|
1 | 1 | ---
|
2 |
| -title: Scan for vulnerabilities on on-premises and Azure Arc-enabled SQL servers |
| 2 | +title: Scan for vulnerabilities on SQL servers |
3 | 3 | description: Learn about Microsoft Defender for SQL servers on machines' integrated vulnerability assessment scanner
|
4 | 4 | ms.topic: how-to
|
5 | 5 | ms.author: dacurwin
|
6 | 6 | author: dcurwin
|
7 |
| -ms.date: 11/09/2021 |
| 7 | +ms.date: 05/20/2024 |
| 8 | +#customer intent: As a user, I want to scan for vulnerabilities on SQL servers using Microsoft Defender for SQL servers on machines' integrated vulnerability assessment scanner. |
8 | 9 | ---
|
9 | 10 |
|
10 | 11 | # Scan your SQL servers for vulnerabilities
|
@@ -37,7 +38,7 @@ You can view the vulnerability assessment results directly from Defender for Clo
|
37 | 38 |
|
38 | 39 | The detailed view for this recommendation appears.
|
39 | 40 |
|
40 |
| - :::image type="content" source="./media/defender-for-sql-on-machines-vulnerability-assessment/sql-vulnerability-findings.png" alt-text="Recommendation details page."::: |
| 41 | + :::image type="content" source="./media/defender-for-sql-on-machines-vulnerability-assessment/sql-vulnerability-findings.png" alt-text="Screenshot of the recommendation details page."::: |
41 | 42 |
|
42 | 43 | 1. For more details, drill down:
|
43 | 44 |
|
@@ -106,7 +107,7 @@ To create a rule:
|
106 | 107 |
|
107 | 108 | 1. From the scope list, subscriptions with active rules show as **Rule applied**.
|
108 | 109 |
|
109 |
| - :::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule."::: |
| 110 | + :::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Screenshot showing how to modify or delete an existing rule in the Defender for Cloud portal."::: |
110 | 111 |
|
111 | 112 | 1. To view or delete the rule, select the ellipsis menu ("...").
|
112 | 113 |
|
@@ -140,6 +141,7 @@ Metadata information about the connected machine is also collected. Specifically
|
140 | 141 |
|
141 | 142 | You can specify the region where your SQL Vulnerability Assessment data will be stored by choosing the Log Analytics workspace location. Microsoft might replicate to other regions for data resiliency, but Microsoft does not replicate data outside the geography.
|
142 | 143 |
|
143 |
| -## Next steps |
| 144 | +## Next step |
144 | 145 |
|
145 |
| -Learn more about Defender for Cloud's protections for SQL resources in [Overview of Microsoft Defender for SQL](defender-for-sql-introduction.md). |
| 146 | +> [!div class="nextstepaction"] |
| 147 | +> [Overview of Microsoft Defender for SQL](defender-for-sql-introduction.md). |
0 commit comments