Skip to content

Commit 18deb9c

Browse files
Merge pull request #225573 from CESANU/patch-1
Update sql-azure-vulnerability-assessment-enable.md
2 parents 8244a1a + 9bb239d commit 18deb9c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/sql-azure-vulnerability-assessment-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ To enable vulnerability assessment without a storage account, use the express co
6262
Now you can go to the [**SQL databases should have vulnerability findings resolved**](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_AzureDefenderForData/SqlVaServersRecommendationDetailsBlade/assessmentKey/82e20e14-edc5-4373-bfc4-f13121257c37) recommendation to see the vulnerabilities found in your databases. You can also run on-demand vulnerability assessment scans to see the current findings.
6363

6464
> [!NOTE]
65-
> Each database is randomly assigned a scan time on a set day of the week. Email notifications are scheduled randomly per server on a set day of the week. The email notification report includes data from all recurring database scans that were executed during the preceding week (does not include on-demand scans).
65+
> Each database is randomly assigned a scan time on a set day of the week.
6666
6767
#### Enable express vulnerability assessment at scale
6868

@@ -99,4 +99,4 @@ Learn more about:
9999

100100
- [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md)
101101
- [Data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview)
102-
- [Storing scan results in a storage account behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage)
102+
- [Storing scan results in a storage account behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage)

0 commit comments

Comments
 (0)