managed instances with any configuration (including the default one).
29
29
30
30
Complete the following steps to enable a notification.
31
31
32
32
1. Go to the [Planned maintenance](https://portal.azure.com/#blade/Microsoft_Azure_Health/AzureHealthBrowseBlade/plannedMaintenance) page, select **Health alerts**, then **Add service health alert**.
33
33
34
34
:::image type="content" source="media/advance-notifications/health-alerts.png" alt-text="create a new health alert menu option":::
35
+
36
+
2. In the **Scope** section, select subscription.
35
37
36
-
2. In the **Actions** section, select **Add action groups**.
38
+
:::image type="content" source="media/advance-notifications/select-subscription.png" alt-text="A screenshot of the Azure portal page where you select the subscription where you will be configuring the health alert.":::
37
39
38
-
:::image type="content" source="media/advance-notifications/add-action-group.png" alt-text="add an action group menu option":::
40
+
3. In the **Condition** section, configure service(s) to be alerted for, region(s) and criteria. For more generic alert, select all values. To narrow down, select Azure SQL Database or Azure SQL Managed Instance as a service, region(s) where you have those services deployed, and **Planned maintenance** for the event type.
39
41
40
-
3. Complete the **Create action group** form, then select **Next: Notifications**.
41
-
42
-
:::image type="content" source="media/advance-notifications/create-action-group.png" alt-text="create action group form":::
43
-
44
-
1. On the **Notifications** tab, select the **Notification type**. The **Email/SMS message/Push/Voice** option offers the most flexibility and is the recommended option. Select the pen to configure the notification.
1. Complete the *Add or edit notification* form that opens and select **OK**:
42
+
:::image type="content" source="media/advance-notifications/define-condition-services.png" alt-text="A screenshot of the Azure portal page where you define conditions for the health alert and define services to be notified for.":::
43
+
44
+
:::image type="content" source="media/advance-notifications/define-condition-regions.png" alt-text="A screenshot of the Azure portal page where you define conditions for the health alert and define regions to be notified for.":::
45
+
46
+
:::image type="content" source="media/advance-notifications/define-condition-event-types.png" alt-text="A screenshot of the Azure portal page where you define conditions for the health alert and define event types to be notified for.":::
47
+
48
+
> [!IMPORTANT]
49
+
> Service health is rolling out new experiencs in phases. Some users will see the updated experience, others will still see the classic Service Health portal experience. In case that you still see the classic Service Health portal, for **Region** don't select Global as an option, but rather the specific region or all regions.
49
50
50
-
2.Actions and Tags are optional. Here you can configure additional actions to be triggered or use tags to categorize and organize your Azure resources.
51
+
4. In the **Actions** section, select the existing action group or create a new one.
51
52
52
-
4. Check the details on the **Review + create** tab and select **Create**.
53
+
:::image type="content" source="media/advance-notifications/add-action-group.png" alt-text="A screenshot of the Azure portal page where you add or create action groups.":::
53
54
54
-
7. After selecting create, the alert rule configuration screen opens and the action group will be selected. Give a name to your new alert rule, then choose the resource group for it, and select **Create alert rule**.
55
+
5. In the **Details** section, define the name for your alert and specify resource group where it should be deployed.
55
56
56
-
8. Click the **Health alerts** menu item again, and the list of alerts now contains your new alert.
57
+
:::image type="content" source="media/advance-notifications/define-alert-details.png" alt-text="A screenshot of the Azure portal page where you define alert details.":::
57
58
59
+
6. Select **Review + create** and your alert will be created.
58
60
59
61
You're all set. Next time there's a planned Azure SQL maintenance event, you'll receive an advance notification.
60
62
63
+
To learn more about creating health alerts, visit [Azure Service Health](/azure/service-health/service-health-portal-update)
64
+
61
65
## Receiving notifications
62
66
63
67
The following table shows the general-information notifications you may receive:
Copy file name to clipboardExpand all lines: azure-sql/database/always-encrypted-enclaves-enable-sgx.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.topic: conceptual
19
19
Configuring the DC-series hardware to enable Intel SGX enclaves is the responsibility of the Azure SQL Database administrator. See [Roles and responsibilities when configuring SGX enclaves and attestation](always-encrypted-enclaves-plan.md#roles-and-responsibilities-when-configuring-sgx-enclaves-and-attestation).
20
20
21
21
> [!NOTE]
22
-
> Intel SGX is not available in hardware configurations other than DC-series. For example, Intel SGX is not available for Gen5 hardware, and it is not available for databases using the [DTU model](service-tiers-dtu.md).
22
+
> Intel SGX is not available in hardware configurations other than DC-series. For example, Intel SGX is not available for standard-series (Gen5) hardware, and it is not available for databases using the [DTU model](service-tiers-dtu.md).
23
23
24
24
> [!IMPORTANT]
25
25
> Before you configure the DC-series hardware for your database, check the regional availability of DC-series and make sure you understand its performance limitations. For more information, see [DC-series](service-tiers-sql-database-vcore.md#dc-series).
Copy file name to clipboardExpand all lines: azure-sql/database/always-encrypted-enclaves-getting-started.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,10 +58,10 @@ In this step, you'll create a new Azure SQL Database logical server and a new da
58
58
# [Portal](#tab/azure-portal)
59
59
60
60
1. Browse to the [Select SQL deployment option](https://portal.azure.com/#create/Microsoft.AzureSQL) page.
61
-
1. If you aren't already signed in to Azure portal, sign in when prompted.
61
+
1. If you aren't already signed in to the Azure portal, sign in when prompted.
62
62
1. Under **SQL databases**, leave **Resource type** set to **Single database**, and select **Create**.
63
63
64
-
:::image type="content" source="./media/single-database-create-quickstart/select-deployment.png" alt-text="Add to Azure SQL":::
64
+
:::image type="content" source="./media/single-database-create-quickstart/select-deployment.png" alt-text="Screenshot of Azure portal, showing the Add to Azure SQL deployment option.":::
65
65
66
66
1. On the **Basics** tab of the **Create SQL Database** form, under **Project details**, select the desired Azure **Subscription**.
67
67
1. For **Resource group**, select **Create new**, enter a name for your resource group, and select **OK**.
@@ -78,17 +78,17 @@ In this step, you'll create a new Azure SQL Database logical server and a new da
78
78
1. Leave **Want to use SQL elastic pool** set to **No**.
79
79
1. Under **Compute + storage**, select **Configure database**, and select **Change configuration**.
:::image type="content" source="./media/always-encrypted-enclaves/portal-configure-database.png" alt-text="Screenshot of Azure portal, hardware configuration, where to configure database." lightbox="./media/always-encrypted-enclaves/portal-configure-database.png":::
82
82
83
83
1. Select the **DC-series** hardware configuration, and then select **OK**.
1. On the **Networking** tab, for **Connectivity method**, select **Public endpoint**.
94
94
1. For **Firewall rules**, set **Add current client IP address** to **Yes**. Leave **Allow Azure services and resources to access this server** set to **No**.
Copy file name to clipboardExpand all lines: azure-sql/database/always-encrypted-enclaves-plan.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ ms.topic: conceptual
21
21
Intel SGX is a hardware-based trusted execution environment technology. Intel SGX is available for databases that use the [vCore model](service-tiers-sql-database-vcore.md) and [DC-series](service-tiers-sql-database-vcore.md?#dc-series) hardware. Therefore, to ensure you can use Always Encrypted with secure enclaves in your database, you need to either select the DC-series hardware when you create the database, or you can update your existing database to use the DC-series hardware.
22
22
23
23
> [!NOTE]
24
-
> Intel SGX is not available in hardware other than DC-series. For example, Intel SGX is not available for Gen5 hardware, and it is not available for databases using the [DTU model](service-tiers-dtu.md).
24
+
> Intel SGX is not available in hardware other than DC-series. For example, Intel SGX is not available for standard-series (Gen5) hardware, and it is not available for databases using the [DTU model](service-tiers-dtu.md).
25
25
26
26
> [!IMPORTANT]
27
27
> Before you configure the DC-series hardware for your database, check the regional availability of DC-series and make sure you understand its performance limitations. For details, see [DC-series](service-tiers-sql-database-vcore.md#dc-series).
Copy file name to clipboardExpand all lines: azure-sql/database/arm-templates-content-guide.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.reviewer: wiassaf, mathoma
7
7
ms.date: 06/30/2021
8
8
ms.service: sql-db-mi
9
9
ms.subservice: deployment-configuration
10
-
ms.topic: guide
10
+
ms.topic: conceptual
11
11
ms.custom: overview-samples sqldbrb=2
12
12
---
13
13
@@ -26,7 +26,6 @@ The following table includes links to Azure Resource Manager templates for Azure
26
26
|[Server](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-logical-server)| This Azure Resource Manager template creates a server for Azure SQL Database. |
27
27
|[Elastic pool](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-elastic-pool-create)| This template allows you to deploy an elastic pool and to assign databases to it. |
28
28
|[Failover groups](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-with-failover-group)| This template creates two servers, a single database, and a failover group in Azure SQL Database.|
29
-
|[Threat Detection](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-threat-detection-db-policy-multiple-databases)| This template allows you to deploy a server and a set of databases with Threat Detection enabled, with an email address for alerts for each database. Threat Detection is part of the SQL Advanced Threat Protection (ATP) offering and provides a layer of security that responds to potential threats over servers and databases.|
30
29
|[Auditing to Azure Blob storage](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-auditing-server-policy-to-blob-storage)| This template allows you to deploy a server with auditing enabled to write audit logs to a Blob storage. Auditing for Azure SQL Database tracks database events and writes them to an audit log that can be placed in your Azure storage account, OMS workspace, or Event Hubs.|
31
30
|[Auditing to Azure Event Hub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-auditing-server-policy-to-eventhub)| This template allows you to deploy a server with auditing enabled to write audit logs to an existing event hub. In order to send audit events to Event Hubs, set auditing settings with `Enabled``State`, and set `IsAzureMonitorTargetEnabled` as `true`. Also, configure Diagnostic Settings with the `SQLSecurityAuditEvents` log category on the `master` database (for server-level auditing). Auditing tracks database events and writes them to an audit log that can be placed in your Azure storage account, OMS workspace, or Event Hubs.|
32
31
|[Azure Web App with SQL Database](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.web/web-app-sql-database)| This sample creates a free Azure web app and a database in Azure SQL Database at the "Basic" service level.|
0 commit comments